Special Issue Information Special Issue Call for Paper Other Special Issues on this journal Closed Special Issues
Zero-trust security in cloud computing environments (CCE)

Zero-trust security in cloud computing environments (CCE)

Journal
Impact Score 5.78

OFFICIAL WEBSITE

Special Issue Information

Submission Deadline: 01-02-2021
Journal Impact Score: 5.78
Journal Name: Computers and Security
Publisher: Computers and Security

Special Issue Call for Papers


The emerging zero trust security shows great promises of vastly enhanced security, usability, data protection and governance in cloud computing environments, which assumes that all participants, systems, or services operating from within the cloud-based perimeter are not trusted by default and instead must verify everything trying to access the cloud-based system. In cloud-based system, the traditional perimeter security approaches are vulnerable for data breaches and cyberattacks. The zero-trust model provides new security model that requires restrict access control and trusts nothing by default for any user, applications, or services in both inside and outside a cloud-based system perimeter. The zero trust specifically effect in cloud computing environment, where enterprises should not inherently trust any users, application, and any attempt to access a system or application must be verified before granting access. The zero-trust security model can significantly improve the security of cloud by creates a map of what it has in the cloud and implement strong access control, including multi-factor authentication, adaptive access control, risk-based adaptive authentication, artificial intelligence enabled dynamic security policies, and more.



The aim of this special issue is to foster novel and multidisciplinary approaches that improve the security in cloud environments by addressing challenges in zero trust security in cloud environments, including fitting with legacy network-centric methods, strengthening security of user and application centric approaches, supporting access to internal apps from any device anywhere, etc.



This special issue will focus on (but not limited to) the following topics:




Submission Format :



The submitted papers must be written in English and describe original research which is not published nor currently under review by other journals or conferences. Author guidelines for preparation of manuscript can be found at https://www.journals.elsevier.com/computers-and-security/.



Submission Guidelines :



All manuscripts and any supplementary material should be submitted through the Elsevier journal Computer & Security submission system at https://ees.elsevier.com/cose/. The authors must select VSI:ZTSecurity when they reach the journal type selection.



Schedule :



Submission Deadline: Feb 1, 2021
First Round of Reviews: Mar 31, 2021
Second Round of Reviews: May 31, 2021
Final manuscript due: Jul 31, 2021



List of Guest Editors :



Shancang Li, University of the West of England, Bristol BS16 1QY, UK, [email protected]



Kim-Kwang Raymond Choo, The University of Texas at San Antonio, USA, [email protected]



Houbing Song, Embry-Riddle Aeronautical University, USA, [email protected]



Hongwei Li, University of Electronic Science and Technology of China, China, [email protected]

Closed Special Issues

Publisher
Journal Details
Closing date
G2R Score
Managing Multi-Party, Interdependent Privacy Risks

Managing Multi-Party, Interdependent Privacy Risks

Computers and Security
Closing date: 15-08-2021 G2R Score: 5.78
Cybersecurity Incident Response in Organizations

Cybersecurity Incident Response in Organizations

Computers and Security
Closing date: 01-05-2021 G2R Score: 5.78
Zero-trust security in cloud computing environments (CCE)

Zero-trust security in cloud computing environments (CCE)

Computers and Security
Closing date: 01-02-2021 G2R Score: 5.78
A Multidisciplinary Approach to Internet of Things Cybersecurity and Risk Management

A Multidisciplinary Approach to Internet of Things Cybersecurity and Risk Management

Computers and Security
Closing date: 30-03-2020 G2R Score: 5.78
Security and Privacy in Smart Cyber-physical Systems- Computers & Security, Elsevier

Security and Privacy in Smart Cyber-physical Systems- Computers & Security, Elsevier

Computers and Security
Closing date: 30-11-2018 G2R Score: 5.78
“Blockchain and Cryptocurrency”

“Blockchain and Cryptocurrency”

Computers and Security
Closing date: 30-11-2018 G2R Score: 5.78
Security and Privacy for Edge Computing: Current Progress and Future Challenge

Security and Privacy for Edge Computing: Current Progress and Future Challenge

Computers and Security
Closing date: 31-12-2017 G2R Score: 5.78
Celebrating Anniversaries of CERIAS/COAST At Purdue University

Celebrating Anniversaries of CERIAS/COAST At Purdue University

Computers and Security
Closing date: 01-10-2017 G2R Score: 5.78
Security and Privacy Protection vs Sustainable Development

Security and Privacy Protection vs Sustainable Development

Computers and Security
Closing date: 01-09-2017 G2R Score: 5.78