Show simple item record

dc.contributor.authorVanickis, Roman
dc.contributor.authorJacob, Paul
dc.contributor.authorDehghanzadeh, Sohelia
dc.contributor.authorLee, Brian
dc.date.accessioned2020-04-27T10:35:07Z
dc.date.available2020-04-27T10:35:07Z
dc.date.copyright2018
dc.date.issued2018-06
dc.identifier.citationVanickis, R., Jacob, P., Dehghanzadeh, S., Lee, B. (2018). Access control policy enforcement for zero-trust-networking. Published in 2018 29th Irish Signals and Systems Conference (ISSC). Belfast, 21-22 June 2018. 10.1109/ISSC.2018.8585365.en_US
dc.identifier.isbn978-1-5386-6046-1
dc.identifier.otherConferences - Software Research Institute - AITen_US
dc.identifier.urihttp://research.thea.ie/handle/20.500.12065/3125
dc.description.abstractThe evolution of the enterprise computing landscape towards emerging trends such as fog/edge computing and the Industrial Internet of Things (IIoT) are leading to a change of approach to securing computer networks to deal with challenges such as mobility, virtualized infrastructures, dynamic and heterogeneous user contexts and transaction-based interactions. The uncertainty introduced by such dynamicity introduces greater uncertainty into the access control process and motivates the need for risk-based access control decision making. Thus, the traditional perimeter-based security paradigm is increasingly being abandoned in favour of a so called "zero trust networking" (ZTN). In ZTN networks are partitioned into zones with different levels of trust required to access the zone resources depending on the assets protected by the zone. All accesses to sensitive information is subject to rigorous access control based on user and device profile and context. In this paper we outline a policy enforcement framework to address many of open challenges for risk-based access control for ZTN. We specify the design of required policy languages including a generic firewall policy language to express firewall rules. We design a mechanism to map these rules to specific firewall syntax and to install the rules on the firewall. We show the viability of our design with a small proof-of-concept.en_US
dc.formatPDFen_US
dc.language.isoenen_US
dc.publisherIEEEen_US
dc.relation.ispartof: 2018 29th Irish Signals and Systems Conference (ISSC)en_US
dc.rightsAttribution-NonCommercial-NoDerivs 3.0 Ireland*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/ie/*
dc.subjectZero trust networkingen_US
dc.subjectRisk-based access controlen_US
dc.subjectTrusten_US
dc.subjectPolicy enforcementen_US
dc.subjectFirewallen_US
dc.subjectNetwork zoneen_US
dc.subjectMicro-segmenten_US
dc.titleAccess control policy enforcement for zero-trust-networking.en_US
dc.typeOtheren_US
dc.description.fundingThis paper has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement 700071
dc.description.peerreviewyesen_US
dc.identifier.conference2018 29th Irish Signals and Systems Conference (ISSC), 20-21 June 2018, Belfast.
dc.identifier.doidoi: 10.1109/ISSC.2018.8585365
dc.identifier.orcidhttps://orcid.org/0000-0001-5090-2756
dc.identifier.orcidhttps://orcid.org/0000-0002-8475-4074
dc.rights.accessOpen Accessen_US
dc.subject.departmentSoftware Research Institute AITen_US


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record

Attribution-NonCommercial-NoDerivs 3.0 Ireland
Except where otherwise noted, this item's license is described as Attribution-NonCommercial-NoDerivs 3.0 Ireland