1. Cai, R., & Zhang, X. (2019). Zero Trust Based Identity Security Solution. Information Technology & Standardization, 9, 46-49.
2. Chapman, G., & Chapman, J. (2021). Zero Trust Security: An Enterprise Guide. Springer.
3. Columbus, L. (2022). How zero trust can help battle identities under siege. VentureBeat. https://venturebeat.com/security/how-zero-trust-can-help-battleidentities-under-siege/.
4. Lambert, M., Surhone, M., Tennoe, M., & Henssonow, S. (2023). NIST Enterprise Architecture Model. What is a Zero Trust Architecture. Palo Alto (2023). https://www.paloaltonetworks.com/cyberpedia/what-is-a-zero-trustarchitecture.
5. Liu, Z. (2018). Discussion on the construction of network information security system for digital transformation enterprises under the new normal. Cyberspace Security, 9(11), 80-87.