A Survey: ZTA Adoption in Cross-Domain Solutions—Seven-Pillar Perspective
Abstract
1. Introduction
- Redefinition of core ZTA elements for CDS environmentsWhile prior studies have addressed Zero Trust as a theoretical model in a general IT context, this study reinterprets the requirements of ZTA’s seven pillars in CDS environments.
- Systematic classification frameworkThis paper proposes a new classification framework that categorizes existing technologies based not only on explicit ZTA terminology but also on implicit functional alignment, providing a comprehensive perspective on ZTA adoption in CDS environments.
- Integrated implementation strategyThis paper seeks to organize how the seven core elements interact with one another to ensure continuous verification across heterogeneous security domains.
2. Background
2.1. Concepts and Principles of Zero Trust Architecture
2.1.1. Identity
2.1.2. Device
2.1.3. Network
2.1.4. Application
2.1.5. Data
2.1.6. Visibility & Analytics
2.1.7. Automation & Orchestration
2.2. Cross Domain Solution (CDS)
2.3. Literature Search Methodology
2.3.1. Identity Pillar
- Privacy-preserving credential verification mechanisms.Several studies emphasize that, in multi-domain settings, the authentication process itself can become a channel for privacy leakage or user traceability. These approaches aim to validate credential legitimacy without disclosing actual identities or attribute values.
- Trust-level-adaptive federated authentication.Other works point out the limitations of viewing authentication as a one-time operation. Instead, they introduce models in which authentication strength and procedures are adjusted according to evolving trust levels. By incorporating changes in user behavior, device posture, or domain context, these approaches can be grouped as trust-level-adaptive federated authentication.
- Remote-verified federation.In CDS environments, accepting authentication results generated by external domains without further validation introduces inherent risk. To address this, some studies focus not on the credential itself, but on verifying the integrity and security posture of the environment in which the credential was issued. Because this approach directly tackles cross-domain trust transfer, it is categorized as remote-verified federation.
- Continuous and context-aware authentication with adaptive authorization.Several studies extend authentication beyond session initiation, arguing that static, entry-point verification is insufficient to prevent privilege abuse or session hijacking. These works continuously reassess identity throughout the session by monitoring contextual information, and are thus classified as continuous and context-aware authentication with adaptive authorization.
- Non-credential continuous authentication.Another research direction departs from conventional credential-based authentication by leveraging physical-layer signals or behavioral characteristics. Such methods enable ongoing identity verification without explicit credentials, reducing re-authentication overhead in highly mobile and cross-domain CDS environments.
- Risk-evaluation-driven authentication control.Finally, some studies conceptualize authentication itself as a risk-bearing process. By quantitatively assessing privacy exposure, domain-level uncertainty, or contextual risk during authentication, these approaches dynamically adjust protection mechanisms. Accordingly, they are classified as risk-evaluation-driven authentication control.
2.3.2. Device Pillar
- Device profiling-based continuous verification.Some studies treat devices not as static identity objects, but as entities that must be continuously evaluated over time. These approaches aggregate configuration information, integrity measurements, and behavioral characteristics to derive device trust levels, which are then used to dynamically adjust access permissions. This category represents a device-level realization of the Zero Trust principle that trust must not persist beyond verification.
- Privacy-preserving cross-domain device trust inference.In CDS environments, devices frequently migrate across domains or participate in multiple domains simultaneously. Under such conditions, centralized trust evaluation mechanisms face limitations in scalability and privacy. To address this, some studies propose architectures that infer or transfer device trust without sharing raw device data, reflecting efforts to balance trust continuity with data sovereignty.
- Hardware- or RF-based device identity establishment.Another research direction focuses on the fundamental problem of device identity itself. Software-based identifiers and key management mechanisms are vulnerable to cloning, theft, and forgery, and are often impractical for resource-constrained devices. Consequently, several studies leverage intrinsic hardware or physical-layer characteristics to establish device identity, distinguishing devices as physical entities rather than purely logical constructs.
- State-binding zero-trust authorization tokens for distributed enforcement.Some studies concentrate on how verified device states are translated into enforceable access control decisions. These approaches bind device integrity or state verification results to cryptographic tokens or proofs, enabling distributed authorization enforcement without reliance on centralized decision points, thereby addressing scalability and availability concerns in CDS environments.
- Cross-domain trust propagation and provenance verification.Other studies emphasize the reliability of device trust propagation across domains. Rather than directly accepting device attributes or state information generated by external domains, these approaches verify the provenance and integrity of the systems that generated such information, reflecting a cautious approach to trust transfer in federated environments.
- Secure device onboarding and initial trust bootstrapping.Finally, some studies identify device onboarding itself as a cross-domain security problem. These works reject implicit trust in manufacturers or supply chains and instead propose mechanisms that allow users or operators to directly establish initial trust when devices first enter the system.
2.3.3. Network Pillar
- Bidirectional Zero Trust CDS.Some studies address the challenge of maintaining bidirectional communication under Zero Trust assumptions. Rather than assuming that two-way connectivity is inherently unsafe, these approaches introduce distributed enforcement and state-aware verification mechanisms that independently validate traffic in each direction. By correlating requests and responses and dispersing policy enforcement across multiple nodes, they reduce reliance on a single gateway and limit the impact of reverse-path attacks. This line of work illustrates that bidirectional exchange can be achieved without implicit trust when every transaction is explicitly verified.
- Extreme Zero Trust by physical disconnection.Other studies adopt the opposite stance, treating the existence of connectivity itself as the primary source of risk. In these approaches, security is achieved by eliminating communication paths altogether through physical or logical disconnection. Air-gapped architectures and extreme isolation models exemplify this perspective, reflecting a Zero Trust interpretation in which risk is mitigated not through verification, but through structural non-connectivity.
- Cloud-native Zero Trust CDS.A separate body of research focuses on environments where physical separation is impractical, such as hybrid cloud or large-scale distributed systems. These studies redefine network boundaries in logical terms, using workloads, services, or identities as the basis for isolation. Micro-segmentation, service meshes, and continuous verification mechanisms are employed to prevent lateral movement even when infrastructure is shared, emphasizing the shift from hardware-defined boundaries to software-defined, policy-driven network controls.
- One-way boundary Zero Trust.Another group of studies concentrates on asymmetric communication requirements, where data exchange is necessary but must be strictly limited to a single direction. One-way boundaries and data diode architectures exemplify this approach, prioritizing the elimination of reverse attack paths while still permitting controlled data export. This category represents a practical compromise between complete isolation and bidirectional connectivity, particularly in high-risk operational environments.
2.3.4. Application Pillar
- Stateful Request–Response Correlation at the Application Layer.Some studies focus on enforcing trust by validating the semantic consistency between application-layer requests and responses. These approaches treat any unsolicited or context-free response as untrusted and enforce strict stateful correlation at the application protocol level. By verifying function codes, sequence information, and execution context, they prevent response injection and replay across domains, emphasizing explicit verification of application state as the primary trust boundary.
- Virtualized Cloud CDS with Verified Isolation and Least Privilege.Other studies address the challenge of deploying CDS functionality in cloud and virtualized environments while preserving strict isolation guarantees. Rather than relying on perimeter defenses, these works enforce least privilege and isolation through verified microkernels, capability-based access control, and static communication paths. Application components are constrained to predefined privileges that cannot be expanded at runtime, highlighting the role of formally constrained execution environments in applying Zero Trust principles at the application layer.
- Federated Cross-Domain Resource Sharing with Fine-Grained Policy Enforcement & Automation.A separate group of studies focuses on federated application environments, where resources and services must be shared across domains that do not mutually trust each other. These approaches embed policy enforcement directly into applications or application-adjacent components, enabling fine-grained, resource-level access control that is independent of network location. Policy evaluation and enforcement are automated and consistently applied across domains, reflecting an application-centric model of cross-domain trust enforcement.
- Proxy-Based Web Component/API Isolation with Runtime Verification.Some studies concentrate on isolating application components and interfaces within complex application ecosystems such as web mashups and API-driven systems. These works reject broad domain-level trust and instead enforce least privilege at the component or interface level using proxies, runtime mediation, and controlled communication paths. Even components within the same application are treated as mutually untrusted, emphasizing fine-grained application-internal trust boundaries.
