[1]
D. N. Srisai and K. Rattanapong, “Securing AWS Resources with IAM: Identity-Based Policies, Actions, and Permissions Flow”, AIJCST, vol. 4, no. 4, pp. 14–22, Jul. 2022, doi: 10.63282/3117-5481/AIJCST-V4I4P102.