Machine Learning–Based Identity and Access Management for Cloud Security

H Jamil, A Ali, M Ammi, R Kirichek… - Secure Edge and Fog …, 2024 - Springer
Cloud computing has the potential to offer an abundance of computing resources on
demand due to its high scalability, which eliminates the need for providers to plan far in …

Machine Learning–Based Identity and Access Management for Cloud Security

H Jamil, A Ali, M Ammi, R Kirichek… - … Computing & Next …, 2024 - pure.hud.ac.uk
Cloud computing has the potential to offer an abundance of computing resources on
demand due to its high scalability, which eliminates the need for providers to plan far in …

Machine Learning–Based Identity and Access Management for Cloud Security

H Jamil, A Ali, M Ammi, R Kirichek, MSA Muthanna… - Springer
Cloud computing is one of the primary sources to provide services to end users. It consists of
virtual machines (VMs), services, resource storage, processing, and task handling. In …