[1]
Srisai, D.N. and Rattanapong, K. 2022. Securing AWS Resources with IAM: Identity-Based Policies, Actions, and Permissions Flow. American International Journal of Computer Science and Technology. 4, 4 (Jul. 2022), 14–22. DOI:https://doi.org/10.63282/3117-5481/AIJCST-V4I4P102.