- Workload Identity-Centric Zero Trust for Cloud-Native Apps.Another line of research treats workloads themselves as first-class identities and bases application trust on verifiable workload identity rather than network location. In these approaches, services authenticate and authorize each other using workload identities, mutual authentication, and continuous verification. This enables secure application communication across domains without relying on centralized authentication infrastructure, representing a shift from infrastructure-centric to application-centric trust.
2.3.5. Data Pillar
- Data-sovereignty-preserving access control [26].Some studies emphasize that even when inter-domain collaboration is required, moving raw data itself constitutes a significant risk. These approaches preserve data sovereignty by minimizing disclosure, often exchanging only learned models, derived parameters, or summarized information instead of original data [27]. This reflects a Zero Trust interpretation in which data is not allowed to cross trust boundaries unless strictly necessary.
- Auditability- and traceability-focused data sharing.Other studies focus on scenarios where data movement is unavoidable and identify traceability and accountability—namely, who accessed the data, under what conditions, and when—as the central challenge. These approaches commonly rely on immutable logs or distributed ledgers to enable auditing and verification even in the absence of a trusted central authority.
- Confidentiality-centric data flow control.Another line of research shifts the center of protection away from networks or gateways and toward the data itself. These studies minimize plaintext exposure across the data lifecycle (storage, transmission, and processing) and enable access control, filtering, or search operations directly over encrypted data, extending the Zero Trust assumption that intermediaries should not be trusted into the data processing layer.
- Context-aware, data-centric access control.Some studies treat data access decisions not as static policy evaluations, but as dynamic processes driven by context. These approaches combine contextual factors—such as user attributes, environmental conditions, behavioral patterns, and domain state—to determine data access eligibility, while avoiding centralized decision-making and maintaining consistent enforcement in distributed environments.
2.3.6. Visibility & Analytics Pillar
- Trust-update-centric analytics loops.Some studies focus on directly linking behavior-based observations to immediate trust updates and policy adjustments. These approaches leverage existing security observation tools such as SIEM, IDS, and UBA, but go beyond simple alert generation by dynamically adjusting trust levels based on observed behavior. This category represents an operational realization of the Zero Trust principle of “always verify.”
- Immutable-record-based visibility assurance [29].Some studies question the reliability of visibility itself. Reliance on centralized log repositories or single analysis engines introduces risks such as data tampering and single points of failure. To address this, these studies employ blockchain or distributed ledgers to store behavioral records and analytical outcomes in an immutable form, enabling cross-domain verification. This category extends the Zero Trust assumption to the analytics layer by treating even analytical results as untrusted unless verifiable. However, the blockchain system itself is introducing different attack surfaces and privacy trade-offs. Thus, clear threat and defense mechanisms should be based when utilizing blockchain for auditability and cross-domain verification [29].
- Analytics-driven automated response.Another research direction treats visibility data not merely as a tool for post-incident analysis, but as input for automated decision-making and response. These studies integrate large-scale logs and operational data into centralized data lakes and apply AI or machine-learning techniques to detect anomalies or automate policy enforcement, enabling sustained Zero Trust operation by compensating for the limits of human intervention in complex multi-domain environments.
- High-performance trust analytics and decision-making.In CDS environments—particularly in control systems or real-time services—delays introduced during the analytics phase can themselves pose operational risks. To mitigate this, approaches such as parallel processing, optimized policy lookup, and lightweight trust evaluation models have been proposed. These works prioritize processing efficiency and latency reduction while maintaining actionable trust judgments.
- Self-adaptive analytics and policy generation.Finally, some studies move beyond fixed rules or predefined policies and propose self-evolving analytics and policy generation mechanisms that adapt to contextual changes. By correlating diverse observation data and applying rule learning or evidence fusion techniques, these approaches derive new policies dynamically, reflecting the evolving nature of threats and inter-domain collaboration patterns in CDS environments.
2.3.7. Automation & Orchestration Pillar
- Policy lifecycle-centric automation.Some studies focus on automating the security policy itself from a lifecycle perspective. Rather than treating policies as static rule sets, these approaches view them as evolving entities that undergo creation, deployment, modification, and retirement. Decision-making at each stage of the policy lifecycle is automated accordingly. This category extends the Zero Trust principle of continuous verification into the policy management and operation phase.
- Multi-domain collaborative automation.Some studies interpret automation in multi-domain environments as a trust orchestration problem. Instead of unilaterally extending policies from a single domain, these approaches exchange inter-domain trust information and threat intelligence to enable coordinated defense and joint response. This category reinterprets the boundary-control role of traditional CDS as a form of logical and dynamic orchestration rather than static enforcement.
- Survivable orchestration control structures.Some studies address the resilience and survivability of the automation layer itself as a core concern. Conventional automation systems risk complete security collapse if the centralized control plane is compromised. To mitigate this, these works employ techniques such as distributed consensus, replication, and integrity verification to protect the control plane. This category can be seen as applying Zero Trust principles not only to users and data, but also to the management and control plane.
- Intelligent security response automation.Another line of research aims to maximize the level of automation in incident response and security operations. Moving beyond static, predefined SOAR playbooks, these approaches propose agent-based automated response mechanisms capable of autonomous situation assessment and decision-making. By replacing or augmenting human analyst judgment, these approaches enable the rapid and repetitive verification and response required in Zero Trust environments.
- Zero-touch orchestration in trustless environments.Finally, some studies extend automation beyond the scope of a single organization and position it as an infrastructure for collaboration among mutually untrusted parties. These works leverage distributed ledgers, smart contracts, and Trusted Execution Environments (TEEs) to automate resource allocation, SLA verification, and policy enforcement while minimizing reliance on centralized intermediaries. This category is significant in that it presents automation as a new trust mechanism capable of replacing physical boundaries in CDS environments.
3. CDS Application Examples and Analysis by ZTA’s 7 Core Principles
3.1. Identity
3.1.1. Privacy-Preserving Zero Trust Identity Verification
3.1.2. Federated Zero Trust Authentication with Trust-Level Adaptation
3.1.3. Remotely Verified Zero Trust Federation
3.1.4. Continuous Zero Trust Authentication with Context Awareness
3.1.5. Non-Credential Continuous Zero Trust Authentication
3.1.6. Risk-Adaptive Zero Trust Authentication
3.2. Device
3.2.1. Continuous Zero Trust Device Verification
3.2.2. Cross-Domain Zero Trust Device Trust Inference
3.2.3. Hardware-Rooted Zero Trust Device Identity
3.2.4. State-Bound Zero Trust Device Authorization
3.2.5. Federated Zero Trust Device Trust Propagation
3.2.6. Zero Trust Device Onboarding
3.3. Network
3.3.1. Bidirectional Zero Trust CDS
3.3.2. Extreme Zero Trust by Physical Disconnection
3.3.3. Cloud-Native Zero Trust CDS
3.3.4. One-Way Boundary Zero Trust
3.4. Application
3.4.1. Stateful Zero Trust App Gateway
3.4.2. Cloud-Native Zero Trust CDS (Verified Isolation)
3.4.3. Federated Zero Trust Resource Sharing
3.4.4. Proxy-Mediated Zero Trust App Isolation
3.4.5. Workload-Identity Zero Trust for Microservices
3.5. Data
3.5.1. Data-Sovereign Zero Trust Access Control
3.5.2. Auditable Zero Trust Data Sharing
3.5.3. Confidentiality-Preserving Zero Trust Data Flow
3.5.4. Context-Aware Zero Trust Data Control
3.6. Visibility & Analytics
3.6.1. Predictive Zero Trust Analytics (Trust Update Loop)
3.6.2. Immutable Zero Trust Audit Trail
3.6.3. Zero-Touch Zero Trust Operations
3.6.4. Risk-Scored Zero Trust Decisions
3.6.5. Self-Adaptive Zero Trust Policy Generation
3.7. Automation & Orchestration
3.7.1. Zero Trust Policy Lifecycle Orchestration
3.7.2. Intent-Driven Zero Trust Orchestration
3.7.3. Survivable Zero Trust Control Plane
3.7.4. Autonomous Zero Trust Security Orchestration
3.7.5. Zero-Touch Zero Trust Orchestration
4. Future Work
5. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Huang, Y.; Li, Y.J.; Cai, Z. Security and Privacy in Metaverse: A Comprehensive Survey. Big Data Min. Anal. 2023, 6, 234–247. [Google Scholar] [CrossRef]
- Rose, S.; Borchert, O.; Mitchell, S.; Connelly, S. Zero Trust Architecture; NIST Special Publication 800-207; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2020. Available online: https://csrc.nist.gov/publications/detail/sp/800-207/final (accessed on 15 January 2026).
