[HTML][HTML] Identity and access management in cloud environment: Mechanisms and challenges

I Indu, PMR Anand, V Bhaskar - Engineering science and technology, an …, 2018 - Elsevier
Cloud computing is a complex system with combination of diverse networked devices that
supports demanded services. The architecture of cloud computing consists of different kinds …

Risk-based access control model: A systematic literature review

HF Atlam, MA Azad, MO Alassafi, AA Alshdadi… - Future Internet, 2020 - mdpi.com
Most current access control models are rigid, as they are designed using static policies that
always give the same outcome in different circumstances. In addition, they cannot adapt to …

Risk and UCON-based access control model for healthcare big data

R Jiang, X Chen, Y Yu, Y Zhang, W Ding - Journal of Big Data, 2023 - Springer
The rapid development of healthcare big data has brought certain convenience to medical
research and health management, but privacy protection of healthcare big data is an issue …

Operational risk management in the pharmaceutical supply chain using ontologies and fuzzy QFD

JCO Gómez, KT España - Procedia Manufacturing, 2020 - Elsevier
Abstract Operational Risk Management is an important aspect of current Supply Chain
Management activities. Supply Chain Risk Management Systems involve at least risk …

Cloud identity management: A survey on privacy strategies

J Werner, CM Westphall, CB Westphall - Computer Networks, 2017 - Elsevier
With the rise of cloud computing, thousands of users and multiple applications have sought
to communicate with each other, exchanging sensitive data. Thus, for effectively managing …

Risk model of financial supply chain of Internet of Things enterprises: A research based on convolutional neural network

J Lu, X Chen - Computer communications, 2022 - Elsevier
The emergence of the financial supply chain provides assistance for small, medium and
micro enterprises in the supply chain through a secured credit model based on real trade …

Threat-specific security risk evaluation in the cloud

A Nhlabatsi, JB Hong, DS Kim… - … on Cloud Computing, 2018 - ieeexplore.ieee.org
Existing security risk evaluation approaches (eg, asset-based) do not consider specific
security requirements of individual cloud computing clients in the security risk evaluation. In …

A topology and risk-aware access control framework for cyber-physical space

Y Cao, Z Huang, Y Yu, C Ke, Z Wang - Frontiers of Computer Science, 2020 - Springer
Cyber-physical space is a spatial environment that integrates the cyber world and the
physical world, aiming to provide an intelligent environment for users to conduct their day-to …

[PDF][PDF] Research on Cloud Computing Security Risk Assessment Based on Information Entropy and Markov Chain.

M Yang, R Jiang, T Gao, W Xie, J Wang - Int. J. Netw. Secur., 2018 - ijns.jalaxy.com.tw
The measurement and assessment of risk is an important basis for the research of cloud
computing security risk, it can provide important data for risk management decisions …

A privacy risk assessment scheme for fog nodes in access control system

C Ke, J Wu, F Xiao, Z Huang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In the fog computing, it is difficult to satisfy the security and privacy requirement for traditional
access control system, such as attribute-based access control system. Risk-based access …