1. Fady, A.M.I. & Hemayed, E.E. “Trusted Cloud Computing Architectures for infrastructure as a service :Surve and systematic literature review”, Computers &Securit https://linkinghub.elsevier.ncom/retrieve/pii/S0167404818302712 2019 pp.196–226.
2. Lwamo, N.M.R., Zhu, L., Xu, C., Sharif et.al., “A Secure User Authentication Scheme with Anonymity for the Single Multi-Server Environments”, Information Science https://linkinghub.elsevier.com/retrieve/pii/S00200255183085702019 pp.369–385.
3. Ruan, Y. & Durresi, A. “Atrust management frame work for clouds” Computer Communications. https://linkinghub.elsevier.com/retrieve/pii/S014041830 2019 pp.12131.
4. Identity and access management in cloud environment: Mechanisms and challenges
5. Thota, C., Sundarasekar, R., et.al., “Centralized Fog Computing Security Platform for IoT and Cloud in Healthca System”, http://services.igi/global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-29477.ch011 2018 pp.141–154