Data-Driven Zero Trust Key Algorithm
In today’s information society, network security is a crucial issue. Network security technology is changing as a result of the development of emerging technologies such as big data, cloud computing, and artificial intelligence. Data-driven (DD) security has emerged as a new network security technol...
Saved in:
| Published in | Wireless communications and mobile computing Vol. 2022; no. 1 |
|---|---|
| Main Authors | , , |
| Format | Journal Article |
| Language | English |
| Published |
Oxford
Hindawi
2022
John Wiley & Sons, Inc |
| Subjects | |
| Online Access | Get full text |
| ISSN | 1530-8669 1530-8677 1530-8677 |
| DOI | 10.1155/2022/8659428 |
Cover
| Abstract | In today’s information society, network security is a crucial issue. Network security technology is changing as a result of the development of emerging technologies such as big data, cloud computing, and artificial intelligence. Data-driven (DD) security has emerged as a new network security technology development direction. The key technologies for DD network security are discussed in depth in this paper. A data security protection system is designed from the perspective of ZT, based on advanced security concepts and technologies developed by ZT, as well as a foreign data security governance framework. The number of alarms generated per hour is counted, removal rules are defined, and real-time rule matching is performed to eliminate false alarms based on different combinations of attributes. By analyzing the security data generation rules and internal relations, a security aggregation method can reduce redundant data and improve alarm quality. |
|---|---|
| AbstractList | In today’s information society, network security is a crucial issue. Network security technology is changing as a result of the development of emerging technologies such as big data, cloud computing, and artificial intelligence. Data-driven (DD) security has emerged as a new network security technology development direction. The key technologies for DD network security are discussed in depth in this paper. A data security protection system is designed from the perspective of ZT, based on advanced security concepts and technologies developed by ZT, as well as a foreign data security governance framework. The number of alarms generated per hour is counted, removal rules are defined, and real-time rule matching is performed to eliminate false alarms based on different combinations of attributes. By analyzing the security data generation rules and internal relations, a security aggregation method can reduce redundant data and improve alarm quality. |
| Author | Liu, Zhiwei Li, Xiaoyu Mu, Dejun |
| Author_xml | – sequence: 1 givenname: Zhiwei orcidid: 0000-0002-1206-9553 surname: Liu fullname: Liu, Zhiwei organization: Network Security College of Northwestern Polytechnical UniversityXi’anShaanxi 710072China – sequence: 2 givenname: Xiaoyu surname: Li fullname: Li, Xiaoyu organization: Network Security College of Northwestern Polytechnical UniversityXi’anShaanxi 710072China – sequence: 3 givenname: Dejun orcidid: 0000-0002-6091-7967 surname: Mu fullname: Mu, Dejun organization: Network Security College of Northwestern Polytechnical UniversityXi’anShaanxi 710072China |
