|
Ref | Topic covered | RQ1 score | RQ2 score | Aggregate score |
|
[21] | Security-as-a-service for identity access management | 1 | 1 | 2 |
[33] | Identity provision and user access provision through IDP session | 1 | 1 | 2 |
[34] | Role based access for system security | 1 | 1 | 2 |
[10] | AI and the applications for user interface and others | 1 | 0.5 | 1.5 |
[6] | Organizational information security management through management success factors (MSF) | 1 | 0.5 | 1.5 |
[35] | Single-sign-on service for identity management | 0.5 | 1 | 1.5 |
[36] | Attribute based access control for IAM to achieve total attribute quality management (TAQM) | 1 | 0.5 | 1.5 |
[17] | Policy perspective of dynamic identity and user management | 1 | 0.5 | 1.5 |
[25] | Information security with predictive mechanisms | 0.5 | 1 | 1.5 |
[37] | Integration of artificial intelligence activities in software development processes | 0.5 | 1 | 1.5 |
[38] | Predictive intelligence to the edge of the IoT network. | 0.5 | 1 | 1.5 |
[39] | Attribute-centric access control | 1 | 0.5 | 1.5 |
[13] | Role-based access control | 1 | 0.5 | 1.5 |
[40] | Cleaning unauthorized access | 1 | 0.5 | 1.5 |
[41] | Comprehensive overview of AI-based techniques used in wireless sensor networks (WSN) | 0.5 | 0.5 | 1 |
[19] | Entitlement decision and prediction with the help of AI | 0.5 | 0.5 | 1 |
[42] | Functional requirement for authority data and for subject authority data-related models | 1 | 0 | 1 |
[43] | AI systems and applications | 0.5 | 0.5 | 1 |
[44] | Applications of artificial intelligence, deep learning, and machine learning | 0.5 | 0.5 | 1 |
[39] | Decentralized IAM | 1 | 0 | 1 |
[30] | Modelling for predictive algorithms to provide information security, transparency, and accountability in decision-making | 0 | 0.5 | 0.5 |
[45] | Virtual engineering process, predictive management, and allied concepts for effective decision-making | 0 | 0.5 | 0.5 |
[46] | AI tools for user behaviour assessment and interaction with environment | 0.5 | 0 | 0.5 |
[47] | Knowledge representation model for prediction mechanism | 0 | 0.5 | 0.5 |
[29] | Development of system compatible with advanced technologies such as AI, which ensure security | 0.5 | 0 | 0.5 |
[20] | Application of AI for entitlement review | 0.5 | 0 | 0.5 |
[48] | AI and accessibility | 0.5 | 0 | 0.5 |
[49] | Unexplored areas of computer science applications | 0.5 | 0 | 0.5 |
[50] | Perspectives on digital identity systems | 0.5 | 0 | 0.5 |
[40] | Predictive intelligence | 0 | 0.5 | 0.5 |
|