1. Zuo, Y.: Research on the application of zero-trust architecture in critical information infrastructure security protection. Secrecy Sci. Technol. 11, 33–38 (2019)
2. Zeng, L., Liu, X.: Security architecture based on zero trust. Commun. Technol. 53(7), 1750–1754 (2020)
3. Ye, M.: Research on the application of zero-trust security model in the security management of central enterprises. Electron. World 11, 164–165 (2019)
4. Liu, H., Yang, S., Liu, H.: Zero trust security architecture and application. Commun. Technol. 53(7), 1745–1749 (2020)
5. Hong, T., Gong, W.: The method of trust evaluation based on fuzzy mathematics. Tech. Autom. Appl. 39(2), 41–44 (2020)