1.
Srisai DN, Rattanapong K. Securing AWS Resources with IAM: Identity-Based Policies, Actions, and Permissions Flow. AIJCST [Internet]. 2022 Jul. 12 [cited 2026 May 6];4(4):14-22. Available from: https://aijcst.org/index.php/aijcst/article/view/45