| BookMark | eNqFjz1PwzAQhi1UJNrCxg-IBBuE2k58dsaq5UtUYikLi-XYDk2VJsFOWuXfkyoVI0x3w_O-d88EjcqqtAhdE_xACGMziimdCWBJTMUZGhMW4VAA56PfHZILNPF-izGOMCVjdLtUjQqXLt_bMvi0rgrWrvVN8Ga7YF58VS5vNrtLdJ6pwtur05yij6fH9eIlXL0_vy7mq1DTJG5CEKkw1DAGKWSpTbWiyhKhsUkzZQFYhhmPE2366xoTbHQiYiM4RH2QEx5NUTj0tmWtuoMqClm7fKdcJwmWR0V5VJQnxZ6_GfjaVd-t9Y3cVq0r-xclhRggAkpZT90PlHaV985m_5XeDfgmL4065H_TP_HeamQ |
| Cites_doi | 10.1016/s1353-4858(21)00063-5 10.1016/s1353-4858(21)00019-2 |
| ContentType | Journal Article |
| Copyright | Copyright © 2022 Zhiwei Liu et al. Copyright © 2022 Zhiwei Liu et al. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| Copyright_xml | – notice: Copyright © 2022 Zhiwei Liu et al. – notice: Copyright © 2022 Zhiwei Liu et al. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| DBID | RHU RHW RHX AAYXX CITATION 7SC 7SP 7XB 8FD 8FE 8FG ABUWG AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO GNUQQ HCIFZ JQ2 K7- L7M L~C L~D M0N P5Z P62 PHGZM PHGZT PIMPY PKEHL PQEST PQGLB PQQKQ PQUKI PRINS Q9U ADTOC UNPAY |
| DOI | 10.1155/2022/8659428 |
| DatabaseName | Hindawi Publishing Complete Hindawi Publishing Subscription Journals Hindawi Publishing Open Access CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts ProQuest Central (purchase pre-March 2016) Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) ProQuest Central UK/Ireland Advanced Technologies & Computer Science Collection ProQuest Central Essentials ProQuest Central Technology Collection ProQuest One Community College ProQuest Central Korea ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection Computer Science Database Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional Computing Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection Proquest Central Premium ProQuest One Academic (New) Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China ProQuest Central Basic Unpaywall for CDI: Periodical Content Unpaywall |
| DatabaseTitle | CrossRef Publicly Available Content Database Computer Science Database ProQuest Central Student Technology Collection Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection Computer and Information Systems Abstracts ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Central China ProQuest Central ProQuest One Applied & Life Sciences ProQuest Central Korea ProQuest Central (New) Advanced Technologies Database with Aerospace Advanced Technologies & Aerospace Collection ProQuest Computing ProQuest Central Basic ProQuest One Academic Eastern Edition Electronics & Communications Abstracts ProQuest Technology Collection ProQuest SciTech Collection Computer and Information Systems Abstracts Professional Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition ProQuest One Academic ProQuest One Academic (New) |
| DatabaseTitleList | Publicly Available Content Database CrossRef |
| Database_xml | – sequence: 1 dbid: RHX name: Hindawi Publishing Open Access url: http://www.hindawi.com/journals/ sourceTypes: Publisher – sequence: 2 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository – sequence: 3 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1530-8677 |
| Editor | Ning, Xin |
| Editor_xml | – sequence: 1 givenname: Xin surname: Ning fullname: Ning, Xin |
| ExternalDocumentID | 10.1155/2022/8659428 10_1155_2022_8659428 |
| GrantInformation_xml | – fundername: Shaanxi Provincial Key R&D Program grantid: 2021ZDLGY05-01 – fundername: Shenzhen Fundamental Research Program grantid: 20210317191843003 |