- Chandramouli, R.; Butcher, Z. A Zero Trust Architecture Model for Access Control in Cloud-Native Applications in Multi-Location Environments; NIST Special Publication 800-207A; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2023. Available online: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-207A.pdf (accessed on 31 December 2025).
- Department of Defense (DoD). Zero Trust Reference Architecture; Version 2.0; Defense Information Systems Agency (DISA) and National Security Agency (NSA) Zero Trust Engineering Team: Fort Meade, MD, USA, 2022.
- Cybersecurity and Infrastructure Security Agency (CISA). Zero Trust Maturity Model; Version 2.0; CISA: Washington, DC, USA, 2023. Available online: https://www.cisa.gov/sites/default/files/2023-04/zero_trust_maturity_model_v2_508.pdf (accessed on 15 January 2026).
- National Institute of Standards and Technology (NIST). Implementing a Zero Trust Architecture; Special Publication 1800-35; National Cybersecurity Center of Excellence (NCCoE), NIST: Gaithersburg, MD, USA, 2025. Available online: https://csrc.nist.gov/pubs/sp/1800/35/final (accessed on 15 January 2026).
- U.S. General Services Administration (GSA). Zero Trust Architecture (ZTA) Buyer’s Guide, 3rd ed.; GSA: Washington, DC, USA, 2024. Available online: https://www.gsa.gov/system/files/ZTA%20Buyer%27s%20Guide%20v3.2%20June%202025%20508%20reviewed.pdf (accessed on 15 January 2026).
- Cybersecurity and Infrastructure Security Agency (CISA). Applying Zero Trust Principles to Enterprise Mobility; CISA: Washington, DC, USA, 2022. Available online: https://www.cisa.gov/sites/default/files/publications/Zero_Trust_Principles_Enterprise_Mobility_For_Public_Comment_508C.pdf (accessed on 15 January 2026).
- National Security Agency (NSA). Advancing Zero Trust Maturity Throughout the Device Pillar; Cybersecurity Information Sheet (CSI); National Security Agency (NSA): Fort Meade, MD, USA, 2023. Available online: https://media.defense.gov/2023/Oct/19/2003323562/-1/-1/0/CSI-DEVICE-PILLAR-ZERO-TRUST.PDF (accessed on 31 December 2025).
- National Institute of Standards and Technology (NIST). Guide to Enterprise Patch Management Planning and Implementation; NIST Special Publication 800-40 Revision 4; National Institute of Standards and Technology (NIST): Gaithersburg, MD, USA, 2022. Available online: https://csrc.nist.gov/pubs/sp/800/40/r4/final (accessed on 31 December 2025).
- National Institute of Standards and Technology (NIST). Security and Privacy Controls for Information Systems and Organizations; NIST Special Publication 800-53 Revision 5 (Update 1); National Institute of Standards and Technology (NIST): Gaithersburg, MD, USA, 2020. Available online: https://csrc.nist.gov/pubs/sp/800/53/r5/upd1/final (accessed on 31 December 2025).
- Cybersecurity and Infrastructure Security Agency (CISA). BOD 23-01: Implementation Guidance for Improving Asset Visibility and Vulnerability Detection on Federal Networks; Cybersecurity and Infrastructure Security Agency (CISA): Washington, DC, USA, 2022. Available online: https://www.cisa.gov/news-events/directives/bod-23-01-implementation-guidance-improving-asset-visibility-and-vulnerability-detection-federal (accessed on 31 December 2025).
- Cybersecurity and Infrastructure Security Agency (CISA). Continuous Diagnostics and Mitigation (CDM) Program Technical Capabilities Volume 2 (v2.5); Cybersecurity and Infrastructure Security Agency (CISA): Washington, DC, USA, 2023. Available online: https://www.cisa.gov/sites/default/files/2023-08/CDM_Tech%20Volume2_v2.5.pdf (accessed on 31 December 2025).
- U.S. Department of Defense (DoD). Zero Trust Execution Road Map v1.1 (Data Tables); U.S. Department of Defense: Washington, DC, USA, 2022. Available online: https://dodcio.defense.gov/Portals/0/Documents/Library/ZT-CapabilitiesActivities.pdf (accessed on 15 January 2026).
- Department of Defense (DoD). Department of Defense Zero Trust Overlays; Version 1.1; Department of Defense: Washington, DC, USA, 2024. Available online: https://dodcio.defense.gov/Portals/0/Documents/Library/ZeroTrustOverlays.pdf (accessed on 15 January 2026).
- National Institute of Standards and Technology (NIST). Recommendation for Key Management: Part 1—General; NIST Special Publication 800-57 Part 1 Revision 5; National Institute of Standards and Technology (NIST): Gaithersburg, MD, USA, 2020. [CrossRef]
- National Institute of Standards and Technology (NIST). Guide to Protecting the Confidentiality of Personally Identifiable Information (PII); NIST Special Publication 800-122; National Institute of Standards and Technology (NIST): Gaithersburg, MD, USA, 2010. [CrossRef]
- Federal CIO Council; Federal CISO Council; Federal CDO Council. Federal Zero Trust Data Security Guide; Executive Office of the President: Washington, DC, USA, 2024. Available online: https://www.cio.gov/assets/files/Zero-Trust-Data-Security-Guide_Oct24-Final.pdf (accessed on 31 December 2025).
- National Security Agency (NSA). Advancing Zero Trust Maturity Throughout the Data Pillar; Cybersecurity Information Sheet (CSI); NSA: Fort Meade, MD, USA, 2024. Available online: https://media.defense.gov/2024/Apr/09/2003434442/-1/-1/0/CSI_DATA_PILLAR_ZT.PDF (accessed on 31 December 2025).
- National Institute of Standards and Technology (NIST). Volume I: Guide for Mapping Types of Information and Information Systems to Security Categories; NIST Special Publication 800-60 Volume I Revision 1; National Institute of Standards and Technology (NIST): Gaithersburg, MD, USA, 2008. Available online: https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-60v1r1.pdf (accessed on 31 December 2025).
- National Institute of Standards and Technology (NIST). Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations; NIST Special Publication 800-137; National Institute of Standards and Technology (NIST): Gaithersburg, MD, USA, 2011. Available online: https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-137.pdf (accessed on 31 December 2025). [CrossRef]
- National Security Agency (NSA). National Cross Domain Strategy & Management Office (NCDSMO): Raise the Bar. Available online: https://www.nsa.gov/Cybersecurity/Partnership/National-Cross-Domain-Strategy-Management-Office/ (accessed on 31 December 2025).
- National Institute of Standards and Technology (NIST). The NIST Cybersecurity Framework (CSF) 2.0; NIST CSWP 29; National Institute of Standards and Technology (NIST): Gaithersburg, MD, USA, 2024. Available online: https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.29.pdf (accessed on 31 December 2025).
- National Institute of Standards and Technology (NIST). Cross Domain Solution (CDS). CSRC Glossary. Available online: https://csrc.nist.gov/glossary/term/cross_domain_solution (accessed on 31 December 2025).
- Committee on National Security Systems (CNSS). CNSS Instruction (CNSSI) No. 4009; CNSS: Fort Meade, MD, USA, 2022.
