Articles | Open Access |

Toward Adaptive Zero Trust Architectures: Dynamic Trust Evaluation, Risk-Based Authentication, and Context-Aware Access Control for Next-Generation Network Security

Katrina Markovic , Department of Computer Science, University of Ljubljana, Slovenia

Abstract

The rapid expansion of cloud computing, edge environments, Internet of Things (IoT) ecosystems, and distributed enterprise infrastructures has fundamentally transformed the modern cybersecurity landscape. Traditional perimeter-based security models have become increasingly inadequate due to the dissolving boundaries between internal and external network domains. In response to these evolving threats, the Zero Trust Architecture (ZTA) paradigm has emerged as a prominent cybersecurity model that assumes no implicit trust within networks and requires continuous verification of all entities attempting to access resources. This research article provides an extensive theoretical and analytical examination of adaptive Zero Trust architectures with particular emphasis on dynamic trust evaluation, risk-based authentication, context-aware access control, and software-defined perimeter mechanisms. Drawing upon a comprehensive set of contemporary scholarly works, this study explores how modern trust computation models, machine learning-based trust assessment, and context-driven authorization frameworks contribute to more resilient and adaptive security infrastructures.

The research investigates the architectural principles underlying Zero Trust security models and evaluates their application in emerging technological ecosystems including cloud environments, edge computing, industrial IoT, and enterprise networks. Particular focus is given to the integration of trust scoring mechanisms, continuous authorization processes, and dynamic risk evaluation strategies capable of mitigating identity-based threats, insider attacks, and sophisticated intrusion techniques. Additionally, the study analyzes how programmable security frameworks and software-defined perimeter technologies can reinforce Zero Trust deployments by reducing attack surfaces and enabling fine-grained access enforcement.

Through a detailed methodological synthesis of existing theoretical frameworks and empirical studies, the article identifies key architectural components, operational mechanisms, and trust computation techniques that enable dynamic security enforcement in modern distributed systems. The results highlight the increasing importance of contextual intelligence, behavioral analytics, and adaptive policy enforcement within Zero Trust environments. Furthermore, the discussion addresses significant challenges related to scalability, interoperability, performance overhead, and explainability of trust evaluation mechanisms.

Ultimately, this research contributes to the growing body of knowledge on Zero Trust security by presenting a holistic conceptual framework that integrates dynamic trust evaluation, risk-adaptive authentication, and context-aware access control into a unified architectural model. The findings emphasize that future cybersecurity infrastructures must move beyond static authentication mechanisms toward continuously evolving trust-driven security ecosystems capable of proactively defending against increasingly complex cyber threats.

Keywords

Zero Trust Architecture, Dynamic Trust Evaluation, Risk-Based Authentication, Context-Aware Access Control

References

Ashfaq, S., et al. (2023). Zero trust security paradigm: A comprehensive survey and research analysis. Journal of Electrical Systems.

Bhattarai, H., et al. Trust score-based zero trust architecture for advanced metering infrastructure security.

Bhutta, M. N. M., et al. (2021). A survey on blockchain technology: Evolution, architecture and security. IEEE Access.

Dasu, L. S. L. S., et al. (2023). Defending against identity threats using risk-based authentication. Cybernetics and Information Technologies.

Dhiman, P., et al. (2024). A review and comparative analysis of relevant approaches of zero trust network model. Sensors.

Ding, W., Yan, Z., & Deng, R. H. (2016). A survey on future internet security architectures. IEEE Access.

Ge, Y., et al. Trust threshold policy for explainable and adaptive zero-trust defense in enterprise networks.

Hong, S., et al. (2023). SysFlow: Toward a programmable zero trust framework for system security. IEEE Transactions on Information Forensics and Security.

Itodo, C., et al. (2024). Multivocal literature review on zero-trust security implementation. Computers & Security.

Jeong, E., et al. (2025). A trust score-based access control model for zero trust architecture: Design, sensitivity analysis, and real-world performance evaluation. Applied Sciences.

Joumaa, H., et al. Continuous authorization architecture for dynamic trust evaluation.

Kindervag, J., et al. (2010). Build security into your network’s DNA: The zero trust network architecture.

Kindervag, J., et al. (2010). No more chewy centers: Introducing the zero trust model of information security.

Koilpillai, J., et al. (2017). Software defined perimeter (SDP): A primer for CIOs.

Lee, B., et al. Situational awareness based risk-adaptable access control in enterprise networks.

Li, S., et al. (2024). Future industry internet of things with zero-trust security. Information Systems Frontiers.

Lukaseder, T., et al. Context-based access control and trust scores in zero trust campus networks.

Petrovska, A. Trust level evaluation engine for dynamic trust assessment with reference to subjective logic.

Phiayura, P., & Teerakanok, S. (2023). A comprehensive framework for migrating to zero trust architecture. IEEE Access.

Ruambo, F. A., et al. (2023). Securing SDN/NFV-enabled campus networks with software-defined perimeter-based zero-trust architecture.

Ruambo, F. A., et al. (2025). Brute-force attack mitigation on remote access services via software-defined perimeter. Scientific Reports.

Ruambo, F. A., et al. Enhanced backdoor resilience in cross-platform systems using zero trust based software defined perimeter architecture powered with SnortML IDS/IPS.

Sarkar, S., et al. (2022). Security of zero trust networks in cloud computing: A comparative review. Sustainability.

Saxena, N., et al. (2020). Impact and key challenges of insider threats on organizations and critical businesses. Electronics.

Scalise, P., et al. (2024). A systematic survey on 5G and 6G security considerations, challenges, trends, and research areas. Future Internet.

Sharma, S., et al. (2024). User safety and security in the metaverse: A critical review. IEEE Open Journal of the Communications Society.

Steenbrink, T. P. J. (2022). Zero Trust Architecture. Delft University of Technology Repository.

Sun, N., et al. (2023). Cyber threat intelligence mining for proactive cybersecurity defense: A survey and new perspectives. IEEE Communications Surveys & Tutorials.

Syed, N. F., et al. (2022). Zero trust architecture: A comprehensive survey. IEEE Access.

Wang, J., et al. (2020). A survey on trust evaluation based on machine learning. ACM Computing Surveys.

Yang, H., et al. (2025). A novel lightweight dynamic trust evaluation model for edge computing. IEEE Transactions on Network and Service Management.

Xiao, S., et al. (2022). SoK: Context and risk aware access control for zero trust systems. Security and Communication Networks.

Sagar Kesarpu. (2025). Zero-Trust Architecture in Java Microservices. International Journal of Networks and Security, 5(01), 202-214. https://doi.org/10.55640/ijns-05-01-12

Article Statistics

Downloads

Download data is not yet available.

Copyright License

Download Citations

How to Cite

Katrina Markovic. (2025). Toward Adaptive Zero Trust Architectures: Dynamic Trust Evaluation, Risk-Based Authentication, and Context-Aware Access Control for Next-Generation Network Security . International Journal of Data Science and Machine Learning, 5(02), 466-477. https://www.academicpublishers.org/journals/index.php/ijdsml/article/view/11801