| GroupedDBID | .3N .DC .GA 05W 0R~ 123 1L6 24P 3SF 3WU 4.4 4ZD 50Y 50Z 52M 52O 52T 52U 52W 66C 6OB 702 7PT 8-0 8-1 8-3 8-4 8-5 8UM 930 A03 AAESR AAFWJ AAJEY AAONW ABIJN ABPVW ACCMX ACGFO ADBBV ADIZJ AENEX AFBPY AFKRA AIAGR AJXKR ALAGY ALMA_UNASSIGNED_HOLDINGS AMBMR ARAPS ASPBG ATUGU AVWKF AZBYB AZQEC AZVAB BAFTC BCNDV BENPR BGLVJ BHBCM BNHUX BROTX BRXPI CCPQU CS3 D-E D-F DPXWK DR2 DU5 DWQXO EBS F00 F01 F04 F21 G-S G.N GNP GNUQQ GODZA H.T H.X H13 HCIFZ HZ~ ITG ITH IX1 JPC K7- KQQ LAW LITHE LP6 LP7 MK4 MY~ N04 N05 NF~ O9- OIG OK1 P2P P2X P4D PHGZT PIMPY Q.N QB0 QRW R.K RHU RHW RHX RX1 RYL SUPJJ UB1 W8V W99 WBKPD XPP XV2 ~IA ~WT .Y3 31~ 5VS AAEVG AAMMB AANHP AAYXX AAZKR ACBWZ ACRPL ACXQS ACYXJ ADNMO AEFGJ AEIMD AEUCX AFZJQ AGQPQ AGXDD AIDQK AIDYY AZFZN BDRZF BFHJK CITATION EJD FEDTE HF~ HVGLF LH4 LW6 PHGZM PQGLB PUEGO ROL WYUIH 7SC 7SP 7XB 8FD 8FE 8FG ABUWG JQ2 L7M L~C L~D M0N P62 PKEHL PQEST PQQKQ PQUKI PRINS Q9U ADTOC UNPAY |
| ID | FETCH-LOGICAL-c294t-68b8d2d556b6fbebca2ae18c0dbfae665f05749cd000c010dc984d87638b87173 |
| IEDL.DBID | UNPAY |
| ISSN | 1530-8669 1530-8677 |
| IngestDate | Wed Oct 01 16:45:19 EDT 2025 Fri Jul 25 09:28:46 EDT 2025 Wed Oct 01 05:27:05 EDT 2025 Wed Apr 16 06:26:45 EDT 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 1 |
| Language | English |
| License | This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. cc-by |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c294t-68b8d2d556b6fbebca2ae18c0dbfae665f05749cd000c010dc984d87638b87173 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0002-1206-9553 0000-0002-6091-7967 |
| OpenAccessLink | https://proxy.k.utb.cz/login?url=https://downloads.hindawi.com/journals/wcmc/2022/8659428.pdf |
| PQID | 2646636225 |
| PQPubID | 2034344 |
| ParticipantIDs | unpaywall_primary_10_1155_2022_8659428 proquest_journals_2646636225 crossref_primary_10_1155_2022_8659428 hindawi_primary_10_1155_2022_8659428 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 2022-00-00 |
| PublicationDateYYYYMMDD | 2022-01-01 |
| PublicationDate_xml | – year: 2022 text: 2022-00-00 |
| PublicationDecade | 2020 |
| PublicationPlace | Oxford |
| PublicationPlace_xml | – name: Oxford |
| PublicationTitle | Wireless communications and mobile computing |
| PublicationYear | 2022 |
| Publisher | Hindawi John Wiley & Sons, Inc |
| Publisher_xml | – name: Hindawi – name: John Wiley & Sons, Inc |
| References | Jiao D. (e_1_2_9_14_2) 2018; 44 Zuo Y. (e_1_2_9_20_2) 2018; 11 Zhao Q. (e_1_2_9_12_2) 2020; 49 Zhong X. (e_1_2_9_21_2) 2019; 3 Qiu J. (e_1_2_9_17_2) 2021; 9 Shu Y. (e_1_2_9_19_2) 2021; 17 Li H. (e_1_2_9_10_2) 2021; 19 Xia S. (e_1_2_9_15_2) 2021; 1 Zhao Y. (e_1_2_9_5_2) 2021; 1 Tian Y. (e_1_2_9_13_2) 2020; 5 Wang S. (e_1_2_9_1_2) 2021; 7 Wang J. (e_1_2_9_18_2) 2020; 5 e_1_2_9_23_2 e_1_2_9_22_2 Bogner E. (e_1_2_9_24_2) 2019; 50 Sun R. (e_1_2_9_3_2) 2020; 36 Hu W. (e_1_2_9_4_2) 2019; 24 Guo Z. (e_1_2_9_6_2) 2020; 39 Cai R. (e_1_2_9_8_2) 2019; 9 Lu B. (e_1_2_9_9_2) 2020; 4 Zhong X. (e_1_2_9_25_2) 2019; 3 Hu Y. (e_1_2_9_11_2) 2020; 22 Zuo Y. (e_1_2_9_2_2) 2019; 11 Zuo Y. (e_1_2_9_7_2) 2020; 3 Zeng H. (e_1_2_9_16_2) 2020; 7 |
| References_xml | – volume: 9 year: 2021 ident: e_1_2_9_17_2 article-title: Research on university network security protection based on zero trust SDP publication-title: Electronic Technology and Software Engineering – volume: 36 year: 2020 ident: e_1_2_9_3_2 article-title: Zero-trust network construction based on multi-factor authentication publication-title: Journal of Bei Jing Institute of Technology – volume: 1 year: 2021 ident: e_1_2_9_15_2 article-title: The new trend of zero-trust security network security system construction publication-title: Data – volume: 11 year: 2018 ident: e_1_2_9_20_2 article-title: Zero-trust architecture: a new paradigm for network security publication-title: Financial Electronics – volume: 19 year: 2021 ident: e_1_2_9_10_2 article-title: Research on the architecture and application of network security model based on zero trust publication-title: Science & Technology Information – ident: e_1_2_9_23_2 doi: 10.1016/s1353-4858(21)00063-5 – volume: 49 year: 2020 ident: e_1_2_9_12_2 article-title: Research on the application of zero trust architecture in unit government network security protection publication-title: Gansu Science and Technology – volume: 3 year: 2020 ident: e_1_2_9_7_2 article-title: Research on the security system and application of remote mobile office based on zero trust architecture publication-title: Confidential Science and Technology – ident: e_1_2_9_22_2 doi: 10.1016/s1353-4858(21)00019-2 – volume: 7 year: 2021 ident: e_1_2_9_1_2 article-title: Research on internet of things terminal access security based on zero trust architecture publication-title: Post and Telecommunications Design Technology – volume: 4 year: 2020 ident: e_1_2_9_9_2 article-title: Research on data security system guided by zero trust technology publication-title: Modern Information Technology – volume: 5 year: 2020 ident: e_1_2_9_18_2 article-title: Zero-trust architecture to build a secure network environment publication-title: Network Security and Information Technology – volume: 1 start-page: 23 year: 2021 ident: e_1_2_9_5_2 article-title: Arctic sea ice detection based on microwave radiometer in 89GHz channels publication-title: ASP Transactions on Internet of Things – volume: 11 year: 2019 ident: e_1_2_9_2_2 article-title: Research on the application of zero trust architecture in the security protection of critical information infrastructure publication-title: Confidential Science and Technology – volume: 3 start-page: 114 year: 2019 ident: e_1_2_9_25_2 article-title: Airport network security protection scheme based on zero-trust security architecture publication-title: Journal of Civil Aviation – volume: 44 year: 2018 ident: e_1_2_9_14_2 article-title: Why “Zero Trust” will become one of the popular frameworks of network security publication-title: Computer Networks – volume: 24 year: 2019 ident: e_1_2_9_4_2 article-title: Application and practice of zero-trust security architecture in hospitals publication-title: Modern Economic Information – volume: 22 year: 2020 ident: e_1_2_9_11_2 article-title: Zero-trust technology and its application in information network security publication-title: China New Telecommunications – volume: 7 year: 2020 ident: e_1_2_9_16_2 article-title: Discussion on network security model and zero trust practice publication-title: Computer Products and Circulation – volume: 3 year: 2019 ident: e_1_2_9_21_2 article-title: Airport network security protection scheme based on zero-trust security architecture publication-title: Journal of Civil Aviation – volume: 50 start-page: 9 year: 2019 ident: e_1_2_9_24_2 article-title: The zero-trust mandate: never trust, continually verify publication-title: Software World – volume: 17 year: 2021 ident: e_1_2_9_19_2 article-title: Enterprise security architecture based on zero trust publication-title: Electronic Technology and Software Engineering – volume: 9 year: 2019 ident: