Recently, an increasing number of organizations have adopted zero-trust technologies to minimize risks by enforcing precise, least-privilege access decisions for service applications, especially when networks are compromised. Within a zero-trust architecture, every access request, whether originating from an external or internal network, must be authenticated and evaluated for permission. This approach also prevents unauthorized individuals from using the devices of authorized users to access other devices for lateral movements. Organizations must assess the trustworthiness of access requests based on user behaviors and threat intelligence, adapting their access control policies accordingly. The research community has consistently emphasized the significance of innovative technologies and integrated solutions in the realm of zero-trust.
This special issue calls for original and high-quality works on the latest advancements, challenges, and solutions related to zero-trust. Our goal is to enhance the present state of zero-trust technology development, encompassing algorithms, methodologies, and frameworks. These advancements will assess the risk of access requests more effectively, achieving true zero trust, and consequently reducing potential cybersecurity risks. Topics of interest include, but are not limited to:
- Trust Evaluation Algorithms in Zero-Trust Frameworks
- Cyber Threat Intelligence in the Context of Zero-Trust
- Risk Evaluation of Edge Devices for Zero-Trust
- Innovations in Access Control for Zero-Trust Systems
- Access Policies and Selective Restrictions within Zero-Trust Models
- Novel Theories, Architectures, Applications, and Paradigms in Zero-Trust
- Best Practices and Experiences in Zero-Trust Architecture Implementation
- Security Modeling within Zero-Trust Architectures
- Privacy-Enhancing Technologies in Zero-Trust Environments
- Evaluating the Effectiveness and Benchmarking of Zero-Trust
- Technologies
- Advances in Technologies Underpinning Zero-Trust (e.g., AI, Blockchain, Deterministic Networks, Cloud/Edge Computing, etc.)
- Miscellaneous Challenges and Considerations in Zero-Trust
Submission Guidelines
For author information and guidelines on submission criteria, please visit the OJ-CS Author Information page. Manuscripts should not be published or currently submitted for publication elsewhere. Please submit only full papers intended for review, not abstracts.
Important Submission Information:
As of 29 October 2024, the IEEE Open Journal of the Computer Society will use the IEEE Author Portal for all new submissions.
- If you have not started the submission process through ScholarOne Manuscripts, please use the IEEE Author Portal
- If you started a draft of your submission to the special section through ScholarOne Manuscripts or if you submitted your paper through ScholarOne Manuscripts and it was returned to draft for updates, your draft will still be available in the ScholarOne Manuscripts system and you may complete the submission there.
If you have any questions about the submission process, please contact the Editorial Office.
Questions?
Contact the guest editors at khyeh@nycu.edu.tw.
- Prof. Kuo-Hui Yeh (Lead Guest Editor), National Yang Ming Chiao Tung University, Taiwan
- Prof. Yingjiu Li, the University of Oregon, US
- Prof. Weizhi Meng, Technical University of Denmark, Denmark
- Prof. Zhiyuan Tan, Edinburgh Napier University, United Kingdom
- Prof. Shi-Cho Cha, National Taiwan University of Science and Technology, Taiwan
- Prof. Yang Xiang (IEEE fellow), Swinburne University of Technology, Australia