Research Article

A Maturity Framework for Zero-Trust Security in Multiaccess Edge Computing

Figure 4

Flow working principles.