- Zhang, K.; Tian, Z.; Cai, Z.; Seo, D. Link-Privacy Preserving Graph Embedding Data Publication with Adversarial Learning. Tsinghua Sci. Technol. 2022, 27, 244–256. [Google Scholar] [CrossRef]
- Pang, J.; Li, J.; Xie, Z.; Huang, Y.; Cai, Z. Collaborative City Digital Twin for the COVID-19 Pandemic: A Federated Learning Solution. Tsinghua Sci. Technol. 2021, 26, 759–771. [Google Scholar] [CrossRef]
- Hou, Q.; Han, M.; Cai, Z. Survey on Data Analysis in Social Media: A Practical Application Aspect. Big Data Min. Anal. 2020, 3, 259–279. [Google Scholar] [CrossRef]
- Chen, Y.; Chen, H.; Zhang, Y.; Han, M.; Siddula, M.; Cai, Z. A Survey on Blockchain Systems: Attacks, Defenses, and Privacy Preservation. High-Confid. Comput. 2022, 2, 100048. [Google Scholar] [CrossRef]
- Zhao, X.; Xia, F.; Xia, H.; Mao, Y.; Chen, S. A Zero-Knowledge-Proof-Based Anonymous and Revocable Scheme for Cross-Domain Authentication. Electronics 2024, 13, 2730. [Google Scholar] [CrossRef]
- Diaz Rivera, J.J.; Muhammad, A.; Song, W.-C. Securing Digital Identity in the Zero Trust Architecture: A Blockchain Approach to Privacy-Focused Multi-Factor Authentication. IEEE Open J. Commun. Soc. 2024, 5, 2792–2814. [Google Scholar] [CrossRef]
- Du, R.; Li, X.; Liu, Y. A Cross-Domain Authentication Scheme Based on Zero-Knowledge Proof. In Algorithms and Architectures for Parallel Processing; Lai, Y., Wang, T., Jiang, M., Xu, G., Liang, W., Castiglione, A., Eds.; Lecture Notes in Computer Science; Springer International Publishing: Cham, Switzerland, 2022; Volume 13156, pp. 647–664. [Google Scholar]
- Zhu, Q.; Chang, Y.; Zhao, K.; Zha, Y. A trust level based authentication mechanism crossing domains. In 2014 International Conference on Information and Communications Technologies (ICT 2014); IET: Stevenage UK, 2014. [Google Scholar] [CrossRef]
- Poirrier, A.; Cailleux, L.; Heide Clausen, T. Building a Zero Trust Federation. IEEE J. Sel. Areas Commun. 2025, 43, 2113–2125. [Google Scholar] [CrossRef]
- Kovacevic, I.; Stojkov, M.; Simic, M. Authentication and Identity Management Based on Zero Trust Security Model in Micro-cloud Environment. In Disruptive Information Technologies for a Smart Society (ICIST 2023), Kopaonik, Serbia, 12–15 March 2023; Trajanovic, M., Filipovic, N., Zdravkovic, M., Eds.; Lecture Notes in Networks and Systems; Springer: Cham, Switzerland, 2024; Volume 872, pp. 481–489. [Google Scholar] [CrossRef]
- Ma, X.; Fang, F.; Wang, X. Dynamic Authentication and Granularized Authorization with a Cross-Domain Zero Trust Architecture for Federated Learning in Large-Scale IoT Networks. arXiv 2025, arXiv:2501.03601. [Google Scholar]
- Li, K.; Bao, J.; Xie, X.; Hong, J.; Hua, C. Receiver-Agnostic Radio Frequency Fingerprint Identification for Zero-Trust Wireless Networks. IEEE J. Sel. Areas Commun. 2025, 43, 1981–1997. [Google Scholar] [CrossRef]
- Wu, X.; Zou, B.; Lu, C.; Wang, L.; Zhang, Y.; Wang, H. Dynamic Security Computing Framework With Zero Trust Based on Privacy Domain Prevention and Control Theory. IEEE J. Sel. Areas Commun. 2025, 43, 2266–2278. [Google Scholar] [CrossRef]
- Wu, K.; Shi, J.; Guo, Z.; Zhang, Z.; Cai, J. Research on Security Strategy of Power Internet of Things Devices Based on Zero-Trust. In Proceedings of the 2021 International Conference on Computer Engineering and Application (ICCEA), Kunming, China, 25–27 June 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 79–83. [Google Scholar]
- Wang, L.; Li, Y.; Zuo, L. Trust Management for IoT Devices Based on Federated Learning and Blockchain. J. Supercomput. 2025, 81, 232. [Google Scholar] [CrossRef]
- Elmaghbub, A.; Hamdaoui, B. Domain-Agnostic Hardware Fingerprinting-Based Device Identifier for Zero-Trust IoT Security. IEEE Wirel. Commun. 2024, 31, 42–48. [Google Scholar] [CrossRef]
- Díaz-Sánchez, D.; Almenarez-Mendoza, F.; Campo-Vázquez, C.; García-Rubio, C. Zero-Trust Token Authorization with Trapdoor Hashes for Scalable Distributed Firewalls. Future Gener. Comput. Syst. 2026, 176, 108227. [Google Scholar] [CrossRef]
- Li, D.; Yu, J.; Gao, X.; Al-Nabhan, N. Research on Multidomain Authentication of IoT Based on Cross-Chain Technology. Secur. Commun. Netw. 2020, 2020, 6679022. [Google Scholar] [CrossRef]
- Reaz, K.; Wunder, G. ASOP: A Sovereign and Secure Device Onboarding Protocol for Cloud-Based IoT Services. arXiv 2024, arXiv:2403.13020. [Google Scholar]
- Ansariyan, S.; Doostari, M. A Novel Bidirectional Distributed Cross Domain Solution Security Architecture. In Proceedings of the 2024 11th International Symposium on Telecommunications (IST), Tehran, Iran, 9 October 2024; IEEE: Piscataway, NJ, USA, 2024; pp. 627–636. [Google Scholar]
- Na, M.R.; Sundharakumar, K.B. A Study on Air-Gap Networks. In Proceedings of the 2024 5th International Conference on Innovative Trends in Information Technology (ICITIIT), Kottayam, India, 15 March 2024; IEEE: Piscataway, NJ, USA, 2024; pp. 1–6. [Google Scholar]
- Gurram, S. Cross-Domain Integration for Hybrid Cloud Management: Innovations and Future Directions. World J. Adv. Eng. Technol. Sci. 2025, 15, 1755–1761. [Google Scholar] [CrossRef]
- Arneson, S.; Şahin, D. Cyber Security Using Multi-Threaded Architecture Data Diode at the NBSR; Technical Report; American Nuclear Society: La Grange Park, IL, USA, 2017. [Google Scholar]
- Dahlstrom, J.; Taylor, S. Protecting Networks with Intelligent Diodes. Proc. Int. Conf. Cyber Warfare Secur. (ICCWS) 2022, 17, 45–54. [Google Scholar] [CrossRef]
- Borges de Freitas, M.; Rosa, L.; Cruz, T.; Simões, P. SDN-Enabled Virtual Data Diode; Springer International Publishing: Cham, Switzerland, 2018. [Google Scholar]
- Story, P. Building an Affordable Data Diode to Protect Journalists. In Proceedings of the Workshop on Privacy Engineering in Practice (PEP ’23), Anaheim, CA, USA, 6 August 2023; USENIX Association: Berkeley, CA, USA, 2023. [Google Scholar]
- Okhravi, H.; Sheldon, F.T. Data Diodes in Support of Trustworthy Cyber Infrastructure. In Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research, Oak Ridge, TN, USA, 21 April 2010; ACM: New York, NY, USA, 2010; pp. 1–4. [Google Scholar]
- Jones, D.W.; Bowersox, T.C. Secure Data Export and Auditing Using Data Diodes. Tech. Rep. 2006, 6, 7. [Google Scholar]
- Mahan, R.E.; Fluckiger, J.D.; Clements, S.L.; Tews, C.W.; Burnette, J.R.; Goranson, C.A.; Kirkham, H. Secure Data Transfer Guidance for Industrial Control and SCADA Systems; Report No. PNNL-20776; Pacific Northwest National Laboratory (PNNL): Richland, WA, USA, 2011.
