Special lssues
Table of Content

Exploring the Frontier of Zero-Trust Technologies: Overcoming Challenges and Innovating Solutions

Submission Deadline: 30 May 2024 Submit to Special Issue

Guest Editors

Dr. Kuo-Hui Yeh, National Dong Hwa University, Taiwan
Dr. Weizhi Meng, Technical University of Denmark, Denmark
Dr. Zhiyuan Tan, Edinburgh Napier University, United Kingdom
Dr. Shi-Cho Cha, National Taiwan University of Science and Technology, Taiwan

Summary

In recent times, a growing number of organizations are turning to zero-trust technologies. Their aim is to mitigate risks by strictly enforcing least-privilege access decisions, particularly when their networks face threats. Within this zero-trust framework, every access request, whether from within the organization or outside, must undergo authentication and be scrutinized for proper permissions. This not only ensures access legitimacy but also deters unauthorized individuals from leveraging devices of legitimate users for lateral movements within the network. Hence, it's crucial for organizations to gauge the trustworthiness of each access request, drawing insights from user behavior and threat intelligence. They must then refine their access control policies based on these assessments. The research community has persistently highlighted the vital role of pioneering technologies and comprehensive solutions in advancing the zero-trust paradigm.

 

This special issue invites submissions of original, high-quality research on the latest developments, challenges, and solutions in the realm of zero-trust. Our aim is to push the boundaries of current zero-trust technology, embracing innovations in algorithms, methodologies, and frameworks. Through these advancements, we hope to evaluate the risk of access requests with greater precision, truly embodying the zero-trust ethos and, in turn, diminishing potential cybersecurity threats. We welcome topics of interest that encompass, but are not limited to:

 

Trust Evaluation Algorithms for Zero-Trust Frameworks

Cyber Threat Intelligence within Zero-Trust Contexts

Risk Assessment of Edge Devices in Zero-Trust Scenarios

Innovative Access Control Mechanisms in Zero-Trust Systems

Designing Access Policies and Enforcing Selective Restrictions in Zero-Trust Models

Emerging Theories, Architectures, Applications, and Paradigms in the Zero-Trust Domain

Best Practices and Insights from Zero-Trust Architecture Deployments

Security Modeling Techniques for Zero-Trust Architectures

Employing Privacy-Enhancing Technologies in Zero-Trust Settings

Measuring and Benchmarking the Efficacy of Zero-Trust Technologies

Cutting-Edge Technologies Shaping Zero-Trust (e.g., AI, Blockchain, Deterministic Networks, Cloud/Edge Computing)

Diverse Challenges and Aspects of Zero-Trust Implementation


Keywords

Zero Trust, Trustworthiness, Access Control, Risk Management, Security, Privacy

Share Link