[1]
A. Chunduru and S. S, “Security strategies for cloud identity management - a study”,
IJET
, vol. 7, no. 2, pp. 732–741, May 2018,
doi: 10.14419/ijet.v7i2.10410.