Cloud Identity and Access Management (IAM) Best Practices

Corresponding Author Email: nayangoel@gmail.com

DOI : https://doi.org/10.51470/BITS.2023.02.01.04

Abstract

Identity and Access Management (IAM) has become a foundational element of cloud security as organizations increasingly adopt cloud-based infrastructures. With the shift from traditional network-centric security models to identity-centric architectures, IAM serves as the primary mechanism for ensuring controlled, monitored, and verifiable access to digital resources. This review examines current best practices, emerging trends, and persistent challenges associated with cloud IAM. It synthesizes findings from recent research, industry standards, and cloud provider frameworks to analyze key components of effective IAM, including authentication, authorization, governance, automation, and continuous monitoring. The paper highlights the significance of zero-trust principles, least-privilege access, identity federation, and secure management of machine identities in mitigating security risks in multi-cloud and hybrid environments. The review concludes that integrating automation, policy standardization, and advanced analytics is essential for enhancing resilience, maintaining regulatory compliance, and supporting secure digital transformation in modern cloud ecosystems.

Keywords

cloud computing, cybersecurity, IAM, identity and access management, zero trust

Download this article as:

1. Introduction

The rapid migration of organizational workloads to cloud environments has fundamentally transformed the security landscape. As enterprises adopt public, private, and hybrid cloud platforms, traditional perimeter-based security models—once sufficient for on-premises networks—have become increasingly ineffective. In cloud ecosystems, where users, applications, and data interact across distributed and virtualized infrastructures, identity has replaced the network perimeter as the primary control plane. This shift has elevated the importance of Identity and Access Management (IAM) as a core pillar of cloud security architecture. Effective IAM ensures that the right entities—whether human users, devices, applications, or automated workloads—have appropriate access to resources while preventing unauthorized intrusion, data breaches, and privilege misuse.

Cloud IAM represents a broad set of policies, processes, and technologies designed to manage digital identities and govern their access to cloud services. These responsibilities include user authentication, authorization, role assignment, account lifecycle management, credential security, and continuous monitoring of identity-related activities. As cloud environments scale, the complexity of identity management increases significantly [1]. Organizations must manage thousands of user accounts, service accounts, API keys, machine identities, and permissions across multiple cloud platforms. Without robust IAM, this complexity introduces vulnerabilities such as excessive permissions, orphaned accounts, weak credentials, and inconsistent policy enforcement. Consequently, IAM has emerged not only as a security mechanism but also as a governance and compliance requirement.

The rise of Zero Trust Architecture (ZTA) has further underscored the critical role of IAM. Zero Trust relies on the principle of “never trust, always verify,” demanding continuous validation of identity, device health, and context before granting access. In cloud environments, where boundaries are fluid and threats can originate from inside or outside the network, Zero Trust IAM helps ensure granular, risk-aware access decisions. Features such as multi-factor authentication (MFA), identity federation, conditional access, and just-in-time privilege elevation align naturally with Zero Trust principles. As organizations increasingly adopt Zero Trust strategies, IAM becomes the foundational control enforcing those principles.

Furthermore, the expansion of cloud-native development models—including containerization, microservices, and DevOps—has accelerated the creation of non-human identities, such as service accounts, bots, secrets, tokens, and certificates. Machine identities often outnumber human identities by a large margin, and their rapid proliferation introduces new risks if not properly managed. Misconfigured service accounts or leaked API keys have been central to some of the most prominent cloud security breaches in recent years [2], cloud IAM must evolve beyond traditional user management to encompass automated credential rotation, secrets management, and machine identity governance.

Regulatory and compliance frameworks also shape modern IAM requirements. Laws and standards such as GDPR, HIPAA, ISO 27001, PCI-DSS, and NIST guidelines mandate strong access controls, auditability, and protection of personally identifiable information (PII). Cloud IAM tools provide mechanisms to enforce these requirements through logging, access reviews, policy standardization, and automated reporting. Failure to comply can result in financial penalties, reputational damage, and operational disruptions. Therefore, IAM is now understood not merely as a security discipline but also a critical component of enterprise governance and risk management.

Despite its importance, implementing effective cloud IAM remains a challenge for many organizations. Common obstacles include mismanagement of privileges, inconsistent access policies across cloud platforms, lack of centralized visibility, and inadequate use of automation. Many organizations still rely on manual processes for access provisioning and de-provisioning, exposing them to insider threats and policy drift, shadow IT, multi-cloud fragmentation, and rapid workforce mobility complicate identity governance [3]. As threat actors increasingly target credentials and identity misconfigurations, strengthening IAM has become essential for reducing the attack surface and preventing unauthorized access. Against this backdrop, cloud providers such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP) have developed comprehensive IAM frameworks. These platforms offer tools for policy management, federated identity, privilege administration, and security automation. However, using these tools effectively requires a strategic approach grounded in industry best practices. Understanding the capabilities, limitations, and implementation considerations of cloud IAM is therefore crucial for organizations seeking to build secure, scalable, and compliant cloud infrastructures.

