Submission Deadline: 30 May 2024 (closed) View: 153
In recent times, a growing number of organizations are turning to zero-trust technologies. Their aim is to mitigate risks by strictly enforcing least-privilege access decisions, particularly when their networks face threats. Within this zero-trust framework, every access request, whether from within the organization or outside, must undergo authentication and be scrutinized for proper permissions. This not only ensures access legitimacy but also deters unauthorized individuals from leveraging devices of legitimate users for lateral movements within the network. Hence, it's crucial for organizations to gauge the trustworthiness of each access request, drawing insights from user behavior and threat intelligence. They must then refine their access control policies based on these assessments. The research community has persistently highlighted the vital role of pioneering technologies and comprehensive solutions in advancing the zero-trust paradigm.
This special issue invites submissions of original, high-quality research on the latest developments, challenges, and solutions in the realm of zero-trust. Our aim is to push the boundaries of current zero-trust technology, embracing innovations in algorithms, methodologies, and frameworks. Through these advancements, we hope to evaluate the risk of access requests with greater precision, truly embodying the zero-trust ethos and, in turn, diminishing potential cybersecurity threats. We welcome topics of interest that encompass, but are not limited to:
Trust Evaluation Algorithms for Zero-Trust Frameworks
Cyber Threat Intelligence within Zero-Trust Contexts
Risk Assessment of Edge Devices in Zero-Trust Scenarios
Innovative Access Control Mechanisms in Zero-Trust Systems
Designing Access Policies and Enforcing Selective Restrictions in Zero-Trust Models
Emerging Theories, Architectures, Applications, and Paradigms in the Zero-Trust Domain
Best Practices and Insights from Zero-Trust Architecture Deployments
Security Modeling Techniques for Zero-Trust Architectures
Employing Privacy-Enhancing Technologies in Zero-Trust Settings
Measuring and Benchmarking the Efficacy of Zero-Trust Technologies
Cutting-Edge Technologies Shaping Zero-Trust (e.g., AI, Blockchain, Deterministic Networks, Cloud/Edge Computing)
Diverse Challenges and Aspects of Zero-Trust Implementation