2020
DOI: 10.1109/access.2020.3015616
|View full text |Cite
|
Sign up to set email alerts
|

Intelligent Performance-Aware Adaptation of Control Policies for Optimizing Banking Teller Process Using Machine Learning

Abstract: In the current banking systems and business processes, the permission granted to employees is controlled and managed by the configured access control methods, in which static role-based models focus on access to information and functions. The deployed configuration is not reviewed/updated systematically and is handled manually by managers. Consequently, banks and companies are looking for systems and applications to automate and optimize their business processes and data management intelligently. In this conte… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
9
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 32 publications
(17 citation statements)
references
References 35 publications
0
9
0
Order By: Relevance
“…There is more than one taxonomy, but even so, the ideas used to examine security paradigms for the management of resources and infrastructure in multinational corporations all have straightforward definitions.That is why many people are trying to find a good description of the security infrastructure for multinational corporations. These definitions and paradigms aim to ensure that security experts always speak the same language when discussing various ideas and terms, which will help to detect attacks more accurately and reduce data loss during cyberattacks (Khan et al, 2020;Din et al, 2020;Tay & Mourad, 2020;Yunis et al, 2020;Kumar et al, 2021). The ability to spot security breaches depends on knowing the adversary and its goals, plans, and tactics.…”
Section: Introductionmentioning
confidence: 99%
“…There is more than one taxonomy, but even so, the ideas used to examine security paradigms for the management of resources and infrastructure in multinational corporations all have straightforward definitions.That is why many people are trying to find a good description of the security infrastructure for multinational corporations. These definitions and paradigms aim to ensure that security experts always speak the same language when discussing various ideas and terms, which will help to detect attacks more accurately and reduce data loss during cyberattacks (Khan et al, 2020;Din et al, 2020;Tay & Mourad, 2020;Yunis et al, 2020;Kumar et al, 2021). The ability to spot security breaches depends on knowing the adversary and its goals, plans, and tactics.…”
Section: Introductionmentioning
confidence: 99%
“…Deep leaning techniques were proven efficient in solving multiple automation problems [13][14][15] in a variety of fields including medicine [16][17][18], security [19,20], management [21][22][23][24], and Internet of things [25]. With the proliferation of vision-based deep-learning techniques [26][27][28][29], significant advancements have been made in the generation of potential grasps.…”
Section: Introductionmentioning
confidence: 99%
“…Researchers in [5] considered domain knowledge and purpose of requesting user for accessing the patient record as constraints in current RBAC model to privacy of patient records. B. Tay and A. Mourad in [6] added ML techniques to assess the RBAC access policies enforces in the system, assess the authorization levels based on the user performance and work history to update the policies dynamically. All types of organizations are using the existing RBAC model with some added functionalities depending on their organization's requirements.…”
Section: Introductionmentioning
confidence: 99%