- Choi, H.; Lee, J.; Lee, W.; Kwon, Y.; Myoung, N.; Park, M.; Song, J.-J. Cross Domain Solution With Stateful Correlation of Outgoing and Incoming Application-Layer Packets. IEEE Access 2024, 12, 26830–26838. [Google Scholar] [CrossRef]
- Daughety, N.; Pendleton, M.; Xu, S.; Njilla, L.; Franco, J. vCDS: A Virtualized Cross Domain Solution Architecture. In MILCOM 2021—2021 IEEE Military Communications Conference (MILCOM), San Diego, CA, USA, 29 November 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 61–68. [Google Scholar]
- Fysarakis, K.; Soultatos, O.; Manifavas, C.; Papaefstathiou, I.; Askoxylakis, I. XSACd—Cross-Domain Resource Sharing & Access Control for Smart Environments. Future Gener. Comput. Syst. 2018, 80, 572–582. [Google Scholar] [CrossRef]
- Xu, R.; Chen, Y.; Li, X.; Blasch, E. A Secure Dynamic Edge Resource Federation Architecture for Cross-Domain IoT Systems. In Proceedings of the 2022 International Conference on Computer Communications and Networks (ICCCN), Honolulu, HI, USA, 25–28 July 2022; IEEE: Piscataway, NJ, USA, 2022; pp. 1–7. [Google Scholar]
- Hsiao, S.-W.; Sun, Y.S.; Ao, F.-C.; Chen, M.C. A Secure Proxy-Based Cross-Domain Communication for Web Mashups. In Proceedings of the 2011 IEEE Ninth European Conference on Web Services (ECOWS), Lugano, Switzerland, 14–16 September 2011; IEEE: Piscataway, NJ, USA, 2011; pp. 57–64. [Google Scholar]
- Rajendran, R.N.; Anumula, S.K.; Rai, D.K.; Agrawal, S. Zero Trust Security Model Implementation in Microservices Architectures Using Identity Federation. arXiv 2025, arXiv:2511.04925. [Google Scholar] [CrossRef]
- Jonnakuti, S. Zero-Trust Architectures for Secure Multi-Cloud AI Workloads. Int. J. Lead. Res. Publ. 2021, 2, 88–97. [Google Scholar]
- Nguyen, T.D.; Gondree, M.A.; Shifflett, D.J.; Khosalim, J.; Levin, T.E.; Irvine, C.E. A Cloud-Oriented Cross-Domain Security Architecture. In Proceedings of the IEEE Military Communications Conference (MILCOM 2010), San Jose, CA, USA, 31 October–3 November 2010; IEEE: Piscataway, NJ, USA, 2010; pp. 441–447. [Google Scholar] [CrossRef][Green Version]
- Shonubi, J.A. Multi-Layered Zero Trust Architectures for Cross-Domain Data Protection in Federated Enterprise Networks and High-Risk Operational Environments. Int. J. Adv. Res. Publ. Rev. 2025, 2, 146–169. [Google Scholar] [CrossRef]
- Liu, Y.; Xing, X.; Tong, Z.; Lin, X.; Chen, J.; Guan, Z. Secure and Scalable Cross-Domain Data Sharing in Zero-Trust Cloud-Edge-End Environment Based on Sharding Blockchain. IEEE Trans. Dependable Secur. Comput. 2024, 21, 2603–2618. [Google Scholar] [CrossRef]
- Jiang, J.; Pei, T.; Chen, J.; Hou, Z. CDAS: A Secure Cross-Domain Data Sharing Scheme Based on Blockchain. Information 2025, 16, 394. [Google Scholar] [CrossRef]
- Luo, W.; Lv, Z.; Lai, C.; Yang, T. Efficient and secure cross-domain data sharing scheme with traceability for Industrial Internet. Comput. Netw. 2025, 260, 111117. [Google Scholar] [CrossRef]
- Guo, K.; Han, Y.; Wu, R.; Liu, K. CD-ABSE: Attribute-Based Searchable Encryption Scheme Supporting Cross-Domain Sharing on Blockchain. Wirel. Commun. Mob. Comput. 2022, 2022, 6719302. [Google Scholar] [CrossRef]
- Tinker, C.; Millar, K.; Kaminsky, A.; Kurdziel, M.T.; Lukowiak, M.; Radziszowski, S.P. Exploring the Application of Homomorphic Encryption to a Cross Domain Solution. In MILCOM 2019—2019 IEEE Military Communications Conference (MILCOM), Norfolk, VA, USA, 12–14 November 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 1–6. [Google Scholar] [CrossRef]
- Lemonnier, E.; El Hachem, J.; Touseau, L.; Buisson, J.; Belloir, N.; Wiorek, J.-F. Analysis of Access Control Mechanisms for a Dynamic and Decentralized Approach of Data-Centric Security (DCS). In Proceedings of the C&ESAR’24: Computer & Electronics Security Application Rendezvous, Rennes, France, 20–21 November 2024; Available online: https://2024.cesar-conference.org/program-media/CESAR-2024_paper-8811.pdf (accessed on 30 December 2025).
- Feng, Z.; Chen, Y.; Zhang, B.; Bu, F.; Wang, S.; Shao, Z.; Yu, Z. FlexiGuard: Self-Adaptive and Dynamic Context-Based Access Control for Cross-Domain Data Sharing. In Proceedings of the 20th International Conference on Mobility, Sensing and Networking (MSN 2024), Harbin, China, 20–22 December 2024; pp. 754–761. [Google Scholar] [CrossRef]
- Li, T.; Pan, Y.; Zhu, Q. Decision-Dominant Strategic Defense Against Lateral Movement for 5G Zero-Trust Multi-Domain Networks. In Network Security Empowered by Artificial Intelligence; Chen, Y., Wu, J., Yu, P., Wang, X., Eds.; Advances in Information Security; Springer Nature Switzerland: Cham, Switzerland, 2024; Volume 107, pp. 25–76. [Google Scholar]
- Plyler, K.; Tague, B.C.; Thomas, R.; Tsang, S. Tactical Cross-Domain Solutions: Current Status and the Need for Change. In MILCOM 2009–2009 IEEE Military Communications Conference, Boston, MA, USA, 18–21 October 2009; IEEE: Piscataway, NJ, USA, 2009; pp. 1–7. [Google Scholar]
- Wang, K.; Hong, Y.; Li, Y.; Yan, R.; Feng, J. A Distributed Zero-Trust Scheme for Airborne Wireless Sensor Networks Using Dynamic Identity Authentication. Sci. Rep. 2025, 15, 8036. [Google Scholar] [CrossRef]
- Carrozzo, G.; Siddiqui, M.S.; Betzler, A.; Bonnet, J.; Perez, G.M.; Ramos, A.; Subramanya, T. AI-Driven Zero-Touch Operations, Security and Trust in Multi-Operator 5G Networks: A Conceptual Architecture. In Proceedings of the 2020 European Conference on Networks and Communications (EuCNC), Dubrovnik, Croatia, 15–18 June 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 254–258. [Google Scholar]
- Li, X.; Zhang, S.; Zeng, J.; Li, S.; Yang, R. Enhancing Cross-Domain Access Efficiency in Zero-Trust Scenarios Oriented to the Access Process. In Proceedings of the 2025 International Conference on Electrical Automation and Artificial Intelligence (ICEAAI), Guangzhou, China, 10 January 2025; IEEE: Piscataway, NJ, USA, 2025; pp. 1400–1405. [Google Scholar]
- Giannopoulos, D.; Katsikas, G.P.; Trantzas, K.; Klonidis, D.; Tranoris, C.; Denazis, S.; Gifre, L.; Vilalta, R.; Alemany, P.; Muñoz, R.; et al. ACROSS: Automated Zero-Touch Cross-Layer Provisioning Framework for 5G and Beyond Vertical Services. In Proceedings of the Joint European Conference on Networks and Communications & 6G Summit (EuCNC/6G Summit), Gothenburg, Sweden, 6–9 June 2023; IEEE: Piscataway, NJ, USA, 2023; pp. 735–740. [Google Scholar] [CrossRef]
- Ghoraishi, M.; Siddiqui, M.S.; Compastié, M.; Mhiri, S.; Ntantos, C.; Kontoulis, M.; López, D.R.; Lioy, A.; Markakis, E.; Baskaran, S.B.M. iTrust6G: Zero-Trust Security for 6G Networks. In Proceedings of the 2024 IEEE Future Networks World Forum (FNWF), Dubai, United Arab Emirates, 15–17 October 2024; IEEE: Piscataway, NJ, USA, 2024; pp. 411–416. [Google Scholar]
- Ferretti, L.; Magnanini, F.; Andreolini, M.; Colajanni, M. Survivable Zero Trust for Cloud Computing Environments. Comput. Secur. 2021, 110, 102419. [Google Scholar] [CrossRef]
- Ismail; Kurnia, R.; Brata, Z.A.; Nelistiani, G.A.; Heo, S.; Kim, H.; Kim, H. Toward Robust Security Orchestration and Automated Response in Security Operations Centers with a Hyper-Automation Approach Using Agentic Artificial Intelligence. Information 2025, 16, 365. [Google Scholar] [CrossRef]
- Sai, A.M.; Wang, C.; Cai, Z.; Li, Y. Navigating the Digital Twin Network Landscape: A Survey on Architecture, Applications, Privacy and Security. High-Confid. Comput. 2024, 4, 100269. [Google Scholar] [CrossRef]











| Paper Title | Problem Setting in CDS Environment | CDS Application Approach | ZT Utilization Approach | Identity Perspective Core |
|---|---|---|---|---|
| A Zero-Knowledge-Proof-Based Anonymous and Revocable Authentication Scheme [30] | In a cross-domain environment, when authenticating, the problem of exposure of user/entity privacy and possibility of tracking. | Design of a structure that can combine anonymous authentication and post-hoc tracing without a central trusted party | Credential Verification | Zero-Knowledge Proof-based anonymous and revocable authentication mechanism |
| A Trust-Level-Based Authentication Mechanism for Crossing Domains [33] | Limitations of existing authentication that treats all entities with the same trust level when accessing between domains. | Dynamically adjust authentication strength and procedures according to trust level | Federated/Cross-Domain Authentication | Trust level-based stepwise authentication framework |
| Authentication and Identity Management Based on Zero Trust Security Model in Micro-Cloud Environment [35] | Single point of failure due to dependence on a central IdP in a multi-domain environment. | Redesign into a continuous verification structure by separating authentication and identity management | Continuous Authentication | ZT-based distributed authentication and ID management structure |
