Forrester. (2016, July). Five Steps To A Zero Trust Network. |
Houser, D. (2002). Beyond network perimeter defense: A “submarine warfare” strategy. Information Security Magazine. |
NIST SP 800-207 "Zero Trust Architecture," August 2020 |
Palo Alto Networks. (2016, March). Getting Started with a Zero Trust Approach to Network Security. |
Palo Alto Networks. (n.d.). What is a Zero Trust Architecture? |
Prabhune, B. A. (2017, March 23). A guide: Using SmartNICs to implement zero-trust cloud security. |
Zhuk, A. (2018, October 9). Quantum Zero Trust Model: The Future of Secure Systems Architecture. |