SoK: context and risk aware access control for zero trust systems
Date
2022-06-30Author
Xiao, Shiyn
Ye, Yuhang
Kanwal, Nadia
Newe, Thomas
Lee, Brian
Metadata
Show full item recordAbstract
Evolving computing technologies such as cloud, edge computing, and the Internet of )ings (IoT) are creating a more complex,
dispersed, and dynamic enterprise operational environment. New security enterprise architectures such as those based on the
concept of Zero Trust (ZT) are emerging to meet the challenges posed by these changes. ZT systems treat internal and external
networks as untrusted and subject both to the same security checking and control to prevent data breaches and limit internal
lateral movement. Context awareness is a notion from the field of ubiquitous computing that is used to capture and react to the
situation of an entity, based on the dynamics of a particular application or system context. )e idea has been incorporated into
several access control models. However, the overlap between context-aware access control and zero-trust security has not been
fully explored. In this SoK, we conduct a systematic examination of ZT, context awareness, and risk-based access control to
explore the critical elements of each and to identify areas of overlap and synergy to enhance the operation and deployment of
ZT systems
Collections
The following license files are associated with this item: