Call for Papers: Special Section on Exploring Emerging Technologies in the Zero Trust Landscape: Challenges and Solutions

IEEE OJ CS seeks submissions for this upcoming special issue.
Share this on:
Submissions Due: 31 October 2024

Recently, an increasing number of organizations have adopted zero-trust technologies to minimize risks by enforcing precise, least-privilege access decisions for service applications, especially when networks are compromised.  Within a zero-trust architecture, every access request, whether originating from an external or internal network, must be authenticated and evaluated for permission. This approach also prevents unauthorized individuals from using the devices of authorized users to access other devices for lateral movements.  Organizations must assess the trustworthiness of access requests based on user behaviors and threat intelligence, adapting their access control policies accordingly. The research community has consistently emphasized the significance of innovative technologies and integrated solutions in the realm of zero-trust. 

This special issue calls for original and high-quality works on the latest advancements, challenges, and solutions related to zero-trust. Our goal is to enhance the present state of zero-trust technology development,  encompassing algorithms, methodologies, and frameworks. These advancements will assess the risk of access requests more effectively,  achieving true zero trust, and consequently reducing potential cybersecurity risks. Topics of interest include, but are not limited to: 

  • Trust Evaluation Algorithms in Zero-Trust Frameworks
  • Cyber Threat Intelligence in the Context of Zero-Trust 
  • Risk Evaluation of Edge Devices for Zero-Trust 
  • Innovations in Access Control for Zero-Trust Systems 
  • Access Policies and Selective Restrictions within Zero-Trust Models
  • Novel Theories, Architectures, Applications, and Paradigms in Zero-Trust 
  • Best Practices and Experiences in Zero-Trust Architecture Implementation 
  • Security Modeling within Zero-Trust Architectures 
  • Privacy-Enhancing Technologies in Zero-Trust Environments
  • Evaluating the Effectiveness and Benchmarking of Zero-Trust
  • Technologies 
  • Advances in Technologies Underpinning Zero-Trust (e.g., AI, Blockchain, Deterministic Networks, Cloud/Edge Computing, etc.) 
  • Miscellaneous Challenges and Considerations in Zero-Trust 

Submission Guidelines

For author information and guidelines on submission criteria, please visit the OJ-CS Author Information page. Please submit papers through the ScholarOne Manuscripts system, and be sure to select the special-section name. Manuscripts should not be published or currently submitted for publication elsewhere. Please submit only full papers intended for review, not abstracts, to the ScholarOne portal.


Questions?

Contact the guest editors at khyeh@nycu.edu.tw.

  • Prof. Kuo-Hui Yeh (Lead Guest Editor), National Yang Ming Chiao Tung University, Taiwan
  • Prof. Yingjiu Li, the University of Oregon, US
  • Prof. Weizhi Meng,  Technical University of Denmark, Denmark
  • Prof. Zhiyuan Tan, Edinburgh Napier University, United Kingdom
  • Prof. Shi-Cho Cha, National Taiwan University of Science and Technology, Taiwan  
  • Prof. Yang Xiang (IEEE fellow), Swinburne University of Technology, Australia