Author:
Nguyen H. H.,Lim Yeram,Seo Minhui,Jung Yunyoung,Kim Minji,Park Wonhyung
Publisher
Springer Nature Singapore
Reference19 articles.
1. Migeon, J.-H., Bobbert, Y.: Leveraging zero trust security strategy to facilitate compliance to data protection regulations. In: Arai, K. (ed.) Intelligent Computing: Proceedings of the 2022 Computing Conference, Volume 3, pp. 847–863. Springer International Publishing, Cham (2022). https://doi.org/10.1007/978-3-031-10467-1_52
2. García-Teodoro, P., Camacho, J., Maciá-Fernández, G., Gómez-Hernández, J.A., López-Marín, V.J.: A novel zero-trust network access control scheme based on the security profile of devices and users. Comput. Netw. 212, 109068 (2022)
3. KISA [Internet]. https://isms.kisa.or.kr/main/csap/intro/
4. FedRAMP [Internet]. https://www.fedramp.gov/cloud-service-providers/
5. Lee, S., Park, M., Lee, S., Park, W.: Security enhancement through comparison of domestic and overseas cloud security policies. In: Proceedings of the Korea Information and Communication Engineering General Academic Conference, pp. 268–270. Gunsan (2021)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献