(1)
Srisai, D. N.; Rattanapong, K. Securing AWS Resources With IAM: Identity-Based Policies, Actions, and Permissions Flow. AIJCST 2022, 4 (4), 14-22. https://doi.org/10.63282/3117-5481/AIJCST-V4I4P102.