• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE
CS Logo
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
CS Logo

0

IEEE Computer Society Logo
Sign up for our newsletter
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2025 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

  • Home
  • /Digital Library
  • /Journals
  • /Oj
  • Home
  • / ...
  • /Journals
  • /Oj

Call for Papers: Special Section on Exploring Emerging Technologies in the Zero Trust Landscape: Challenges and Solutions

IEEE OJ CS seeks submissions for this upcoming special issue.

Recently, an increasing number of organizations have adopted zero-trust technologies to minimize risks by enforcing precise, least-privilege access decisions for service applications, especially when networks are compromised.  Within a zero-trust architecture, every access request, whether originating from an external or internal network, must be authenticated and evaluated for permission. This approach also prevents unauthorized individuals from using the devices of authorized users to access other devices for lateral movements.  Organizations must assess the trustworthiness of access requests based on user behaviors and threat intelligence, adapting their access control policies accordingly. The research community has consistently emphasized the significance of innovative technologies and integrated solutions in the realm of zero-trust. 

This special issue calls for original and high-quality works on the latest advancements, challenges, and solutions related to zero-trust. Our goal is to enhance the present state of zero-trust technology development,  encompassing algorithms, methodologies, and frameworks. These advancements will assess the risk of access requests more effectively,  achieving true zero trust, and consequently reducing potential cybersecurity risks. Topics of interest include, but are not limited to: 

  • Trust Evaluation Algorithms in Zero-Trust Frameworks
  • Cyber Threat Intelligence in the Context of Zero-Trust 
  • Risk Evaluation of Edge Devices for Zero-Trust 
  • Innovations in Access Control for Zero-Trust Systems 
  • Access Policies and Selective Restrictions within Zero-Trust Models
  • Novel Theories, Architectures, Applications, and Paradigms in Zero-Trust 
  • Best Practices and Experiences in Zero-Trust Architecture Implementation 
  • Security Modeling within Zero-Trust Architectures 
  • Privacy-Enhancing Technologies in Zero-Trust Environments
  • Evaluating the Effectiveness and Benchmarking of Zero-Trust
  • Technologies 
  • Advances in Technologies Underpinning Zero-Trust (e.g., AI, Blockchain, Deterministic Networks, Cloud/Edge Computing, etc.) 
  • Miscellaneous Challenges and Considerations in Zero-Trust 


Submission Guidelines

For author information and guidelines on submission criteria, please visit the OJ-CS Author Information page. Manuscripts should not be published or currently submitted for publication elsewhere. Please submit only full papers intended for review, not abstracts.

Important Submission Information:

As of 29 October 2024, the IEEE Open Journal of the Computer Society will use the IEEE Author Portal for all new submissions.

  • If you have not yet started the submission process, please use the IEEE Author Portal to submit your article
  • If you started a draft of your submission to the special section through ScholarOne Manuscripts or if you submitted your paper through ScholarOne Manuscripts and it was returned to draft for updates, your draft will still be available in the ScholarOne Manuscripts system and you may complete the submission there.

If you have any questions about the submission process, please contact the Editorial Office.


Questions?

Contact the guest editors at khyeh@nycu.edu.tw.

  • Prof. Kuo-Hui Yeh (Lead Guest Editor), National Yang Ming Chiao Tung University, Taiwan
  • Prof. Yingjiu Li, the University of Oregon, US
  • Prof. Weizhi Meng,  Technical University of Denmark, Denmark
  • Prof. Zhiyuan Tan, Edinburgh Napier University, United Kingdom
  • Prof. Shi-Cho Cha, National Taiwan University of Science and Technology, Taiwan  
  • Prof. Yang Xiang (IEEE fellow), Swinburne University of Technology, Australia

LATEST NEWS
IEEE Reveals 2026 Predictions for Top Technology Trends 
IEEE Reveals 2026 Predictions for Top Technology Trends 
7 Best Practices for Secure Software Engineering in 2026
7 Best Practices for Secure Software Engineering in 2026
Muzeeb Mohammad: IEEE Computer Society Leader in Cloud Tech
Muzeeb Mohammad: IEEE Computer Society Leader in Cloud Tech
Setting the Standard: How SWEBOK Helps Organizations Build Reliable and Future-Ready Teams
Setting the Standard: How SWEBOK Helps Organizations Build Reliable and Future-Ready Teams
Computing’s Top 30: Bala Siva Sai Akhil Malepati
Computing’s Top 30: Bala Siva Sai Akhil Malepati
Read Next

IEEE Reveals 2026 Predictions for Top Technology Trends 

7 Best Practices for Secure Software Engineering in 2026

Muzeeb Mohammad: IEEE Computer Society Leader in Cloud Tech

Setting the Standard: How SWEBOK Helps Organizations Build Reliable and Future-Ready Teams

Computing’s Top 30: Bala Siva Sai Akhil Malepati

The Art of Code Meets the Standards of Science: Why SWEBOK Matters

Re-Engineering Cloud-Native Principles for Safety-Critical Software Systems

Reliability as a First-Class Software Engineering Requirement

FacebookTwitterLinkedInInstagramYoutube
Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter