AI for identity and access management (IAM) in the cloud: Exploring the potential of artificial intelligence to improve user authentication, authorization, and access …
This comprehensive study explores the integration and effectiveness of Artificial Intelligence
(AI) in Identity and Access Management (IAM) within cloud environments. It primarily focuses …
(AI) in Identity and Access Management (IAM) within cloud environments. It primarily focuses …
Machine learning in identity and access management systems: Survey and deep dive
S Aboukadri, A Ouaddah, A Mezrioui - Computers & Security, 2024 - Elsevier
The evolution of identity and access management (IAM) has been driven by the expansion
of online services, cloud computing, and the Internet of Things (IoT). The proliferation of …
of online services, cloud computing, and the Internet of Things (IoT). The proliferation of …
AI-driven cloud security: Examining the impact of user behavior analysis on threat detection
This study explores the comparative effectiveness of AI-driven user behavior analysis and
traditional security measures in cloud computing environments. It specifically examines their …
traditional security measures in cloud computing environments. It specifically examines their …
[PDF][PDF] Advanced Authentication Mechanisms for Identity and Access Management in Cloud Computing.
A Alsirhani, M Ezz, AM Mostafa - Computer Systems Science & …, 2022 - cdn.techscience.cn
Identity management is based on the creation and management of user identities for
granting access to the cloud resources based on the user attributes. The cloud identity and …
granting access to the cloud resources based on the user attributes. The cloud identity and …
Architectures for AI Integration in Next-Generation Cloud Infrastructure, Development, Security, and Management
M Abouelyazid, C Xiang - International Journal of …, 2019 - publications.dlpress.org
The rapid advancement of artificial intelligence (AI) technologies has opened new
possibilities for enhancing the capabilities of next-generation cloud computing. This …
possibilities for enhancing the capabilities of next-generation cloud computing. This …
[PDF][PDF] SECURE CLOUD ARCHITECTURES FOR AI-ENHANCED BANKING AND INSURANCE SERVICES
S Madasamy - International Research Journal of Modernization in …, 2022 - researchgate.net
Secure cloud architectures are pivotal for the successful implementation of AI-enhanced
banking and insurance services in today's digital landscape. As financial institutions …
banking and insurance services in today's digital landscape. As financial institutions …
[PDF][PDF] Investigating the use of an artificial intelligence model in an ERP cloud-based system
N Yathiraju - International Journal of Electrical, Electronics and …, 2022 - academia.edu
Enterprise Resource Planning (ERP) systems are necessary to improve an enterprise's
management performance. However, the perception of information technology (IT) …
management performance. However, the perception of information technology (IT) …
Identity and access management as security-as-a-service from clouds
In Security-as-a-service model the focus is on security delivered as cloud services; ie
security provided through the cloud instead of on premise security solutions. Identity and …
security provided through the cloud instead of on premise security solutions. Identity and …
Access control design practice and solutions in cloud-native architecture: A systematic mapping study
Protecting the resources of a cloud-native application is essential to meet an organization's
security goals. Cloud-native applications manage thousands of user requests, and an …
security goals. Cloud-native applications manage thousands of user requests, and an …
Transforming the capabilities of artificial intelligence in GCC financial sector: a systematic literature review
Identity and access management is a business process framework that makes it easier to
maintain genuine user identities and regulate access to sensitive assets. The word “access …
maintain genuine user identities and regulate access to sensitive assets. The word “access …
相关搜索
- cloud identity access management
- user authentication access management
- artificial intelligence access management
- user authentication artificial intelligence
- authentication mechanisms cloud computing
- machine learning access management
- deep dive access management
- artificial intelligence systematic mapping
- user authentication access control
- artificial intelligence access control
- cloud computing access management
- authentication mechanisms access management