[1]
A. Chunduru and S. S, “Security strategies for cloud identity management - a study”, IJET, vol. 7, no. 2, pp. 732–741, May 2018, doi: 10.14419/ijet.v7i2.10410.