GRC strategies in modern cloud infrastructures: a review of compliance challenges

AJ Apeh, AO Hassan, OO Oyewole… - Computer Science & IT …, 2023 - fepbl.com
This research paper delves into the intricate landscape of Governance, Risk, and
Compliance (GRC) in modern cloud infrastructures. As organisations increasingly migrate …

Machine learning in identity and access management systems: Survey and deep dive

S Aboukadri, A Ouaddah, A Mezrioui - Computers & Security, 2024 - Elsevier
The evolution of identity and access management (IAM) has been driven by the expansion
of online services, cloud computing, and the Internet of Things (IoT). The proliferation of …

A survey on security challenges in cloud computing: issues, threats, and solutions

H Tabrizchi, M Kuchaki Rafsanjani - The journal of supercomputing, 2020 - Springer
Cloud computing has gained huge attention over the past decades because of continuously
increasing demands. There are several advantages to organizations moving toward cloud …

Deep residual network for smartwatch-based user identification through complex hand movements

S Mekruksavanich, A Jitpattanakul - Sensors, 2022 - mdpi.com
Wearable technology has advanced significantly and is now used in various entertainment
and business contexts. Authentication methods could be trustworthy, transparent, and non …

Secure biometric authentication with de-duplication on distributed cloud storage

K Venkatachalam, P Prabu, A Almutairi… - PeerJ Computer …, 2021 - peerj.com
Cloud computing is one of the evolving fields of technology, which allows storage, access of
data, programs, and their execution over the internet with offering a variety of information …

Blockchain-based identity management systems in health IoT: A systematic review

B Alamri, K Crowley, I Richardson - IEEE Access, 2022 - ieeexplore.ieee.org
Identity and Access Management (IAM) systems are crucial for any information system, such
as healthcare information systems. Health IoT (HIoT) applications are targeted by attackers …

[HTML][HTML] Comprehensive review on intelligent security defences in cloud: Taxonomy, security issues, ML/DL techniques, challenges and future trends

MM Belal, DM Sundaram - Journal of King Saud University-Computer and …, 2022 - Elsevier
Nowadays, machine learning and deep learning algorithms are used in recent studies as
active security techniques instead of traditional ones to secure the cloud environment based …

Security in Cloud-Native Services: A Survey

T Theodoropoulos, L Rosa, C Benzaid, P Gray… - … of Cybersecurity and …, 2023 - mdpi.com
Cloud-native services face unique cybersecurity challenges due to their distributed
infrastructure. They are susceptible to various threats like malware, DDoS attacks, and Man …

[HTML][HTML] Enhancing identity and access management using hyperledger fabric and oauth 2.0: A block-chain-based approach for security and scalability for healthcare …

S Sutradhar, S Karforma, R Bose, S Roy… - Internet of Things and …, 2024 - Elsevier
Block-chain-based Identity and access management framework is a promising solution to
privacy and security issues raised during the exchange of patient data in the healthcare …

Cybersecurity risk management framework for blockchain identity management systems in health IoT

B Alamri, K Crowley, I Richardson - Sensors, 2022 - mdpi.com
Blockchain (BC) has recently paved the way for developing Decentralized Identity
Management (IdM) systems for different information systems. Researchers widely use it to …