e_1_2_9_8_2 article-title: Zero trust identity security solution publication-title: Information Technology and Standardization – volume: 39 year: 2020 ident: e_1_2_9_6_2 article-title: Research on identity authentication mechanism of IoT devices based on zero trust architecture publication-title: Information Technology and Network Security – volume: 5 year: 2020 ident: e_1_2_9_13_2 article-title: Network security protection ideas based on zero trust architecture publication-title: Information Technology and Information Technology |
| SSID | ssj0003021 |
| Score | 2.3035312 |
| Snippet | In today’s information society, network security is a crucial issue. Network security technology is changing as a result of the development of emerging... |
| SourceID | unpaywall proquest crossref hindawi |
| SourceType | Open Access Repository Aggregation Database Index Database Publisher |
| SubjectTerms | Access control Alarms Algorithms Artificial intelligence Big Data Cloud computing Correlation analysis Cybersecurity False alarms Fuzzy logic Internet Mathematical models Neural networks New technology Process controls Security management Security systems Trust |
| SummonAdditionalLinks | – databaseName: Hindawi Publishing Open Access dbid: RHX link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1dS8MwFL24gagP4idOp_Rh-hbs2ubrcThlKPogGwxfSpImTpjd2DrG_r3Jlo1NQX0sJA09Te49J7k9BajRMBHK0Bg5j0lkVyJFXFGNjBGRZcChwvP9jucX0uokj13c9SZJ459H-DbbOXke3TKCuWXKJSgx4iq3XlvdVcCNw8jbooaIEcKX9e3f-m5knu2ek7zTjw1iuTPJh2I2Ff3-Wo55OIB9Tw6DxuJtHsKWzo9gb80y8BhqTVEI1By5IBW86dEgaLuvJoInPQsa_feB1fq9zxPoPNy371rI_-kAqYgnBSJMsizKMCaSGOnqkyKh60yFmTRCE4KNpVUJV5l9WmUVVKY4SzJnJmc7unP0Uyjng1yfQWBEXdQJxtI2TyjFklOhYif0iOYxlxW4XqKQDheGFulcCGCcOrRSj1YFah6iP5pVl_ilfvaPU0uyLJEhNlRU4GaF6a_3Of_fcBew6y4XeyBVKBejib60rKCQV_M58QX5Zape priority: 102 providerName: Hindawi Publishing – databaseName: ProQuest Central dbid: BENPR link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwhV3NT8IwFH9BiFEPxs-IotkBvTWMbe3WgzEoEKKRGAMJ8bJ0XScmOBBHCP-9fWNDvOD9tUl_bd9XX38PoOqajpCRaxPkmCT6JrqES1eRKBKW9oBNSdN8x3OXdfrO44AOCtDN_8JgWWWuE1NFHY4l5shr2nBr48j08bubfBHsGoWvq3kLDZG1VghvU4qxLShZyIxVhNJ9q_vyutLNtmllDKom8RjjeSk8pZgFsGoeo9zBzuxrRmp7iNHx_OOPD7oziydiMRej0Zo5ah_AfuZHGo3lxh9CQcVHsLfGLngM1aZIBGlOUZ8Zb2o6Nnr4wcJ4UgujMXrXi0uGnyfQb7d6Dx2SNUUg0uJOQpgXeKEVUsoCFgVYymQJVfekGQaRUIzRSHtgDpehXq3UwVYoueeEyDunB-KT-ykU43GszsCIRF3UGaWBFndclwbcFdLGmJApbvOgDNc5Cv5kyX3hpzEDpT6i5WdolaGaQfSPWCXHz88uyrf_u61luFlhunGe883zXMAuSi_TJBUoJtOZutSOQxJcZafhBwSJuw4 priority: 102 providerName: ProQuest |
| Title | Data-Driven Zero Trust Key Algorithm |
| URI | https://dx.doi.org/10.1155/2022/8659428 https://www.proquest.com/docview/2646636225 https://downloads.hindawi.com/journals/wcmc/2022/8659428.pdf |
| UnpaywallVersion | publishedVersion |
| Volume | 2022 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: http://www.proquest.com/pqcentral?accountid=15518 eissn: 1530-8677 dateEnd: 20250131 omitProxy: true ssIdentifier: ssj0003021 issn: 1530-8677 databaseCode: BENPR dateStart: 20170101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVWIB databaseName: Wiley Online Library - Core collection (SURFmarket) issn: 1530-8677 databaseCode: DR2 dateStart: 20010101 customDbUrl: isFulltext: true eissn: 1530-8677 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0003021 providerName: Wiley-Blackwell – providerCode: PRVWIB databaseName: Wiley Online Library Open Access customDbUrl: eissn: 1530-8677 