Simsam Hijjawi - Academia.edu (original) (raw)

Related Authors

Tezcan Cogalan

Constandinos  Mavromoustakis

Anca Delia Jurcut

Dr David Soldani

Hsu Tung  Chien

Chafika  BENZAID

Chafika BENZAID

Université des Sciences et Technologie Houari Boumediene (USTHB)

Uploads

Papers by Simsam Hijjawi

Research paper thumbnail of A Maturity Framework for Zero-Trust Security in Multiaccess Edge Computing

Security and Communication Networks

Multiaccess Edge Computing (MEC) has been adopted to provide an environment that supports cloud c... more Multiaccess Edge Computing (MEC) has been adopted to provide an environment that supports cloud computing capabilities and IT services at the network edge. The open architecture of cloud computing and network access at the edge provides malicious actors with many attack vectors. The MEC system entities cannot be permanently trusted due to the dynamic and shareable nature of MEC deployments. This paper presents a classification of MEC entities that can be used to define security controls based on the Zero-Trust Security approach. The security controls are organised into a maturity framework that can be used to guide the systematic development of trust and security in an MEC environment. In this framework, a Minimum Viable Security posture defines the first operational step towards full implementation of Zero-Trust Security in an MEC environment.

Research paper thumbnail of A Maturity Framework for Zero-Trust Security in Multiaccess Edge Computing

Security and Communication Networks

Multiaccess Edge Computing (MEC) has been adopted to provide an environment that supports cloud c... more Multiaccess Edge Computing (MEC) has been adopted to provide an environment that supports cloud computing capabilities and IT services at the network edge. The open architecture of cloud computing and network access at the edge provides malicious actors with many attack vectors. The MEC system entities cannot be permanently trusted due to the dynamic and shareable nature of MEC deployments. This paper presents a classification of MEC entities that can be used to define security controls based on the Zero-Trust Security approach. The security controls are organised into a maturity framework that can be used to guide the systematic development of trust and security in an MEC environment. In this framework, a Minimum Viable Security posture defines the first operational step towards full implementation of Zero-Trust Security in an MEC environment.

Log In