| Dynamic Authentication and Granularized Authorization with a Cross-Domain Zero Trust Architecture for Federated Learning in Large-Scale IoT Networks [36] | In cross-domain IoT, with session-unit authentication alone, it is not possible to block privilege abuse/lateral movement. | Link context-based authentication/authorization to re-evaluate during the session | Continuous Authentication | Context-aware dynamic authentication mechanism |
| Receiver-Agnostic Radio Frequency Fingerprint Identification for Zero-Trust Wireless Networks [37] | Session-based cryptographic authentication is not possible for continuous/real-time authentication. | Assist authentication across the entire session with physical-layer fingerprints | Continuous Authentication | Continuous authentication (RFFI) based on receiver-agnostic RF fingerprinting |
| Dynamic Security Computing Framework With Zero Trust Based on Privacy Domain Prevention and Control Theory [38] | In the authentication process, it is difficult to quantitatively evaluate privacy risks. | Automate risk evaluation → classification → response | Continuous Authentication | Framework based on authentication risk evaluation and prevention-control theory |
| Building a Zero Trust Federation [34] | In a federated environment, the problem of not being able to trust authentication results issued by other domains. | After verifying the generation environment of the authentication result, accept it for federation | Federated/Cross-Domain Authentication | Federated authentication trust structure based on remote verification |
| Securing Digital Identity in the Zero Trust Architecture: A Blockchain Approach to Privacy-Focused Multi-Factor Authentication [31] | Dependence on a central MFA server and authentication privacy infringement. | Blockchain-based distributed authenticator structure | Credential Verification | Privacy-preserving MFA based on Blockchain + ZKP |
| Paper Title | Problem Setting in CDS Environment | CDS Application Approach | ZT Utilization Approach | Device Perspective Core |
|---|---|---|---|---|
| Research on Security Strategy of Power Internet of Things Devices Based on Zero-Trust [39] | In a multi-domain structure where Power IoT is separated into operation, control, and field terminals, the assumption that the inside has the same trust is vulnerable. | Instead of domain/location-based trust, make access decisions based on device attributes, behavior, and traffic | Continuous Verification | Device profiling based on a Device Portrait + EID generation, SDN traffic baseline |
| Dynamic Authentication and Granularized Authorization with a Cross-Domain Zero Trust Architecture for Federated Learning in Large-Scale IoT Networks [36] | In large-scale cross-domain IoT, when domains move/interconnect, there are limitations of one-time authentication/authorization. | Share learning results by domain to distribute context prediction and dynamic policy decision-making | Continuous Verification | Device context/risk prediction based on DFL and performance/distribution-based weight adjustment |
| Domain-Agnostic Hardware Fingerprinting-Based Device Identifier for Zero-Trust IoT Security [41] | Due to channel/time/environment changes, the identification consistency of the same device decreases in each domain. | Secure ‘domain-independent’ identification stability with signal representations robust to domain changes. | Device Identity Establishment | Double-Sided EPS signal representation + EPS-CNN device identification framework |
| Zero-Trust Token Authorization with Trapdoor Hashes for Scalable Distributed Firewalls [42] | In distributed/multi-domain environments, central authorization/static firewalls have scalability and operational limitations. | Tokenize the device state-attestation results and verify them in distributed firewalls without central dependence | Continuous Verification | State-binding authorization token based on Trapdoor/Chameleon hash + non-interactive verification |
| Research on Multidomain Authentication of IoT Based on Cross-Chain Technology [43] | In multi-domain environments, device credential verification/sharing is disconnected at domain boundaries. | Perform inter-domain verification/consensus with a local chain–federation (alliance) chain structure | Trust Propagation | Cross-chain authentication structure and threshold-based distributed authentication |
| ASOP: A Sovereign and Secure Device Onboarding Protocol for Cloud-based IoT Services [44] | Onboarding between manufacturer–supply chain–cloud depends on pre-established trust. | Securely bootstrap device–cloud trust in a user-driven way | Trust Bootstrapping | ASOP onboarding protocol and registration based on one-time/temporary credentials (initial trust establishment) |
| Deep-Learning-Based Device Fingerprinting for Increased LoRa-IoT Security: Sensitivity to Network Deployment Changes [41] | With LoRa deployment/channel/receiver changes, trust in fingerprint-based identification is shaken. | Experimentally identify fingerprint applicability and ‘deployment change sensitivity’ (presenting field-application issues) | Device Identity Establishment | DL device fingerprint (CNN) based on OOB (out-of-band) spectrum + deployment-change sensitivity analysis |
| Building a Zero Trust Federation [34] | In a federation domain, the key issue is the reliability (provenance) of device attributes created by another domain. | Secure provenance trust for attributes by remotely verifying the attribute-issuing entity (IdM/CDM, etc.) | Trust Propagation | Verification of attribute-creation environment/system integrity based on Remote Attestation (provenance verification) |
| Trust Management for IoT Devices Based on Federated Learning and Blockchain [40] | In cross-domain IoT, malicious devices contaminate the trust model or forge/alter evaluation results. | Distributed learning of the trust model with FL + integrity/sharing of trust scores with blockchain | Continuous Verification | Derive an FL-based Trust Score + record/share via blockchain (ensure reputation/trust immutability) |
| Paper Title | Problem Setting in CDS Environment | CDS Application Approach | ZT Utilization Approach | Network Perspective Core |
|---|---|---|---|---|
| A Novel Bidirectional Distributed Cross Domain Solution Security Architecture [45] | In bidirectional communication between high/low security domains, risk of response forgery, re-injection, and reverse intrusio. | Distributed CDS structure + support for bidirectional data flow + state-based verification | Macro-segmentation, state-based threat response, request-response-based traffic control, distributed structure | Bidirectional CDS based on stateful correlation |
| A Study on Air-Gap Networks [46] | The external network connection itself is an attack path (if connected, intrusion/exfiltration is possible). | Complete separation of domains with a physical air-gap (remove the connection) | Physical network segmentation (separation), threat mitigation by pre-blocking method | Complete separation that removes communication (blocking type) |
| Cross-domain integration for hybrid cloud management: Innovations and future directions [47] | In linkage between hybrid clouds, risk of domain boundary collapse and spread. | Logical boundaries at the service/workload unit + policy-based integration (cloud-native) | Micro-segmentation (service), TLS, service-mesh-based traffic control | Logical CDS based on Service Mesh |
| Cyber Security using Multi-Threaded Architecture Data Diode at the NBSR [48] | Need to block reverse-direction intrusion and remote attacks into key facilities (control network). | Enforce one-way with a data diode + improve export efficiency with system processing (multi-threaded) | Macro-segmentation, reverse-direction blocking (Default Deny), one-way traffic management | Fundamentally block reverse intrusion with a one-way boundary |
| Protecting Networks with Intelligent Diodes [49] | A simple diode has difficulty blocking the inflow of format-violating/contaminated data. | Intelligent diode including hardware (FPGA)-based packet/payload verification | Default Deny, threat response based on real-time verification, only allowed formats pass, optional encryption | One-way control with format/syntax verification type |
| SDN-enabled Virtual Data Diode [50] | Lack of flexibility of physical diodes (difficult to change policy and expand operation). | Implement a virtual diode that enforces one-way via SDN flow rules | SDN-based micro-segmentation (flow), Default Deny, central policy control | Enforce one-way with SDN flow |
