Simsam Hijjawi - Profile on Academia.edu (original) (raw)

Belal Ali related author profile picture

Jithin  Jagannath related author profile picture

Tezcan Cogalan related author profile picture

Constandinos  Mavromoustakis related author profile picture

Anca Delia Jurcut related author profile picture

Dr David Soldani related author profile picture

Hsu Tung  Chien related author profile picture

ENDI SHALA related author profile picture

Roberto Carbone related author profile picture

Chafika  BENZAID related author profile picture

Chafika BENZAID

Université des Sciences et Technologie Houari Boumediene (USTHB)

Uploads

Papers by Simsam Hijjawi

Research paper thumbnail of A Maturity Framework for Zero-Trust Security in Multiaccess Edge Computing

Security and Communication Networks

Multiaccess Edge Computing (MEC) has been adopted to provide an environment that supports cloud c... more Multiaccess Edge Computing (MEC) has been adopted to provide an environment that supports cloud computing capabilities and IT services at the network edge. The open architecture of cloud computing and network access at the edge provides malicious actors with many attack vectors. The MEC system entities cannot be permanently trusted due to the dynamic and shareable nature of MEC deployments. This paper presents a classification of MEC entities that can be used to define security controls based on the Zero-Trust Security approach. The security controls are organised into a maturity framework that can be used to guide the systematic development of trust and security in an MEC environment. In this framework, a Minimum Viable Security posture defines the first operational step towards full implementation of Zero-Trust Security in an MEC environment.

Research paper thumbnail of A Maturity Framework for Zero-Trust Security in Multiaccess Edge Computing

Security and Communication Networks

Multiaccess Edge Computing (MEC) has been adopted to provide an environment that supports cloud c... more Multiaccess Edge Computing (MEC) has been adopted to provide an environment that supports cloud computing capabilities and IT services at the network edge. The open architecture of cloud computing and network access at the edge provides malicious actors with many attack vectors. The MEC system entities cannot be permanently trusted due to the dynamic and shareable nature of MEC deployments. This paper presents a classification of MEC entities that can be used to define security controls based on the Zero-Trust Security approach. The security controls are organised into a maturity framework that can be used to guide the systematic development of trust and security in an MEC environment. In this framework, a Minimum Viable Security posture defines the first operational step towards full implementation of Zero-Trust Security in an MEC environment.

Log In