1.
Srisai DN, Rattanapong K. Securing AWS Resources with IAM: Identity-Based Policies, Actions, and Permissions Flow. AIJCST [Internet]. 2022 Jul. 12 [cited 2026 Mar. 22];4(4):14-22. Available from: https://aijcst.org/index.php/aijcst/article/view/45