Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

boundary protections

biblio

Visible to the public Securing Trajectory based Operations Through a Zero Trust Framework in the NAS

Submitted by grigby1 on Thu, 03/04/2021 - 3:07pm
  • TBO infrastructure
  • network perimeter
  • operating costs
  • policy-based governance
  • pubcrawl
  • resilience
  • Resiliency
  • Scalability
  • strong boundary security protections
  • national airspace system
  • TBO objectives
  • time-based management data
  • tool availability
  • trajectory based operations
  • verify approach
  • zero trust
  • zero trust framework
  • ZTF theory
  • FAA systems
  • aerospace computing
  • air traffic control
  • aircraft communication
  • authorisation
  • boundary protections
  • castle-moat approach
  • critical data
  • ever-evolving threat sophistication
  • access network data
  • FAA Telecommunications Infrastructure network
  • Human Factors
  • hybrid ZTX approach
  • Insider Threats
  • internal network devices
  • NAS Zero Trust
  • NAS.ZTF

Terms of Use  |  ©2023. CPS-VO