1. Rose S, Borchert O, Mitchell S, Connelly S (2020) Zero trust architecture, special publication (NIST SP), Natl Inst Stand Technol
2. San, Kalyar Myo (2019) Toward cloud network infrastructure approach: Service and security perspective, https://d1wqtxts1xzle7.cloudfront.net/60493825/424_Toward_Cloud_Network_Infrastructure_Approach_Service_and_Security_Perspective20190905-43957-8kza5s-with-cover-page-v2.pdf
3. Xuan ZG, Li Z, Liu JG (2011) Information filtering via implicit Trust-based network. arXiv preprint arXiv:1112.2388.
4. Sundaram B, Chapman BM (2001) Policy engine: a framework for authorization, accounting policy specification and evaluation in grids. In Int Work Grid Comput. pp 145–153. Springer, Berlin, Heidelberg
5. Burns J, Cheng A, Gurung P, Rajagopalan S, Rao P, Rosenbluth D, Martin DM (2001) Automatic management of network security policy. In Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01 2, pp 12–26. IEEE