dc.contributor.author | Vanickis, Roman | |
dc.contributor.author | Jacob, Paul | |
dc.contributor.author | Dehghanzadeh, Sohelia | |
dc.contributor.author | Lee, Brian | |
dc.date.accessioned | 2020-04-27T10:35:07Z | |
dc.date.available | 2020-04-27T10:35:07Z | |
dc.date.copyright | 2018 | |
dc.date.issued | 2018-06 | |
dc.identifier.citation | Vanickis, R., Jacob, P., Dehghanzadeh, S., Lee, B. (2018). Access control policy enforcement for zero-trust-networking. Published in 2018 29th Irish Signals and Systems Conference (ISSC). Belfast, 21-22 June 2018. 10.1109/ISSC.2018.8585365. | en_US |
dc.identifier.isbn | 978-1-5386-6046-1 | |
dc.identifier.other | Conferences - Software Research Institute - AIT | en_US |
dc.identifier.uri | http://research.thea.ie/handle/20.500.12065/3125 | |
dc.description.abstract | The evolution of the enterprise computing landscape towards emerging trends such as fog/edge computing and the Industrial Internet of Things (IIoT) are leading to a change of approach to securing computer networks to deal with challenges such as mobility, virtualized infrastructures, dynamic and heterogeneous user contexts and transaction-based interactions. The uncertainty introduced by such dynamicity introduces greater uncertainty into the access control process and motivates the need for risk-based access control decision making. Thus, the traditional perimeter-based security paradigm is increasingly being abandoned in favour of a so called "zero trust networking" (ZTN). In ZTN networks are partitioned into zones with different levels of trust required to access the zone resources depending on the assets protected by the zone. All accesses to sensitive information is subject to rigorous access control based on user and device profile and context. In this paper we outline a policy enforcement framework to address many of open challenges for risk-based access control for ZTN. We specify the design of required policy languages including a generic firewall policy language to express firewall rules. We design a mechanism to map these rules to specific firewall syntax and to install the rules on the firewall. We show the viability of our design with a small proof-of-concept. | en_US |
dc.format | PDF | en_US |
dc.language.iso | en | en_US |
dc.publisher | IEEE | en_US |
dc.relation.ispartof | : 2018 29th Irish Signals and Systems Conference (ISSC) | en_US |
dc.rights | Attribution-NonCommercial-NoDerivs 3.0 Ireland | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/ie/ | * |
dc.subject | Zero trust networking | en_US |
dc.subject | Risk-based access control | en_US |
dc.subject | Trust | en_US |
dc.subject | Policy enforcement | en_US |
dc.subject | Firewall | en_US |
dc.subject | Network zone | en_US |
dc.subject | Micro-segment | en_US |
dc.title | Access control policy enforcement for zero-trust-networking. | en_US |
dc.type | Other | en_US |
dc.description.funding | This paper has received funding from the European Union’s
Horizon 2020 research and innovation programme under grant
agreement 700071 | |
dc.description.peerreview | yes | en_US |
dc.identifier.conference | 2018 29th Irish Signals and Systems Conference (ISSC), 20-21 June 2018, Belfast. | |
dc.identifier.doi | doi: 10.1109/ISSC.2018.8585365 | |
dc.identifier.orcid | https://orcid.org/0000-0001-5090-2756 | |
dc.identifier.orcid | https://orcid.org/0000-0002-8475-4074 | |
dc.rights.access | Open Access | en_US |
dc.subject.department | Software Research Institute AIT | en_US |