Title | Real Identity Based Access Control Technology under Zero Trust Architecture |
Publication Type | Conference Paper |
Year of Publication | 2021 |
Authors | Wu, Ya Guang, Yan, Wen Hao, Wang, Jin Zhi |
Conference Name | 2021 International Conference on Wireless Communications and Smart Grid (ICWCSG) |
Date Published | Aug. 2021 |
Publisher | IEEE |
ISBN Number | 978-1-6654-2598-8 |
Keywords | Admission control, Collaboration, Human Behavior, human factors, identity authentication, policy-based governance, pubcrawl, resilience, Resiliency, Scalability, zero trust, Zero trust architecture |
Abstract | With the rapid development and application of emerging information technology, the traditional network security architecture is more and more difficult to support flexible dynamic and a wider range of business data access requirements. Zero trust technology can truly realize the aggregation of security and business by building an end-to-end dynamic new boundary based on identity, which puts forward a new direction for the upgrade and evolution of enterprise network security architecture. This paper mainly includes access control and identity authentication management functions. The goal of access control system is to ensure that legitimate and secure users can use the system normally, and then protect the security of enterprise network and server. The functions of the access control system include identifying the user's identity (legitimacy), evaluating the security characteristics (Security) of the user's machine, and taking corresponding response strategies. |
URL | https://ieeexplore.ieee.org/document/9616576 |
DOI | 10.1109/ICWCSG53609.2021.00011 |
Citation Key | wu_real_2021 |