Zero-trust based dynamic access control for cloud computing

Abstract Most corporations and organizations rely heavily on access control to protect data accessibility and enable resource sharing across networks and departments. However, with the development of cloud computing, traditional boundary protection struggles to mitigate the increasing attacks and th...

Full description

Bibliographic Details
Main Authors: Ri Wang, Chen Li, Kun Zhang, Bibo Tu
Format: Article
Language:English
Published: SpringerOpen 2025-02-01
Series:Cybersecurity
Subjects:
Online Access:https://doi.org/10.1186/s42400-024-00320-x