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0003021 issn: 1530-8677 databaseCode: 24P dateStart: 20170101 isFulltext: true titleUrlDefault: https://authorservices.wiley.com/open-science/open-access/browse-journals.html providerName: Wiley-Blackwell |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1bS8MwFD7MDVEfvIvTOfqgvnV2XZO04Mt0zqE4ZDiYgpTc6oa7MTuGPvkT_I3-EpO1FeeDii-lgdM05yQ9-U568gVgn1gO5QEpmZpj0lRfIjE9TqQZBNRWCNjiaLrecVXHtaZz0UKtFBwne2GEpogfUPFUaOuYdNKZeuvYrk9HE97jOl63j1yMPAWdC0MRzEFGFbCVhkyzfl2-jShSLdPF0xPt4ntCkrx3hGaqmJmR5uPXzgDOhXF_SJ8ntNv9MvdUV-A-aXWUcvJYGIeswF--ETr-V61VWI5BqVGORtEapGR_HZa-UBVuwGGFhvT99a0y0u7RuJOjgXGj92sYl_LZKHcfBqNO2O5tQrN6dnNaM-MzFkxue05oYpe5whYIYYYDpjOjbCqLLrcEC6jEGAUK0DkeF8p1chW7Ce65jtA0dupB_Qd_C9L9QV9ugxHQIi1ihJgSdwhBzCOUl3SIiaVX8lgWDhI7-8OISsOfhiAI-Vp3P9Y9C_uxkX4RyyU95CeG9BW8UxAKKyeVhcPPXvuxnp2_Cu7Coi5G6y85SIejsdxTiCRkeZhzq-d5yJyc1a8bqlRp2OraqLXy8ZD8ALln3Z4 |
| linkProvider | Unpaywall |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3JTsMwEB2xCAEHxCrKmkPLzSJNbCc-IAQUVOgihIqEuATHcShSaUsJqvg5vo1x60C5wIm77cPzeGbeeBaAYuBSqdLAJ6bHJMGXGBChAk3SVHroAbuKjeIdjSav3tKrO3Y3BR95LYxJq8x14khRJz1lYuSHaLjROHIUv-P-CzFTo8zvaj5CQ9rRCsnRqMWYLeyo6fchUrjXo8sK3nfJ8y7OW2dVYqcMEOUJmhEexmHiJYzxmKexyQ3ypC6Hyk3iVGrOWYouDRUqQeWhkL0kSoQ0MY3ccKP5w8Zzp2GW-lQg-Zs9PW9e33zZAt_1bMdWl4Scizz1njETdfAOQ84ENZPgJ4ziXNuw8eHTD593_q3bl-9D2elMmL-LZViyfqtzMha0FZjS3VVYnOhmuAbFiswkqQyM_nTu9aDntExBh4P4OCedRwQzaz-vw-2_wLMBM91eV2-Ck8qyLHPGYlxOg4DFIpDKNxyUa-GLuAClHIWoP-61EY04CmORQSuyaBWgaCH6Y9lOjl9kH-Zr9C1GBTj4wvTXc7Z-P2cf5qutRj2qXzZr27Bgdo5DNDswkw3e9C46LVm8ZyXDgYf_FsZPTgD4lg |
| linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV05T8MwFH7iENeAOEU5MxQ2q2kSO_GAECKUGzEUCbEEx3EAqbSlBFX8NX4d7zUJlKVM7LaHz5_f5XcAVH3bUzr1XUY9Jhm-RJ9J7RuWpspBC9jWfBDvuLoWp7fe-R2_G4PPshaG0ipLmTgQ1ElHU4y8hooblaNA-tXSIi3iJmwcdF8ZTZCin9ZynEZOkQvz0Uf37W3_LMS73nWcxnHz6JQVEwaYdqSXMRHEQeIknItYpDHlBTnK1ANtJ3GqjBA8RXPGkzpBwaHRc0m0DLyEmrjhRvq_xnPHYdKnLu5Upd44-dYCru0UvVptFgghy6R7zine4NQCwaVHM-CH1OHUE_nh_edf1u7Me7urPvqq1RpSfI0FmC8sVuswp9gijJn2EswN9TFchmqoMsXCHklO6970OlaTSjksRMc6bD0idNnTywrc_gs4qzDR7rTNGlipqqu64DzG5Z7v81j6SrvkfQojXRlXYLdEIermXTaigXfCeURoRQVaFagWEP2xbLPELyqe5Fv0Q6AK7H1jOvKc9dHn7MA0UjC6PLu-2IBZ2pjHZjZhIuu9my20VrJ4e0ALCx7-m4dfbHP2MA |
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1PS8MwFH_MDVEP_henU3pQb-26rkla8DKcYyiKBwcqSMm_qrh1o-sY8-RH8DP6SUzWVpwHFW8NvCZ9L8nL76UvvwAcENulPCR1U3NMmmomEtPnRJphSB2FgG2OpvsdF5e43XHPbtBNAY7zszBCU8T3qRhajzomHT9NvXVm12F1zHtcx-tO1cPIV9DZGohwDkqqgO0ilDqXV43blCLVNj08vdEueyYkz3tHaKaKmRVpPmt2BnAujKIBnYxpt_tl7WmtwH3-1WnKybM1SpjFX74ROv5XrVVYzkCp0UhH0RoUZLQOS1-oCjfgqEkT-v761oy1ezTuZNw3rvV5DeNcToxG96EfPyWPvU3otE6vT9pmdseCyR3fTUzsMU84AiHMcMh0ZpRDZc3jtmAhlRijUAE61-dCuU6uYjfBfc8VmsZOvaj_4G9BMepHchuMkNZoDSPElLhLCGI-obyuQ0ws_brPynCY2zkYpFQawTQEQSjQugeZ7mU4yIz0i1gl76EgN2Sg4J2CUFg5qTIcffbaj_Xs_FVwFxZ1Md1_qUAxiUdyTyGShO1nA-8De4DZIg |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Data-Driven+Zero+Trust+Key+Algorithm&rft.jtitle=Wireless+communications+and+mobile+computing&rft.au=Liu%2C+Zhiwei&rft.au=Li%2C+Xiaoyu&rft.au=Mu%2C+Dejun&rft.date=2022&rft.pub=John+Wiley+%26+Sons%2C+Inc&rft.issn=1530-8669&rft.eissn=1530-8677&rft.volume=2022&rft_id=info:doi/10.1155%2F2022%2F8659428&rft.externalDBID=HAS_PDF_LINK |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1530-8669&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1530-8669&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1530-8669&client=summon |