Review Article

Systematic Analysis of Artificial Intelligence-Based Platforms for Identifying Governance and Access Control

Table 3

Quality assessment of the articles based on the relevancy.

RefTopic coveredRQ1 scoreRQ2 scoreAggregate score

[21]Security-as-a-service for identity access management112
[33]Identity provision and user access provision through IDP session112
[34]Role based access for system security112
[10]AI and the applications for user interface and others10.51.5
[6]Organizational information security management through management success factors (MSF)10.51.5
[35]Single-sign-on service for identity management0.511.5
[36]Attribute based access control for IAM to achieve total attribute quality management (TAQM)10.51.5
[17]Policy perspective of dynamic identity and user management10.51.5
[25]Information security with predictive mechanisms0.511.5
[37]Integration of artificial intelligence activities in software development processes0.511.5
[38]Predictive intelligence to the edge of the IoT network.0.511.5
[39]Attribute-centric access control10.51.5
[13]Role-based access control10.51.5
[40]Cleaning unauthorized access10.51.5
[41]Comprehensive overview of AI-based techniques used in wireless sensor networks (WSN)0.50.51
[19]Entitlement decision and prediction with the help of AI0.50.51
[42]Functional requirement for authority data and for subject authority data-related models101
[43]AI systems and applications0.50.51
[44]Applications of artificial intelligence, deep learning, and machine learning0.50.51
[39]Decentralized IAM101
[30]Modelling for predictive algorithms to provide information security, transparency, and accountability in decision-making00.50.5
[45]Virtual engineering process, predictive management, and allied concepts for effective decision-making00.50.5
[46]AI tools for user behaviour assessment and interaction with environment0.500.5
[47]Knowledge representation model for prediction mechanism00.50.5
[29]Development of system compatible with advanced technologies such as AI, which ensure security0.500.5
[20]Application of AI for entitlement review0.500.5
[48]AI and accessibility0.500.5
[49]Unexplored areas of computer science applications0.500.5
[50]Perspectives on digital identity systems0.500.5
[40]Predictive intelligence00.50.5