2019 International Conference on Information Science and Communications Technologies (ICISCT) 2019
DOI: 10.1109/icisct47635.2019.9012058
|View full text |Cite
|
Sign up to set email alerts
|

Development Of Role Model For Computer System Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(1 citation statement)
references
References 1 publication
0
1
0
Order By: Relevance
“…On the contrary, the authors also highlighted the possible general errors in identity and access management and entitlement review using AI technology. For instance, the Security-as-a-service for identity access management 1 1 2 [33] Identity provision and user access provision through IDP session 1 1 2 [34] Role based access for system security 1 1 2 [10] AI and the applications for user interface and others 1 0.5 1.5 [6] Organizational information security management through management success factors (MSF) 1 0.5 1.5 [35] Single-sign-on service for identity management 0.5 1 1.5 [36] Attribute based access control for IAM to achieve total attribute quality management (TAQM) 1 0.5 1.5 [17] Policy perspective of dynamic identity and user management 1 0.5 1.5 [25] Information security with predictive mechanisms 0.5 1 1.5 [37] Integration of artificial intelligence activities in software development processes 0.5 1 1.5 [38] Predictive intelligence to the edge of the IoT network. 0.5 1 1.5 [39] Attribute-centric access control 1 0.5 1.5 [13] Role-based access control 1 0.5 1.5 [40] Cleaning unauthorized access 1 0.5 1.5 [41] Comprehensive overview of AI-based techniques used in wireless sensor networks (WSN) 0.5 0.5 1 [19] Entitlement decision and prediction with the help of AI 0.5 0.5 1 [42] Functional requirement for authority data and for subject authority data-related models 1 0 1 [43] AI systems and applications 0.5 0.5 1 [44] Applications of artificial intelligence, deep learning, and machine learning 0.5 0.5 1 [39] Decentralized IAM 1 0 1 [30] Modelling for predictive algorithms to provide information security, transparency, and accountability in decision-making 0 0.5 0.5 [45] Virtual engineering process, predictive management, and allied concepts for effective decision-making 0 0.5 0.5 [46] AI tools for user behaviour assessment and interaction with environment 0.5 0 0.5 [47] Knowledge representation model for prediction mechanism 0 0.5 0.5 [29] Development of system compatible with advanced technologies such as AI, which ensure security 0.5 0 0.5 [20] Application of AI for entitlement review 0.5 0 0.5 [48] AI and accessibility 0.5 0 0.5…”
Section: Rq1: How Can We Enhance the Efficiency And Effectiveness Of ...mentioning
confidence: 99%
“…On the contrary, the authors also highlighted the possible general errors in identity and access management and entitlement review using AI technology. For instance, the Security-as-a-service for identity access management 1 1 2 [33] Identity provision and user access provision through IDP session 1 1 2 [34] Role based access for system security 1 1 2 [10] AI and the applications for user interface and others 1 0.5 1.5 [6] Organizational information security management through management success factors (MSF) 1 0.5 1.5 [35] Single-sign-on service for identity management 0.5 1 1.5 [36] Attribute based access control for IAM to achieve total attribute quality management (TAQM) 1 0.5 1.5 [17] Policy perspective of dynamic identity and user management 1 0.5 1.5 [25] Information security with predictive mechanisms 0.5 1 1.5 [37] Integration of artificial intelligence activities in software development processes 0.5 1 1.5 [38] Predictive intelligence to the edge of the IoT network. 0.5 1 1.5 [39] Attribute-centric access control 1 0.5 1.5 [13] Role-based access control 1 0.5 1.5 [40] Cleaning unauthorized access 1 0.5 1.5 [41] Comprehensive overview of AI-based techniques used in wireless sensor networks (WSN) 0.5 0.5 1 [19] Entitlement decision and prediction with the help of AI 0.5 0.5 1 [42] Functional requirement for authority data and for subject authority data-related models 1 0 1 [43] AI systems and applications 0.5 0.5 1 [44] Applications of artificial intelligence, deep learning, and machine learning 0.5 0.5 1 [39] Decentralized IAM 1 0 1 [30] Modelling for predictive algorithms to provide information security, transparency, and accountability in decision-making 0 0.5 0.5 [45] Virtual engineering process, predictive management, and allied concepts for effective decision-making 0 0.5 0.5 [46] AI tools for user behaviour assessment and interaction with environment 0.5 0 0.5 [47] Knowledge representation model for prediction mechanism 0 0.5 0.5 [29] Development of system compatible with advanced technologies such as AI, which ensure security 0.5 0 0.5 [20] Application of AI for entitlement review 0.5 0 0.5 [48] AI and accessibility 0.5 0 0.5…”
Section: Rq1: How Can We Enhance the Efficiency And Effectiveness Of ...mentioning
confidence: 99%