Risk-based access control systems are part of identity management systems used to accommodate environments with needs for dynamic access control decisions. The risk value is subjected to overestimation or underestimation since it is measured qualitatively, thus; causing uncertainty problems, which was apparent in a previously proposed hybrid risk adaptive (HRA) access control system. Conversely, Fuzzy Inference Systems can deal with the uncertainty of measures and control the outcomes more precisely; therefore, a multilevel fuzzy inference system (HRA-MFIS) was proposed to replace the risk assessment model in HRA. This paper continues to improve the previous model by introducing an enhanced multilevel fuzzy inference system (EHRA-MFIS), whi...
Operational risk is the risk of losses arising from the failure or inadequate internal processes, hu...
This paper introduces a procedural method based on the fuzzy logic and set theory, which analyzes th...
The purpose of this article is to consider system safety and reliability analysts to evaluate the ri...
Risk-based access control systems are part of identity management systems used to accommodate enviro...
Fuzzy inference is a promising approach to implement risk-based access control systems. However, its...
The Internet of Things (IoT) is becoming the future of the Internet with a large number of connected...
The presented article examines the background of biometric identification. As a technical method of ...
The need to increase information sharing in the Internet of Things (IoT) applications made the risk-...
The need to increase information sharing in the Internet of Things (IoT) applications made the risk-...
Providing a dynamic access control model that uses real-time features to make access decisions for I...
Providing a dynamic access control model that uses real-time features to make access decisions for I...
Due to the unreliability of wired communications and the risks of controlling the process of transmi...
Strong adaptive control can be exercised even without access to accurate data inputs. Such control i...
In the Internet of things (IoT), the activities of daily life are supported by a multitude of hetero...
Risk analysis is the process of systematically using information to identify and assess risks. This ...
Operational risk is the risk of losses arising from the failure or inadequate internal processes, hu...
This paper introduces a procedural method based on the fuzzy logic and set theory, which analyzes th...
The purpose of this article is to consider system safety and reliability analysts to evaluate the ri...
Risk-based access control systems are part of identity management systems used to accommodate enviro...
Fuzzy inference is a promising approach to implement risk-based access control systems. However, its...
The Internet of Things (IoT) is becoming the future of the Internet with a large number of connected...
The presented article examines the background of biometric identification. As a technical method of ...
The need to increase information sharing in the Internet of Things (IoT) applications made the risk-...
The need to increase information sharing in the Internet of Things (IoT) applications made the risk-...
Providing a dynamic access control model that uses real-time features to make access decisions for I...
Providing a dynamic access control model that uses real-time features to make access decisions for I...
Due to the unreliability of wired communications and the risks of controlling the process of transmi...
Strong adaptive control can be exercised even without access to accurate data inputs. Such control i...
In the Internet of things (IoT), the activities of daily life are supported by a multitude of hetero...
Risk analysis is the process of systematically using information to identify and assess risks. This ...
Operational risk is the risk of losses arising from the failure or inadequate internal processes, hu...
This paper introduces a procedural method based on the fuzzy logic and set theory, which analyzes th...
The purpose of this article is to consider system safety and reliability analysts to evaluate the ri...