I argue that data-centric zero-trust should be a priority and implemented as a cryptographic framework where protection ...
Contrast with application centric. See document management system. THIS DEFINITION IS FOR PERSONAL USE ONLY. All other reproduction requires permission.