2022
DOI: 10.1007/978-3-031-20601-6_5
|View full text |Cite
|
Sign up to set email alerts
|

Major Role of Artificial Intelligence, Machine Learning, and Deep Learning in Identity and Access Management Field: Challenges and State of the Art

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 26 publications
0
3
0
Order By: Relevance
“…One particularly impactful application of AI is its integration into facial recognition systems, especially in the context of software security (Smith, 2020). As we navigate the digital age, the significance of facial recognition, powered by AI, becomes increasingly apparent, positioning itself as a cornerstone in access control and authentication processes (Aboukadri et al, 2024;Dyson, 2022;Wilkinson, 2020).…”
Section: Literature Review System Architecturementioning
confidence: 99%
“…One particularly impactful application of AI is its integration into facial recognition systems, especially in the context of software security (Smith, 2020). As we navigate the digital age, the significance of facial recognition, powered by AI, becomes increasingly apparent, positioning itself as a cornerstone in access control and authentication processes (Aboukadri et al, 2024;Dyson, 2022;Wilkinson, 2020).…”
Section: Literature Review System Architecturementioning
confidence: 99%
“…Authentication, on the other hand, verifies the identity of individuals or systems seeking access, typically through credentials like usernames and passwords, biometrics, or multi-factor authentication methods. In the context of big data analytics, robust access controls and authentication mechanisms are essential for mitigating the risks of unauthorized access, insider threats, and data manipulation [111], [112]. By implementing these measures, organizations can establish a secure framework that governs data access and usage, fostering a proactive defense against potential security breaches and ensuring the confidentiality of sensitive information throughout the analytics lifecycle.…”
Section: Access Controls and Authenticationmentioning
confidence: 99%
“…Implementing strong protection measures, along with careful management of role and task information, serves as an important form of security-related metadata. Threat detection plays a crucial role in security monitoring, as it is the fundamental process through which we determine whether an activity is considered a potential threat [1] [2].…”
Section: Introductionmentioning
confidence: 99%