| Building an affordable data diode to protect journalists [51] | Safe outward export in a low-cost environment (prevent reverse intrusion/exfiltration). | Implement one-way export with a DIY/low-cost data diode | Macro-segmentation (physical separation), reverse-direction blocking, one-way traffic management | Low-cost one-way export |
| Data Diodes in Support of Trustworthy Cyber Infrastructure [52] | To protect ICS/PCN, minimize the risk of connections with corporate networks/outside. | Configure a one-way boundary centered on a diode + DMZ (traditional ICS pattern) | Zone-based macro-segmentation, one-way data flow | Traditional ICS one-way boundary |
| Secure Data Export and Auditing using Data Diodes [53] | Secure both safe data disclosure and auditability (transparency) at the same time. | One-way transfer + enhance ease of auditing with a simple/visible format (XML) | Complete reverse-direction blocking, one-way traffic management (simplification) | One-way CDS centered on auditability |
| Secure Data Transfer Guidance for Industrial Control and SCADA Systems [54] | Transfer between ICS/SCADA domains expands the attack surface (direct connection risk). | Transfer architecture guide based on Security Zone/DMZ/whitelist | Macro-segmentation (zone), threat response based on monitoring, encryption recommended, only allowed communications | Zone separation + only allowed communications (guide type) |
| Paper Title | Problem Setting in CDS Environment | CDS Application Approach | ZT Utilization Approach | Application Perspective Core |
|---|---|---|---|---|
| vCDS: A Virtualized Cross Domain Solution Architecture [56] | Existing CDSs are hard to use in general environments because they focus on defense; remote/cloud distribution is difficult due to reliance on physical equipment; verification is difficult because the inside is a black box. Price and accessibility are also low. | Virtualized CDS, domain-level traffic control | Workload isolation, least privilege | Based on a processor that inspects data flow (e.g., IDS/IPS or firewall), a CDS structure extensible to data sharing and cloud analysis environments is presented. |
| Cross Domain Solution with Stateful Correlation of Outgoing and Incoming Application-Layer Packets [55] | Industrial protocols follow a ‘request → response’ pattern, but existing equipment is hard to identify, making it difficult to respond to unsolicited responses. | Stateful CDS, bidirectional packet correlation | Continuous verification, micro-segmentation | Secure cross-communication by enforcing rules such as function code and ordering when communicating with smart grid/ICS control networks. |
| XSACd–Cross-domain resource sharing & access control for smart environments [57] | DPWS discovery/communication works mainly within the same network, so it is difficult to use across different domains, imposing major deployment constraints | Federated CDS, multi-cloud resource sharing | Identity-based access control, policy automation | Smart home/IoT shares device resources while extending fine-grained access control across domains. |
| A Secure Proxy-Based Cross-Domain Communication for Web Mashups [59] | Web browsers limit data exchange between different sources due to SOP, making desired interactions in client mashups difficult | Proxy-based CDS, web API isolation | Request authentication, sessionless verification | Minimizes developer code modification while enabling secure data exchange between sources in mashups. |
| Zero Trust Security Model Implementation in Microservices Architectures Using Identity Federation [60] | As services increase, communication paths become more complex | Microservice federation, service-to-service trust | Workload identity, continuous authentication | Tokens are obtained from API Gateway/BFF; internal authorization is managed as code via token exchange and OPA. |
| Zero-Trust Architectures for Secure MultiCloud AI Workloads [61] | Different environments use different authentication and logging methods, making unified security boundaries difficult. | Multi-cloud orchestration, federated identity | Workload protection, continuous monitoring | Bundles cloud-specific policies into common policies and a single flow for observation and response automation. |
| A Secure Dynamic Edge Resource Federation Architecture for Cross-Domain IoT Systems [58] | It is difficult to operate infrastructure where multiple domains communicate while meeting performance and security requirements. | Edge federation, blockchain-based CDS | Continuous authorization, adaptive access control | Resource orchestration becomes a security perimeter. |
| Paper Title | Problem Setting in CDS Environment | CDS Application Approach | ZT Utilization Approach | Data Perspective Core |
|---|---|---|---|---|
| Dynamic Authentication and Granularized Authorization with a Cross-Domain Zero Trust Architecture for Federated Learning in Large-Scale IoT Networks [36] | Continuous verification is needed for movement/access between domains, but context sharing (privacy, latency, overhead) is a bottleneck. | The boundary controls with an encrypted request → prior authorization → a one-time token | For every request, always verify with authentication + risk assessment + policy decision; implement least privilege | Minimize disclosure of the original data + protect with encryption, signatures, and one-time tokens |
| A Cloud-Oriented Cross-Domain Security Architecture [62] | Even with low-trust clients, inter-domain information flow (MAC) must be enforced. | Provide cross-domain services with a MYSEA (MLS) federation + a community cloud | Endpoints are less trusted; operate with policy-based access control + SSO/QoSS | By controlling data flows, secure convenience and policy compliance/QoSS at the same time |
| CD-ABSE: Attribute-Based Searchable Encryption Scheme Supporting Cross-Domain Sharing on Blockchain [67] | Securely support cross-domain sharing + search/access control at the same time. | Store in IPFS + manage the sharing flow with blockchain (contracts/index) | Use attribute-based policies for least privilege; strengthen auditability with the chain | Search over ciphertext (trapdoor) keeps plaintext undisclosed; aims at lattice-based security |
| Exploring the Application of Homomorphic Encryption to a Cross Domain Solution [68] | An untrusted gateway must route between domains without exposing the data/destination. | With homomorphic encryption, evaluate gateway bypass/routing conditions in the ciphertext state | Intermediaries are untrusted; even routers are assumed semi-trusted to minimize trust | Data is always encrypted; attach only required attributes and handle via ciphertext computation |
| Secure and Scalable Cross-Domain Data Sharing in Zero-Trust Cloud-Edge-End Environment Based on Sharding Blockchain [64] | Solve security fairness and scalability problems of untrusted cross-domain data sharing in a cloud-edge-end environment. | Distribute policy/transactions with a sharding-blockchain-based multi-domain architecture | Under the premise of mutual distrust, enforce sharing with partial-trust / full Zero Trust protocols | With Plaintext-Checkable Encryption for lightweight devices, verify ciphertext validity + protect data |
| Analyse des mécanismes de contrôle d’accès pour une approche dynamique et décentralisée du data-centric security (DCS) [69] | To protect everywhere in a data-centric security (DCS) way, dynamic + decentralized access control is needed, but existing methods only partially satisfy it. | Using requirements for dynamism/decentralization, classify candidates that combine access control, crypto-based methods, blockchain, etc. | A direction of data-proximate control that makes per-request decisions based on context and attributes, without assuming trust in the network/central authority | Protection unit = data; decentralization mitigates availability/single point of failure |
| FlexiGuard: Self-adaptive and Dynamic Context-based Access Control for Cross-domain Data Sharing [70] | For dual-level (governance/user) dynamic sharing, static models and continuous-verification performance are limited. | On DID + IPFS (CID) + chain, enforce with ILP rule learning, DS fusion, and VC + TEE | Update rules with behavior, network, and device context to always verify / granularly authorize | Bind (S,O,Op,C) rules + on-chain CID integrity/traceability + TEE confidential processing |
