Author:
Chatterjee Ayantika,Aung Khin Mi Mi
Reference27 articles.
1. Ahn G-J, Sandhu R (2000) Role-based authorization constraints specification. ACM Trans Inf Syst Secur 3:207–226
2. Balduzzi M, Zaddach J, Balzarotti D, Kirda E, Loureiro S (2012) A security analysis of Amazon’s elastic compute cloud service. In: SAC
3. Bernardo D, Assumpçao G (2009) Advanced SQL injection to operating system full control. In: Black hat Europe
4. Lecture notes in computer science;D Boneh,2004
5. Bradford Contel (2018) 7 most infamous cloud security breaches. StorageCraft Technology Corporation from
https://blog.storagecraft.com/7-infamous-cloud-security-breaches/