최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기정보처리학회논문지. KIPS transactions on computer and communication systems 컴퓨터 및 통신 시스템, v.12 no.6, 2023년, pp.189 - 196
이진용 (숭실대학교 IT정책경영학과) , 최병훈 (숭실대학교 IT정책경영학과) , 고남현 (숭실대학교 IT정책경영학과) , 전삼현 (숭실대학교 IT정책경영학과)
Today, in the era of the 4th industrial revolution based on the paradigm of hyper-connectivity, super-intelligence, and superconvergence, the remote work environment is becoming central based on technologies such as mobile, cloud, and big data. This remote work environment has been accelerated by th...
J. Y. Lee, W. B. cho, and H. J. Jang, "A study on the?establishment of information security management system?based on zero trust architecture," Proceedings of the?Annual Conference of Korea Information Processing?Society Conference (KIPS) 2022, Vol.29, No.2, pp.210-212,?2022.
C. Buck, C. Olenberger, A. Schweizer, F. Volter, and T.?Eymann, "Never trust, always verify: A multivocal literature?review on current knowledge and research gaps of zerotrust," Computers and Security, Vol.110, 2021.
E. S. Hosney, I. T. A. Halim, and A. H. Yousef, "An artificial?intelligence approach for deploying zero trust architecture?(ZTA)," 2022 5th International Conference on Computing?and Informatics (ICCI), pp.343-350, 2022.
S. Rose, O. Borchert, S. Mitchell, and S. Connelly, "NIST?special publication 800-207, zero trust architecture,"?National Institute of Standards and Technology, 2020.
S. Keeriyattil, "Microsegmentation and zero trust: Introduction," Zero Trust Networks with VMware NSX, 2019.
R. Ward and B. Beyer, "Beyondcorp: A new approach to?enterprise security," The Magazine of USENIX & SAGE,?Vol.39, No.6, 2014.
Cybersecurity Divsion, "Zero Trust Maturity Model,"?Cybersecurity and Infrastructure Security Agency, 2021.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.