2024
DOI: 10.1016/j.cose.2024.103729
|View full text |Cite
|
Sign up to set email alerts
|

Machine learning in identity and access management systems: Survey and deep dive

Sara Aboukadri,
Aafaf Ouaddah,
Abdellatif Mezrioui
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2024
2024
2025
2025

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(6 citation statements)
references
References 80 publications
0
6
0
Order By: Relevance
“…The more substantial effect observed in larger organizations and specific industries (technology and finance) highlights the contextual factors that can amplify or attenuate the effectiveness of RBAC in insider threat mitigation [61][62]. This insight is particularly relevant, considering the diverse operational environments and threat profiles across sectors, emphasizing the need for tailored RBAC strategies that account for organizational and industry-specific variables [13] [35].…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…The more substantial effect observed in larger organizations and specific industries (technology and finance) highlights the contextual factors that can amplify or attenuate the effectiveness of RBAC in insider threat mitigation [61][62]. This insight is particularly relevant, considering the diverse operational environments and threat profiles across sectors, emphasizing the need for tailored RBAC strategies that account for organizational and industry-specific variables [13] [35].…”
Section: Discussionmentioning
confidence: 99%
“…The evolving nature of insider threats requires that RBAC systems be continuously updated and refined [34]. The integration of advanced technologies, such as machine learning and artificial intelligence, is seen as a promising direction for making RBAC more adaptive and effective against sophisticated insider threats [13] [35] [36].…”
Section: Rbac's Role In Mitigating Insider Threatsmentioning
confidence: 99%
See 2 more Smart Citations
“…Undoubtedly, the IoT is considered a significant prospect that contributes significantly to advanced digital technology. However, currently, the risk of unauthorized access due to the connection of a large number of devices over the network is one of the critical challenges [13,14], along with IoT analytics and the IoT process hierarchy.…”
mentioning
confidence: 99%