分享
[1]于佳佳,王 亮.零信任架构在空管办公网络的应用研究与实践[J].成都信息工程大学学报,2025,40(06):787-793.[doi:10.16836/j.cnki.jcuit.2025.06.007]
 YU Jiajia,WANG Liang.Research and Practice on the Application of Zero Trust Architecture in the Office Network of Air Traffic Control[J].Journal of Chengdu University of Information Technology,2025,40(06):787-793.[doi:10.16836/j.cnki.jcuit.2025.06.007]
点击复制

零信任架构在空管办公网络的应用研究与实践

参考文献/References:

[1] John Kindervag.Build security into your network's dna:The zero trust network architecture[J].Forrester Research Inc,2010,27:1-16.
[2] Rory Ward,Betsy Beyer.Beyondcorp:a new approach to enterprise security[J].Login:,2014,39(6):6-11.
[3] Abraham Itzhak Weinberg,Kelly Cohen.Zero trust implementation in the emerging technologies era:a survey[J].Complex Engineering Systems,2024,4:16-20.
[4] 许敏,李皓昱.国内外零信任技术发展研究综述[J].江苏通信,2025,41(4):125-131.
[5] Liudong Xing,Honggang Wang,Chaonan Wang,et al.BDD-based two-party trust sensitivity analysis for social networks[J].International Journal of Security and Networks,2012,7(4):242-251.
[6] 冯景瑜,于婷婷,王梓莹,等.电力物联网场景下抗失陷终端威胁的边缘零信任模型[J].计算机研究与发展,2022,59(5):1120-1132.
[7] 陈石,夏飞,张颂,等.基于混合注意力的零信任电力物联网异常检测方案[J].电力信息与通信技术,2025,23(9):73-79.
[8] 安宁,许文静,刘珠慧,等.基于零信任模型的细粒度数据库安全控制方法[J].电子技术应用,2024,50(10):63-68.
[9] 王超,梁巍,孙理.零信任模型在网络与数据安全中的应用研究[J].军民两用技术与产品,2025(5):23-28.
[10] 王群,袁泉,李馥娟,等.零信任网络及其关键技术综述[J].计算机应用,2023,4(4):1143-1150.
[11] 陈瑜,殷浩,姚蕾,等.基于双模单包授权的公路零信任安全应用研究[J].网络安全与数据治理,2023,42(10):87-93.

备注/Memo

收稿日期:2025-06-30
通信作者:于佳佳.E-mail:1981972473@qq.com

更新日期/Last Update: 2025-12-01