| Multi-Layered Zero Trust Architectures for Cross-Domain Data Protection in Federated Enterprise Networks and High Risk Operational Environments [63] | In a federated (multi-domain) environment, perimeter security is limited because of insiders, lateral movement, and APTs. | Use SDP + SSE + DID + a federated Trust Broker for inter-domain interoperability/policy enforcement | Context-based continuous verification + least privilege + micro-segmentation/behavior analysis | Protect data to where it goes with classification, tagging, encryption, and monitoring |
| Efficient and secure cross-domain data sharing scheme with traceability for Industrial Internet [66] | Because of attribute/policy mismatches by domain, single-domain ABE makes cross-domain sharing difficult; there are privacy and unauthorized-access risks. | Perform policy (attribute) transformation with TE-CP-ABE + proxy re-encryption, and a Domain Proxy relays cross-domain sessions | Proceed with the re-encryption/decryption flow only after mutual DP ID authentication + policy-based fine-grained control | Use hybrid encryption so only policy-satisfying parties can access + trace key misuse |
| CDAS: A Secure Cross-Domain Data Sharing Scheme Based on Blockchain [65] | In IIoT cross-domain sharing, trust between domains + security/privacy are the core hard problems. | Process sharing with an edge-proximate multi-layer blockchain + smart-contract ABAC/anonymous registration | Re-verify authorization for every request and block illegal access/duplicate requests with a minimum-trust approach | Store ciphertext data in IPFS + searchable encryption to search/transmit without exposing plaintext |
| Paper Title | Problem Setting in CDS Environment | CDS Application Approach | ZT Utilization Approach | Visibility & Analytics Perspective Core |
|---|---|---|---|---|
| Decision-Dominant Strategic Defense Against Lateral Movement for 5G Zero-Trust Multi-Domain Networks [71] | In a multi-domain environment, attacks (such as lateral movement) must be blocked with only partial observation. | Observation(logs/IDS/SIEM, etc.) → trust level update → dynamic defense loop leading to grant/deny | Activity logs, SIEM, threat analysis, UBA, dynamic policy | Observation-based trust update + dynamic policy |
| A distributed zero-trust scheme for airborne wireless sensor networks using dynamic identity authentication [73] | In airborne WSNs, trust collapses due to node compromise/spoofing. | Behavior data collection + RBD_chain (blockchain) immutable record + dynamic trust evaluation + SDP blocking | Activity logs, SIEM, threat analysis, UBA, dynamic policy | Behavior-based trust evaluation + immutable logs |
| AI-driven Zero-touch Operations, Security and Trust in Multi-operator 5G Networks: a Conceptual Architecture [74] | In multi-operator 5G, automation of trust/security/operations is needed. | Operational Data Lake + AI-based analysis + zero-touch automation (conceptual architecture) | Activity logs, SIEM, threat analysis, UBA, dynamic policy | Data Lake-based operational visibility + automation |
| Enhancing Cross-Domain Access Efficiency in Zero-Trust Scenarios Oriented to the Access Process [75] | The ZT access process is slow, causing efficiency/latency issues. | Trust calculation based on behavior, environment, and history attributes + grant/deny with a risk penalty | Activity logs, threat analysis, UBA, TI, dynamic policy | Trust calculation with behavior + environment + external TI |
| FlexiGuard: Self-adaptive and Dynamic Context-Based Access Control for Cross-Domain Data Sharing [70] | Policies break due to context changes, causing misuse/exposure. | Context collection → ILP rule learning → D–S evidence fusion → dynamic policy generation (blockchain management) | Activity logs, SIEM, threat analysis, UBA, dynamic policy | Context correlation/fusion → automatic policy generation |
| Tactical Cross-Domain Solutions: Current Status and the Need for Change [72] | Tactical CDS is manual/opaque/static policy, so speed, scalability, and auditability are lacking. | Need risk-aware processing + dynamic policy updates(improvement required) | Activity logs, threat analysis, UBA, TI, dynamic policy | Static CDS → demand for risk-based dynamic policy |
| A Secure Dynamic Edge Resource Federation Architecture for Cross-Domain IoT Systems [58] | Ensure integrity, audit, and trust in edge resource/slice federation. | Immutable records with an intra/inter-domain ledger + slice lifecycle management | Activity logs, threat analysis, UBA, dynamic policy | Ledger-based audit/traceability centered |
| Paper Title | Problem Setting in CDS Environment | CDS Application Approach | ZT Utilization Approach | Automation & Orchestration Perspective Core |
|---|---|---|---|---|
| ACROSS: Automated zero-touch cross-layer provisioning framework for 5G and beyond vertical services [76] | The management system is too complex to operate as a whole. Events flood in, and automation is insufficient. | Multi-domain integrated orchestration with end-to-end telemetry and AI-driven zero-touch provisioning | Trusted execution + policy-based security to enforce secure orchestration decisions | Monitoring data → AI detects anomalies or predicts signals → triggers automatic actions; also classifies task types and defines what should be automated |
| iTrust6G: Zero-Trust Security for 6G Networks [77] | Existing 6G security manages trust in one central place, which makes automated response difficult. | Distributed trust management across domains with AI-driven orchestration and intent-based policy control | Continuous verification with least privilege and micro-segmentation enforced dynamically. | AI observes threats and automatically performs response and recovery |
| Survivable zero trust for cloud computing environments [78] | Prior ZT research assumes the management/control system is safe, but an attacker can also compromise the management system. | Survivable control plane by distributing management functions and protecting policy/state storage and signaling | Apply ZT to the control plane itself, not only the data plane | Even if automatic configuration and policy deployment are attacked, the system can recover and keep operating |
| Toward Robust Security Orchestration and Automated Response with a Hyper-Automation Approach Using Agentic AI [79] | SOC needs automated response, but existing SOAR is tied to fixed playbooks; it struggles with complex cases and becomes hard to manage at scale. | Agentic AI generates and runs security workflows across tools instead of fixed playbooks | Validation + continuous monitoring to keep automated response accountable and controlled | Orchestrates multiple security tools together and reduces long procedures into a few core actions to improve operational efficiency |
| AI-driven Zero-touch Operations, Security and Trust in Multi-operator 5G Networks: a Conceptual Architecture [74] | In multi-operator 5G, it is hard to manage services end-to-end. Security, trust, and automation are still limited, so it is difficult to reach production-grade operations. | Cross-operator coordination using DLT + AI-driven service lifecycle automation. | Trust without a central party via ledger-based verification and automated policy execution | AI performs automation based on monitoring; also automates resource inventory and SLA checking |
| Zero Trust Security Model Implementation in Microservices Architectures Using Identity Federation [60] | In an AI network environment, IoT applications are hard to manage. | Multi-domain microservices | Continuous authorization | Policy automation. |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2026 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license.
Share and Cite
Lee, Y.; Lee, T.-k.; Ham, S.; Lee, Y.; Kim, Y.; Kim, W.; Chun, I.; Park, J. A Survey: ZTA Adoption in Cross-Domain Solutions—Seven-Pillar Perspective. Electronics 2026, 15, 563. https://doi.org/10.3390/electronics15030563
Lee Y, Lee T-k, Ham S, Lee Y, Kim Y, Kim W, Chun I, Park J. A Survey: ZTA Adoption in Cross-Domain Solutions—Seven-Pillar Perspective. Electronics. 2026; 15(3):563. https://doi.org/10.3390/electronics15030563
Chicago/Turabian StyleLee, Yeomin, Taek-kyu Lee, Sangkyu Ham, Yongjae Lee, Yujin Kim, Wonbin Kim, Ingeol Chun, and Jungsoo Park. 2026. "A Survey: ZTA Adoption in Cross-Domain Solutions—Seven-Pillar Perspective" Electronics 15, no. 3: 563. https://doi.org/10.3390/electronics15030563
APA StyleLee, Y., Lee, T.-k., Ham, S., Lee, Y., Kim, Y., Kim, W., Chun, I., & Park, J. (2026). A Survey: ZTA Adoption in Cross-Domain Solutions—Seven-Pillar Perspective. Electronics, 15(3), 563. https://doi.org/10.3390/electronics15030563

