期刊文献+

零信任研究综述 被引量:45

A Survey of Zero Trust Research
下载PDF
导出
摘要 随着云计算、移动办公等技术的普及,企业网络结构变得复杂.传统的网络安全模型基于边界防护的思想,无法适应当前的需求.零信任是一种新的网络安全模型,不区分内外网,所有实体访问资源均需要认证、授权,能够用于防护边界日益模糊的网络.给出了零信任的定义,介绍了零信任的架构,分析了其依赖的核心技术,对代表性的几个零信任方案进行了对比分析,并总结了发展现状,指出了该领域中需要重点关注的研究方向,可为零信任的研究与应用提供参考. With the popularization of cloud computing,mobile office and other technologies,the enterprise network structure becomes complex.The traditional network security model is based on the idea of boundary protection,which can't meet the current needs.Zero trust as a new network security model,which don't distinguish the internal and external networks,as well as all entities need authentication and authorization before accessing resources,which can be used to protect the network whose perimeter is increasingly fuzzy.This paper gives the definition of zero trust,introduces the architecture of zero trust,analyzes the core technology of zero trust,compares several representative zero trust schemes,summarizes the development status,points out the research direction needing attention in this field,which can provide reference for the research and application of zero trust.
作者 张宇 张妍 Zhang Yu;Zhang Yan(Beijing Certificate Authority,Beijing 100190)
出处 《信息安全研究》 2020年第7期608-614,共7页 Journal of Information Security Research
关键词 零信任 身份认证 访问控制 基于角色的访问控制 基于属性的访问控制 zero trust identity authentication access control role-based access control attribute-based access control
  • 相关文献

参考文献6

二级参考文献87

  • 1张文凯,曹元大.PKI体系中的密钥管理技术及实现方案[J].计算机与现代化,2004(9):98-100. 被引量:1
  • 2张秋余,梁爽,王利娜.PKI的发展及问题分析[J].微计算机信息,2006,22(02X):39-41. 被引量:12
  • 3WANG Xiaoming,ZHAO Zongtao.A Service Oriented Voting Authorization Model[J].Chinese Journal of Electronics,2006,15(1):37-40. 被引量:2
  • 4钟旭,洪泽勤.IBE和CPK的对比分析[J].计算机安全,2006(6):46-48. 被引量:1
  • 5张金颖,邓子健.基于身份的密钥协商方案[J].信息安全与通信保密,2007,29(3):102-104. 被引量:6
  • 6M LeMay,O Fatemieh,C A Gunter.PolicyMorph:interactive policy transformations for a logical attribute-based access control framework[A].Proceedings of the 12th ACM Symposium on Access Control Models and Technologies[C].New York:ACM,2008.205-214.
  • 7V Kolovski,J Hendler,B Parsia.Analyzing web access control policies[A].Proceedings of the 16th International Conference on World Wide Web[C].New York:ACM,2007.677-686.
  • 8E Yuan,J Tong.Attributed based access control (ABAC) for web services[A].Proceedings of the IEEE International Conference on Web Services[C].Washington:IEEE Computer Society,2005.561-569.
  • 9C Ye,Z Wu,Y Fu.An attribute-based delegation model and its extension[J].Journal of Research and Practice in Information Technology,2006,38 (1):3-17.
  • 10J Michael,R Manoj.A contextual attribute-based access control model[A].Proceedings of 2006 Workshops on the Move to Meaningful Internet Systems[C].Berlin:Springer,2006.1996-2006.

共引文献207

同被引文献247

引证文献45

二级引证文献188

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部