Machine Learning–Based Identity and Access Management for Cloud Security

H Jamil, A Ali, M Ammi, R Kirichek… - Secure Edge and Fog …, 2024 - Springer
Cloud computing has the potential to offer an abundance of computing resources on
demand due to its high scalability, which eliminates the need for providers to plan far in …

Investigating the Accessibility and Usability of Multi-factor Authentication for Young People

L Smith, S Prior, J Ophoff - International Conference on Human-Computer …, 2024 - Springer
The rapid growth of young online users requires greater attention to balancing security
needs with age-appropriate user experiences. Despite the well-publicised benefits of multi …

Mask removal isn't always convenient in public!–The Impact of the Covid-19 Pandemic on Device Usage and User Authentication

A Saad, U Gruenefeld, L Mecke, M Koelle… - CHI Conference on …, 2022 - dl.acm.org
The ongoing Covid-19 pandemic has impacted our everyday lives and demands everyone
to take countermeasures such as wearing masks or disinfecting their hands. However, while …

Seek and Locate? Examining the Accessibility of Cybersecurity Features

A Binsedeeq, S Furnell, X Carpent… - … Conference on Human …, 2024 - Springer
The ability to use technology has become a necessity for everyone, including users with
disabilities, who may encounter additional challenges. Security is one of the significant …

Bridging Usability and Accessibility of User Authentication using Usable Accessed (UAce) for Online Payment Applications

J Mohamed, MFM Fudzee, SN Ramli… - JOIV: International Journal …, 2021 - joiv.org
Usability and accessibility are significant authentication aspects for online applications.
Despite the fact that there are ongoing efforts to improve the interface design, some existing …

[PDF][PDF] AI-Enabled Cloud Security Based on Organized Identity System

A Ali, F Jamil, M Saleh, A Muthanna, M Ammi - no. June, 2022 - researchgate.net
Cloud computing can provide unlimited computing resources according to demand because
of having high scalability as per its nature, which removes the requirements for the Cloud …

A big phish is (not) in sight: phishing prevention and response for screen reader users

JNF Janeiro - 2024 - repositorio.ul.pt
Phishing is a prevalent and increasingly sophisticated threat in the critical digital
environment. Nowadays, measures to protect against phishing are highly dependent on …

Accessibility barriers with authentication methods for blind and partially sighted people in the Spanish-speaking world

L Moreno, H Petrie, S Schmeelk - 36th International BCS Human …, 2023 - scienceopen.com
Digital authentication is now an essential part of daily life, allowing users to manage the
online security and privacy of their information and digital assets. However, the …

[PDF][PDF] OneButonPIN: A Single Buton Authentication Method for Blind and Low Vision Users to Improve Accessibility and Prevent Eavesdropping

M KAMARUSHI, SL WATSON, GW TIGWELL… - 2022 - researchgate.net
Authentication mechanisms (eg, login methods) help users to securely verify their identity
and keep sensitive data stored on their devices private. Authentication mechanisms typically …

[PDF][PDF] Accessibility of Authentication Techniques for People Living with Neurodegenerative Diseases

AMS Felício - 2023 - estudogeral.uc.pt
People diagnosed with ALS are often unable to authenticate themselves, due to disease
progression and ability loss. Technology is used by differently-abled people as a strategy to …