Recently, more and more organizations have embraced the zero-trust technologies due to minimizing risk in enforcing accurate, least privilege per-request access decisions in service applications under the circumstance of a compromised network. In a zero-trust architecture, each access request should be authenticated and evaluated whether the request is permitted no matter it originated from external or internal network. In addition, unauthorized people from utilizing devices of authorized users to intrude other devices for lateral movement. Organizations need to evaluate trustworthiness of access requests based on user behaviours and threat intelligence and adapt associated access control policies. To date, the research community has stressed the importance of innovative technologies and integrated solutions for zero-trust.
This Research Topic solicits original and high-quality works on recent advances on the innovative technologies, challenges, and solutions for zero-trust. We aim to enhance the current state of development of zero-trust technologies including algorithms, methodologies, frameworks to evaluate risk of access requests for achieving zero trust and accordingly reduce potential cybersecurity risks.
Topics of interest include, but are not limited to:
• Trust evaluation algorithm for zero-trust
• Cyber threat intelligence for zero-trust
• Edge device risk evaluation for zero-trust
• Emerging innovative access control for zero-trust
• Access policies and selective restrictions for zero-trust
• Novel theories, architectures, applications and paradigms with zero-trust
• Practices and experiences for zero-trust architecture
• Security modelling for zero-trust architecture
• Privacy enhanced technologies for zero-trust
• Effectiveness evaluation and benchmark of zero-trust technologies
• Advances in the use of zero-trust underlying technologies (e.g., AI, blockchain, deterministic networks, cloud/edge computing, etc.)
• Miscellaneous issues for zero-trust
Keywords:
Zero Trust, Trustworthiness, Access Control, Risk Management, Security, Privacy
Important Note:
All contributions to this Research Topic must be within the scope of the section and journal to which they are submitted, as defined in their mission statements. Frontiers reserves the right to guide an out-of-scope manuscript to a more suitable section or journal at any stage of peer review.
Recently, more and more organizations have embraced the zero-trust technologies due to minimizing risk in enforcing accurate, least privilege per-request access decisions in service applications under the circumstance of a compromised network. In a zero-trust architecture, each access request should be authenticated and evaluated whether the request is permitted no matter it originated from external or internal network. In addition, unauthorized people from utilizing devices of authorized users to intrude other devices for lateral movement. Organizations need to evaluate trustworthiness of access requests based on user behaviours and threat intelligence and adapt associated access control policies. To date, the research community has stressed the importance of innovative technologies and integrated solutions for zero-trust.
This Research Topic solicits original and high-quality works on recent advances on the innovative technologies, challenges, and solutions for zero-trust. We aim to enhance the current state of development of zero-trust technologies including algorithms, methodologies, frameworks to evaluate risk of access requests for achieving zero trust and accordingly reduce potential cybersecurity risks.
Topics of interest include, but are not limited to:
• Trust evaluation algorithm for zero-trust
• Cyber threat intelligence for zero-trust
• Edge device risk evaluation for zero-trust
• Emerging innovative access control for zero-trust
• Access policies and selective restrictions for zero-trust
• Novel theories, architectures, applications and paradigms with zero-trust
• Practices and experiences for zero-trust architecture
• Security modelling for zero-trust architecture
• Privacy enhanced technologies for zero-trust
• Effectiveness evaluation and benchmark of zero-trust technologies
• Advances in the use of zero-trust underlying technologies (e.g., AI, blockchain, deterministic networks, cloud/edge computing, etc.)
• Miscellaneous issues for zero-trust
Keywords:
Zero Trust, Trustworthiness, Access Control, Risk Management, Security, Privacy
Important Note:
All contributions to this Research Topic must be within the scope of the section and journal to which they are submitted, as defined in their mission statements. Frontiers reserves the right to guide an out-of-scope manuscript to a more suitable section or journal at any stage of peer review.