Subject
Law,General Computer Science
Reference75 articles.
1. Continuous and transparent multimodal authentication: reviewing the state of the art;Abdulwahid;Cluster Comput,2016
2. Towards the realisation of context-risk-aware access control in pervasive computing;Ahmed;Telecommun Syst,2010
3. Managing information security risks. The OCTAVESM approach;Alberts,2002
4. On the possibility of insider threat prevention using Intent-Based Access Control (IBAC);Almehmadi;IEEE Syst J,2015
5. A metric-based approach to assess risk for on cloud federated identity management;Arias-Cabarcos;J Net Syst Manage,2012
Cited by
19 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Keeping Verticals’ Sovereignty During Application Migration in Continuum;Journal of Network and Systems Management;2024-07-31
2. Multi-Tenant Cloud Security- Risk Prediction through Cyber-Value-at-Risk (CVaR);2024 12th International Symposium on Digital Forensics and Security (ISDFS);2024-04-29
3. Modifications of the Formal Risk Analysis and Assessment for the Information System Security;Advances in Science and Technology Research Journal;2024-04-01
4. CyberShield Cloud: Fortifying Data Exchange with Role-Based Encryption Mastery;2024 1st International Conference on Cognitive, Green and Ubiquitous Computing (IC-CGU);2024-03-01
5. Analysis of User Authentication Experience in Electronic Banking;Applied Research Approaches to Technology, Healthcare, and Business;2023-09-29