Recently, an increasing number of organizations have adopted zero-trust technologies to minimize risks by enforcing precise, least-privilege access decisions for service applications, especially when networks are compromised. Within a zero-trust architecture, every access request, whether originating from an external or internal network, must be authenticated and evaluated for permission. This approach also prevents unauthorized individuals from using the devices of authorized users to access other devices for lateral movements. Organizations must assess the trustworthiness of access requests based on user behaviors and threat intelligence, adapting their access control policies accordingly. The research community has consistently emphasized the significance of innovative technologies and integrated solutions in the realm of zero-trust.
This special issue calls for original and high-quality works on the latest advancements, challenges, and solutions related to zero-trust. Our goal is to enhance the present state of zero-trust technology development, encompassing algorithms, methodologies, and frameworks. These advancements will assess the risk of access requests more effectively, achieving true zero trust, and consequently reducing potential cybersecurity risks. Topics of interest include, but are not limited to:
For author information and guidelines on submission criteria, please visit the OJ-CS Author Information page. Manuscripts should not be published or currently submitted for publication elsewhere. Please submit only full papers intended for review, not abstracts.
Important Submission Information:
As of 29 October 2024, the IEEE Open Journal of the Computer Society will use the IEEE Author Portal for all new submissions.
If you have any questions about the submission process, please contact the Editorial Office.
Contact the guest editors at khyeh@nycu.edu.tw.