Retraction

Zero trust access authorization and control of network boundary based on cloud sea big data fuzzy clustering

Paper Information

Record ID:
64899
Publication Date:
April 08, 2022
Retraction Date:
April 17, 2025 (<1 year years ago)
Subjects:
Article Type:
Publisher:
IOS Press (bought by Sage November 2023)
Open Access:
Yes
PubMed ID:
Not indexed in PubMed
Retraction PubMed ID:
Not indexed in PubMed

Citations (9)

9
Total Citations
0
Post-Retraction
8
Pre-Retraction
0
Same Day
Heavy Metals Removal Using Carbon Based Nanocomposites
Unknown Authors
Unknown Journal
Published: Unknown
Attribute encryption access control method of high dimensional medical data based on fuzzy algorithm
Yonggang Huang, Teng Teng, Yuanyuan Li et al. (4 authors)
PLoS ONE Open Access
Published: Mar 2025
1 citation
21 days before retraction
Zero-trust based dynamic access control for cloud computing
Ri Wang, Li Chen, Zhang Kun et al. (4 authors)
Cybersecurity Open Access
Published: Feb 2025
2 citations
60 days before retraction
Verify and trust: A multidimensional survey of zero-trust security in the age of IoT
Muhammad Ajmal Azad, Sidrah Abdullah, Junaid Arshad et al. (5 authors)
Internet of Things Open Access
Published: May 2024
16 citations
325 days before retraction
Dissecting zero trust: research landscape and its implementation in IoT
Chunwen Liu, Ru Tan, Yang Wu et al. (8 authors)
Cybersecurity Open Access
Published: May 2024
8 citations
349 days before retraction
Big Data Access Control Mechanism Based on Two-Layer Permission Decision Structure
Aodi Liu, Na Wang, Xuehui Du et al. (6 authors)
Computers, materials & continua/Computers, materials & continua (Print) Open Access
Published: Jan 2024
1 citation
472 days before retraction
Zero Trust for Cloud
H L Gururaj, M Spoorthi, Vinayakumar Ravi et al. (5 authors)
SpringerBriefs in applied sciences and technology
Published: Jan 2024
472 days before retraction
Zero trust security model: Defining new boundaries to organizational network
T. N. Nisha, Dhanya Pramod, R. Singh
Unknown Journal
Published: Aug 2023
623 days before retraction
Research on Zero Trust Evaluation Method for Network Security
Sheng Hong, Ziyun Yu, Xinhao Zou et al. (6 authors)
Unknown Journal
Published: May 2023
717 days before retraction
Quick Stats
Total Citations: 13
Years Since Retraction: <1 year
Open Access: Yes
Last Checked: Jul 23, 2025
Related Papers
Models for selecting an ERP system with hesitant fuzzy ling…
Journal of Intelligent & Fuzzy Systems • 140 citations
Fuzzy N-soft sets: A novel model with applications
Journal of Intelligent & Fuzzy Systems • 137 citations
Stochastic EDAS method for multi-criteria decision-making w…
Journal of Intelligent & Fuzzy Systems • 130 citations
Interval-valued dual hesitant fuzzy uncertain linguistic ag…
Journal of Intelligent & Fuzzy Systems • 106 citations
Hesitant fuzzy N-soft sets: A new model with applications i…
Journal of Intelligent & Fuzzy Systems • 90 citations