2. The Importance of IAM in Cloud Security

Identity and Access Management (IAM) is a foundational component of cloud security, serving as the primary mechanism through which organizations control who can access specific resources and under what conditions. As enterprises migrate to cloud platforms, the traditional security perimeter dissolves, making identity the most important security boundary. Effective IAM protects cloud environments from unauthorized access, privilege misuse, credential theft, and policy misconfigurations—factors that contribute significantly to modern data breaches. The following subsections highlight the core reasons why IAM plays a critical role in cloud security.

2.1 Shared Responsibility Model

Cloud platforms operate under a Shared Responsibility Model, where security duties are divided between the cloud service provider and the customer. While providers such as AWS, Azure, and GCP ensure the security of physical infrastructure, network layers, and foundational hardware, customers retain responsibility for:

  • identity governance
  • access management
  • permissions and role configuration
  • secure credential handling
  • data classification and protection

This division places IAM at the center of customer-controlled security. Numerous cloud breaches have resulted from excessive privileges, weak authentication, and misconfigured policies—demonstrating that failures in IAM, rather than flaws in cloud infrastructure, remain a predominant risk. Thus, strong IAM practices are essential for fulfilling the customer’s obligations under the shared responsibility framework.

2.2 Distributed and Scalable Environments

Cloud ecosystems are highly dynamic, with resources created, modified, and decommissioned at rapid speed. Modern architectures rely on:

  • elastic virtual machines
  • containers and orchestration platforms
  • distributed storage systems
  • microservices communicating across APIs

Each component requires identity definitions and access policies. In such environments, manual access management becomes impractical and error-prone. IAM provides automated, scalable mechanisms to enforce permissions consistently, regardless of the number of users, applications, or services. Without such automation, organizations face increased risks of drift, orphaned privileges, and inconsistent access controls.

2.3 Human and Machine Identities

Cloud workloads increasingly rely on a wide array of identities beyond human users. These include:

  • APIs and web services
  • service accounts
  • serverless functions
  • automated scripts and CI/CD pipelines
  • IoT and edge devices

Each non-human entity interacts with cloud resources and therefore requires authentication, authorization, and secure credential management. Machine identities often outnumber human identities, making them a high-impact target for attackers. Robust IAM frameworks ensure proper lifecycle management, least-privilege access, credential rotation, and continuous monitoring for both human and machine identities [4].

2.4 Compliance Requirements

International regulatory and industry standards—such as GDPR, ISO 27001, HIPAA, and PCI-DSS—require strict access controls, traceability, and identity governance. Key compliance principles include:

  • verifiable user authentication
  • role-based or risk-based access controls
  • detailed logs of identity-related activities
  • periodic access reviews
  • enforcement of least privilege

Cloud IAM solutions provide built-in tools to meet these mandates through centralized policy management, audit trails, automated reporting, and monitoring. Compliance-driven IAM not only reduces legal and financial risks but also enhances overall cloud governance.

3. Core Principles of Cloud IAM

3.1 Principle of Least Privilege (PoLP)

The Principle of Least Privilege (PoLP) serves as one of the most fundamental pillars of cloud-based Identity and Access Management. It mandates that users, applications, and machine identities should receive only the minimum permissions required to complete their tasks. By restricting privileges to essential functions, organizations significantly reduce the risk of account misuse, privilege escalation, and lateral movement by attackers. In cloud environments—where identities often multiply rapidly due to dynamic workloads, temporary service accounts, and automated deployment pipelines—PoLP becomes especially critical [5]. Effective implementation involves continuous permission audits, enforcing granular access controls, and removing unused or obsolete privileges. Together, these practices help create a security environment where the potential impact of compromised identities or misconfigurations is minimized.

3.2 Zero Trust Security Model

The Zero Trust security framework provides a modern, highly effective approach for managing identity and access in cloud systems. Zero Trust operates on the foundational assumption that no user, device, or service should be inherently trusted, even if it originates from within the organization’s network or cloud infrastructure. Instead, every access request is evaluated based on explicit identity verification, contextual factors such as location or device health, and ongoing behavioral monitoring. In practice, Zero Trust strengthens cloud defenses by ensuring continuous authentication, segmentation of workloads, and conditional access policies that dynamically adjust privileges based on risk. This model aligns closely with the distributed and multi-cloud nature of today’s infrastructures, offering a scalable solution that reduces vulnerabilities associated with implicit trust and outdated perimeter-based security models.

