Zero trust membuat semua aset jaringan tidak dapat diakses secara default. Pengguna, perangkat, dan beban kerja harus melewati autentikasi dan validasi kontekstual yang berkesinambungan untuk mengakses sumber daya apa pun, dan mereka harus melewati pemeriksaan ini setiap kali mereka meminta konek...
APA Style Alwakeel, A. M., & Alnaim, A. K. (2024). Trust Management and Resource Optimization in Edge and Fog Computing Using the CyberGuard Framework. Sensors, 24(13), 4308. https://doi.org/10.3390/s24134308 Note that from the first issue of 2016, this journal uses article numbers...
Finally, we calculated and used variance inflation factors (VIFs) to examine the potential issue of multicollinearity between variables in Model 1 and Model 2. We found that none of the VIFs were greater than the threshold of 10 [159], indicating that no significant multicollinearity existed in...
APA Style Meng, W., Giannetsos, T., & Jensen, C. D. (2022). Information and Future Internet Security, Trust and Privacy. Future Internet, 14(12), 372. https://doi.org/10.3390/fi14120372 Note that from the first issue of 2016, this journal uses article numbers instead of page num...
Cybersecurity risk is among the top risks that every organization must consider and manage, especially during this time wherein technology has become an integral part of our lives; however, there is no efficient and simplified measurement method that org
Several mechanisms have been proposed to mitigate the issue of compromised CAs, as well as time-intensive revocation problems. These approaches have their own advantages and disadvantages compared to other schemes. One of the most popular approaches is the log-based schema [9,10], notably Certifica...
(This article belongs to the Special IssueImpact of COVID-19 on Multimedia Transformation) Downloadkeyboard_arrow_down Browse Figures Versions Notes Abstract The sharing economy has seen a worldwide boom in recent years. In tourism, such platforms are being increasingly used; however, analysis of ...
APA Style Chen, Z., Tian, L., & Lin, C. (2017). Trust Model of Wireless Sensor Networks and Its Application in Data Fusion. Sensors, 17(4), 703. https://doi.org/10.3390/s17040703 Note that from the first issue of 2016, this journal uses article numbers instead of page numbers....
APA Style Ghovanlooy Ghajar, F., Salimi Sratakhti, J., & Sikora, A. (2021). SBTMS: Scalable Blockchain Trust Management System for VANET. Applied Sciences, 11(24), 11947. https://doi.org/10.3390/app112411947 Note that from the first issue of 2016, this journal uses article number...