dc.contributor.author | Xiao, Shiyn | |
dc.contributor.author | Ye, Yuhang | |
dc.contributor.author | Kanwal, Nadia | |
dc.contributor.author | Newe, Thomas | |
dc.contributor.author | Lee, Brian | |
dc.date.accessioned | 2022-09-21T13:58:27Z | |
dc.date.available | 2022-09-21T13:58:27Z | |
dc.date.copyright | 2022 | |
dc.date.issued | 2022-06-30 | |
dc.identifier.citation | Xiao, S., Ye, Y., Kanwal, N., Newe, T., Lee, B.(2022). SoK: context and risk aware access control for zero trust systems. Security and Communications Networks. Article ID 7026779, 20 pages. ttps://doi.org/10.1155/2022/7026779 | en_US |
dc.identifier.issn | 1939-0114 | |
dc.identifier.uri | http://research.thea.ie/handle/20.500.12065/4054 | |
dc.description.abstract | Evolving computing technologies such as cloud, edge computing, and the Internet of )ings (IoT) are creating a more complex,
dispersed, and dynamic enterprise operational environment. New security enterprise architectures such as those based on the
concept of Zero Trust (ZT) are emerging to meet the challenges posed by these changes. ZT systems treat internal and external
networks as untrusted and subject both to the same security checking and control to prevent data breaches and limit internal
lateral movement. Context awareness is a notion from the field of ubiquitous computing that is used to capture and react to the
situation of an entity, based on the dynamics of a particular application or system context. )e idea has been incorporated into
several access control models. However, the overlap between context-aware access control and zero-trust security has not been
fully explored. In this SoK, we conduct a systematic examination of ZT, context awareness, and risk-based access control to
explore the critical elements of each and to identify areas of overlap and synergy to enhance the operation and deployment of
ZT systems | en_US |
dc.format | PDF | en_US |
dc.language.iso | eng | en_US |
dc.publisher | Wiley/Hindawi | en_US |
dc.relation.ispartof | Security and Communications Networks | en_US |
dc.rights | Attribution-NonCommercial-NoDerivatives 4.0 International | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/4.0/ | * |
dc.subject | SoK | en_US |
dc.subject | Zero trust systems | en_US |
dc.title | SoK: context and risk aware access control for zero trust systems | en_US |
dc.type | info:eu-repo/semantics/article | en_US |
dc.contributor.affiliation | Technological University of the Shannon Midlands Midwest | en_US |
dc.contributor.sponsor | f Athlone Institute of Technology under its President’s Seed Fund (2021) and Science Foun dation Ireland (SFI) under Grant Number SFI 16/RC/3918, co-funded by the European Regional Development Fund. | en_US |
dc.identifier.doi | 10.1155/2022/7026779 | en_US |
dc.identifier.eissn | 1939-0122 | |
dc.identifier.orcid | https://orcid.org/0000-0003-4608-1451 | en_US |
dc.identifier.orcid | https://orcid.org/0000-0002-8475-4074 | en_US |
dc.rights.accessrights | info:eu-repo/semantics/openAccess | en_US |
dc.subject.department | Software Research Institute TUS:MM | en_US |
dc.type.version | info:eu-repo/semantics/publishedVersion | en_US |