Publisher
Springer Nature Singapore
Reference10 articles.
1. Sharma, A., Sharma, S., Dave, M.: Identity and access management—a comprehensive study. In: 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), pp. 1481–1485 (2015)
2. Almulla, S.A., Yeun, C.Y.: Cloud computing security management. In: 2010 Second International Conference on Engineering System Management and Applications, pp. 1–7 (2010)
3. Thakur, M.A., Gaikwad, R.: User identity and access management trends in IT infrastructure-an overview. In: 2015 International Conference on Pervasive Computing (ICPC), pp. 1–4 (2015)
4. Dasgupta, D., Roy, A., Nag, A., Dasgupta, D., Roy, A., Nag, A.: Multi-factor authentication: more secure approach towards authenticating individuals. Adv. User Authentication 185–233 (2017)
5. Liu, X.M.: A risk-based approach to cybersecurity: a case study of financial messaging networks data breaches. Coast. Bus. J. 18(1), 2 (2021)