Visible to the public Dynamic Access Control Technology Based on Zero-Trust Light Verification Network Model

TitleDynamic Access Control Technology Based on Zero-Trust Light Verification Network Model
Publication TypeConference Paper
Year of Publication2021
AuthorsZhang, Pengfeng, Tian, Chuan, Shang, Tao, Liu, Lin, Li, Lei, Wang, Wenting, Zhao, Yiming
Conference Name2021 International Conference on Communications, Information System and Computer Engineering (CISCE)
Date PublishedMay 2021
PublisherIEEE
ISBN Number978-1-6654-0352-8
KeywordsAccess Control, cloud computing, Collaboration, Computational modeling, dynamic access control, Human Behavior, human factors, Inspection, lighted verification, micro-segmentation, Organizations, policy-based governance, pubcrawl, resilience, Resiliency, Scalability, Technical management, usability, zero trust, Zero trust policy
AbstractWith the rise of the cloud computing and services, the network environments tend to be more complex and enormous. Security control becomes more and more hard due to the frequent and various access and requests. There are a few techniques to solve the problem which developed separately in the recent years. Network Micro-Segmentation provides the system the ability to keep different parts separated. Zero Trust Model ensures the network is access to trusted users and business by applying the policy that verify and authenticate everything. With the combination of Segmentation and Zero Trust Model, a system will obtain the ability to control the access to organizations' or industrial valuable assets. To implement the cooperation, the paper designs a strategy named light verification to help the process to be painless for the cost of inspection. The strategy was found to be effective from the perspective of the technical management, security and usability.
URLhttps://ieeexplore.ieee.org/document/9445896
DOI10.1109/CISCE52179.2021.9445896
Citation Keyzhang_dynamic_2021