Risk-adaptive authorization in zero trust with dynamic trust and tokens

Yu.V. Kostiuk, P.M. Skladannyi, D.D. Hnatchenko

Abstract


The article addresses the problem of risk-adaptive authorization in a Zero Trust architecture using a mechanism of dynamic trust assessment and adaptive access token management. The relevance of the study is driven by the increasing number of attacks related to credential compromise, session hijacking, and privilege misuse in corpo rate information systems. The proposed approach is based on continuous analysis of user behavioral character istics, device parameters, network context, and resource criticality, enabling the formation of an integral risk indicator in real time. Unlike traditional models with fixed token lifetimes and static access policies, the devel oped model provides dynamic adjustment of the trust level throughout the entire interaction session. The integral risk indicator is defined as a function of threat likelihood and potential impact on the asset, ensuring adaptive adjustment of authorization parameters, including privilege scope, token lifetime, requirement for re-authentica tion, or enforced cryptographic key rotation. A mechanism for shortening or extending the token lifecycle de pending on changes in the security context is implemented, thereby minimizing the window of opportunity for exploiting compromised credentials. Special attention is paid to maintaining a balance between security level, system performance, and usability. The proposed approach increases resilience against session hijacking, cre dential stuffing, and insider misuse attacks and can be integrated into modern access management systems with out significant growth in computational overhead. Modeling results confirm the effectiveness of dynamic trust as a key element of risk-adaptive authorization.

Problems in programming 2026; 1: 12-22


Keywords


risk-adaptive authorizationж Zero Trust; access management; trust evaluation; token lifetime; identity security; policy-based access control

References


Glöckler J., Sedlmeir J., Frank M., Fridgen G. A systematic review of identity and access management requirements in enterprises and potential contributions of self-sovereign identity // Business & Information Systems Engineering. 2024. Vol. 66. P. 421–440.

Aljohani A. Implementing Zero-trust and architecture: evaluating security measures in modern enterprise networks // SHIFRA. 2023. P. 1–13.

Glöckler J., Sedlmeir J., Frank M., Fridgen G. Publisher correction: A systematic review of identity and access management requirements in enterprises and potential contributions of self-sovereign identity // Business & Information Systems Engineering. 2023.

Aftab M. U., Qin Z., Hundera N. W., Ariyo O., Zakria Z., Son N. T., Dinh T. V. Permission based separation of duty in dynamic role-based access control model // Symmetry. 2019. Vol. 11, no. 5. Art. 669.

Yadav V., Soni M. K., Pratap A. Secured identity and access management for cloud computing using zero trust architecture // Cryptology and Network Security with Machine Learning (ICCNSML 2023). Lecture Notes in Networks and Systems. Vol. 918 / Eds. A. Chaturvedi et al. Springer, 2024.

Sivaraman H. Zero trust identity and access management (IAM) in multi-cloud environments // ESP Journal of Engineering & Technology Advancements. 2023. Vol. 3.

Ahmadi S. Zero trust architecture in cloud networks: Application, challenges and future opportunities // Journal of Engineering Research and Reports. 2024. Vol. 26, no. 2. P. 215–228.

Lee J., Tang F., Thet P. M., Yeoh D., Rybczynski M., Mon Divakaran D. SIERRA: Ranking anomalous activities in enterprise networks. arXiv preprint, 2022.

Kostiuk Y., Rzaieva S., Khorolska K., Mazur N., Korshun N. Architecture of the software system of confidential access to information resources of computer networks // Proceedings of the Workshop Cyber Security and Data Protection (CSDP 2025). Vol. 4042. CEUR WS, 2025. P. 37–53.

Teerakanok S., Uehara T., Inomata A. Migrating to zero trust architecture: Reviews and challenges // Security and Communication Networks. 2021. Art. 9947347.

Phiayura P., Teerakanok S. A comprehensive framework for migrating to zero trust architecture // IEEE Access. 2023. Vol. 11. P. 19487–19511.

Syed N. F., Shah S. W., Shaghaghi A., Anwar A., Baig Z., Doss R. Zero trust architecture (ZTA): A comprehensive survey // IEEE Access. 2022. Vol. 10. P. 57143–57179.

Amanlou S., Doss R., Li J. Implementing a dynamic and context aware trust evaluation model for zero trust architecture (ZTA): A fuzzy logic approach // Proceedings of the 2025 International Wireless Communications and Mobile Computing (IWCMC). IEEE, 2025. P. 404–411.

Muhammad A. R., Sukarno P., Wardana A. A. Integrated security information and event management (SIEM) with intrusion detection system (IDS) for live analysis based on machine learning // Procedia Computer Science. 2023. Vol. 217. P. 1406–1415.

P. S. N., Pimpalkar A., Shelke N., Bahadur Saini D. K. J. Zero trust architectures empowered by AI: A paradigm shift in cloud and edge cybersecurity // Proceedings of the 3rd International Conference on Sustainable Computing and Data Communication Systems (ICSCDS 2025). IEEE, 2025. P. 328–335.

He Y., Huang D., Chen L., Ni Y., Ma X. A survey on zero trust architecture: Challenges and future trends // Wireless Communications and Mobile Computing. 2022. Art. 6476274.

Kostiuk, Y., Skladannyi, P., Sokolov, V., Rzaieva S., Khorolska, K. Machine learning methods for detecting intrusions based on network traffic analysis. Proceedings of the Cybersecurity // Providing in Information and Telecommunication Systems II (CPITS-IІ 2025), October 26, 2025, Kyiv, Ukraine, Vol 4145, P. 72-94.


Refbacks

  • There are currently no refbacks.