Description |
Recently, an increasing number of organizations have adopted zero-trust technologies to minimize risks by enforcing precise, least-privilege access decisions for service applications, especially when networks are compromised. Within a zero-trust architecture, every access request, whether originating from an external or internal network, must be authenticated and evaluated for permission. This approach also prevents unauthorized individuals from using the devices of authorized users to access other devices for lateral movements. Organizations must assess the trustworthiness of access requests based on user behaviors and threat intelligence, adapting their access control policies accordingly. The research community has consistently emphasized the significance of innovative technologies and integrated solutions in the realm of zero-trust.
This special issue calls for original and high-quality works on the latest advancements, challenges, and solutions related to zero-trust. Our goal is to enhance the present state of zero-trust technology development, encompassing algorithms, methodologies, and frameworks. These advancements will assess the risk of access requests more effectively, achieving true zero trust, and consequently reducing potential cybersecurity risks. Topics of interest include, but are not limited to:
Trust Evaluation Algorithms in Zero-Trust Frameworks
Cyber Threat Intelligence in the Context of Zero-Trust
Risk Evaluation of Edge Devices for Zero-Trust
Innovations in Access Control for Zero-Trust Systems
Access Policies and Selective Restrictions within Zero-Trust Models
Novel Theories, Architectures, Applications, and Paradigms in Zero-Trust
Best Practices and Experiences in Zero-Trust Architecture Implementation
Security Modeling within Zero-Trust Architectures
Privacy-Enhancing Technologies in Zero-Trust Environments
Evaluating the Effectiveness and Benchmarking of Zero-Trust
Technologies
Advances in Technologies Underpinning Zero-Trust (e.g., AI, Blockchain, Deterministic Networks, Cloud/Edge Computing, etc.)
Miscellaneous Challenges and Considerations in Zero-Trust
Submission Guidelines
For author information and guidelines on submission criteria, please visit the OJ-CS Author Information page. Please submit papers through the ScholarOne Manuscripts system, and be sure to select the special-section name. Manuscripts should not be published or currently submitted for publication elsewhere. Please submit only full papers intended for review, not abstracts, to the ScholarOne portal.
Questions?
Contact the guest editors at khyeh@nycu.edu.tw.
Prof. Kuo-Hui Yeh (Lead Guest Editor), National Yang Ming Chiao Tung University, Taiwan
Prof. Yingjiu Li, the University of Oregon, US
Prof. Weizhi Meng, Technical University of Denmark, Denmark
Prof. Zhiyuan Tan, Edinburgh Napier University, United Kingdom
Prof. Shi-Cho Cha, National Taiwan University of Science and Technology, Taiwan
Prof. Yang Xiang (IEEE fellow), Swinburne University of Technology, Australia |