IAM Meets CTI: Make Identity and Access Management Ready for Cyber Threat Intelligence.
Alexander PuchtaThomas BaumerMathis MüllerGünther PernulPublished in: DBSec (2024)
Keyphrases
- cyber crime
- management system
- identity management
- storage management
- memory space
- decision support
- information management
- information systems
- intelligent systems
- access control
- random access
- decision making
- intelligence analysis
- situational awareness
- network management
- information processing
- knowledge management
- cyber security
- role based access control
- data management
- case study
- smarter planet