Zero-trust architecture is creating a passwordless society

被引:0
|
作者
Iggbom J. [1 ]
机构
[1] Curity
来源
Network Security | 2022年 / 2022卷 / 07期
关键词
D O I
10.12968/S1353-4858(22)70045-1
中图分类号
学科分类号
摘要
Entering traditional passwords on a website is not uncommon and most people have at least one. But as our digital reliance increases and cyber criminals become more tech savvy, passwords may not be suitable as our primary form of authentication in the future. © 2022 MA Business Ltd.
引用
收藏
相关论文
共 50 条
  • [1] A Zero-Trust Architecture for Connected and Autonomous Vehicles
    Anderson, John
    Huang, Qiqing
    Cheng, Long
    Hu, Hongxin
    IEEE INTERNET COMPUTING, 2023, 27 (05) : 7 - 14
  • [2] On the Feasibility of Zero-Trust Architecture in Assuring Security in Metaverse
    AlShehhi, Fatema
    Otoum, Safa
    2023 INTERNATIONAL CONFERENCE ON INTELLIGENT METAVERSE TECHNOLOGIES & APPLICATIONS, IMETA, 2023, : 30 - 37
  • [3] Identity authentication for edge devices based on zero-trust architecture
    Liu, Haiqing
    Ai, Ming
    Huang, Rong
    Qiu, Rixuan
    Li, Yuancheng
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (23):
  • [4] Identity authentication for edge devices based on zero-trust architecture
    Liu, Haiqing
    Ai, Ming
    Huang, Rong
    Qiu, Rixuan
    Li, Yuancheng
    Concurrency and Computation: Practice and Experience, 2022, 34 (23)
  • [5] A Zero-Trust Architecture for Remote Access in Industrial IoT Infrastructures
    Federici, Fabio
    Martintoni, Davide
    Senni, Valerio
    ELECTRONICS, 2023, 12 (03)
  • [6] Zero-Trust Artificial Intelligence?
    Laplante, Phil
    Voas, Jeffrey
    COMPUTER, 2022, 55 (02) : 10 - 12
  • [7] Trust No One? A Framework for Assisting Healthcare Organisations in Transitioning to a Zero-Trust Network Architecture
    Tyler, Dan
    Viana, Thiago
    APPLIED SCIENCES-BASEL, 2021, 11 (16):
  • [8] Applying the principles of zero-trust architecture to protect sensitive and critical data
    Greenwood D.
    Network Security, 2021, 2021 (06) : 7 - 9
  • [9] Zero-Trust Security Authentication Based on SPA and Endogenous Security Architecture
    Xu, Mingyang
    Guo, Junli
    Yuan, Haoyu
    Yang, Xinyu
    ELECTRONICS, 2023, 12 (04)
  • [10] A continuous authentication scheme for zero-trust architecture in industrial internet of things
    Wan, Tao
    Shi, Buhai
    Wang, Huan
    Alexandria Engineering Journal, 2025, 122 : 555 - 563