3.3 Role-Based and Attribute-Based Access Control (RBAC and ABAC)

Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC) represent two central frameworks for structuring and enforcing access policies in the cloud. RBAC assigns permissions based on predefined roles, such as administrator, auditor, or developer, allowing organizations to manage large groups of users efficiently. ABAC, in contrast, evaluates access decisions based on attributes such as job function, department, device type, location, or even time of day. While RBAC supports simplicity and administrative efficiency, ABAC offers greater flexibility and precision through dynamic, context-aware access rules. Modern cloud environments increasingly adopt hybrid models that combine RBAC’s clarity with ABAC’s adaptability, enabling organizations to enforce granular and highly customizable access policies that match the complexity of distributed cloud workloads.

3.4 Identity Federation and Single Sign-On (SSO)

Identity federation and Single Sign-On (SSO) are essential components of cloud IAM, enabling seamless and secure authentication across multiple systems, applications, and cloud platforms. Federation relies on widely adopted protocols such as SAML, OAuth 2.0, and OpenID Connect to allow users to authenticate through a trusted identity provider rather than managing separate credentials for each cloud service. This approach reduces password fatigue, enhances user experience, and simplifies IT administration by centralizing identity verification. SSO further improves operational efficiency and security by enabling users to log in once and gain access to all authorized resources [6]. These mechanisms not only streamline multi-cloud access but also contribute to stronger security by reducing reliance on weak or repeated passwords and enabling consistent enforcement of authentication policies.

4. IAM Best Practices for Cloud Environments

4.1 Strengthen Authentication Mechanisms

Robust authentication serves as the first line of defense against unauthorized access in cloud environments. Enforcing multi-factor authentication (MFA) for all users—especially those with administrative privileges—is essential for mitigating credential theft and brute-force attacks. Organizations are increasingly adopting passwordless authentication methods such as biometrics, mobile push verification, or hardware security keys to reduce dependency on passwords, which are often weak or reused. Additionally, adaptive authentication techniques that consider user behavior, device profiles, and geographic location help dynamically adjust authentication requirements based on risk [7]. This combination of strong, contextual authentication significantly enhances identity assurance and reduces the likelihood of account compromise.

4.2 Implement Robust Authorization Controls

Authorization determines what authenticated users can access, making its accuracy crucial to cloud security. Applying the Principle of Least Privilege consistently across all identities minimizes exposure by granting only essential permissions. Access can be structured using RBAC and ABAC models, enabling organizations to assign permissions systematically based on roles or contextual attributes. Eliminating overly broad permissions—such as wildcard privileges or unrestricted administrative roles—reduces the risk of privilege escalation [8]. Regular access reviews and certification processes ensure outdated, unused, or unnecessary permissions are removed. This continuous refinement supports a secure access environment that aligns with organizational needs and regulatory expectations.

4.3 Secure Machine and Service Identities

Machine identities—such as APIs, serverless functions, service accounts, and automated scripts—play an increasingly critical role in cloud environments. Securing these identities requires rigorous management of secrets and credentials. API keys, tokens, and passwords should be rotated frequently and never hard-coded or stored in repositories. Instead, cloud-native secret managers and vault solutions provide secure storage, rotation, and lifecycle management for sensitive credentials. Automated key provisioning, certificate-based authentication, and short-lived token issuance further reduce the attack surface [9]. The implementing these measures, organizations can ensure that both human and non-human identities are equally protected.

4.4 Centralize Identity Management

Centralizing identity and access management helps maintain consistency, reduces administrative overhead, and simplifies auditing across multi-cloud environments. Organizations benefit from using a unified identity provider (IdP) that integrates seamlessly with major cloud platforms and enterprise applications. Centralization allows standardized IAM policies, uniform password policies, and consistent enforcement of security controls. Integrating IAM systems with human resource (HR) platforms supports automated onboarding and offboarding, reducing the likelihood of orphaned accounts or lingering privileges [10]. These practices strengthen governance and help maintain full visibility over identity lifecycles.

4.5 Apply Zero Trust Architecture

Zero Trust Architecture enhances cloud security by ensuring that no user or device is inherently trusted. Every access request is continuously verified, authenticated, and authorized based on dynamic risk assessment. Implementing Zero Trust requires segmenting cloud resources into smaller, isolated zones, limiting exposure and reducing the potential for lateral movement by attackers. Micro-segmentation—enabled through container orchestration platforms, virtual networks, and identity-aware proxies—ensures that access to each resource is tightly controlled. This model significantly strengthens security in distributed environments and aligns with modern cloud-native architectures.

4.6 Automate IAM Processes

Automation is essential for reducing human error, improving accuracy, and scaling access management across complex cloud environments. Infrastructure-as-Code (IaC) tools such as Terraform and AWS CloudFormation enable the automated creation, modification, and auditing of IAM policies. Automated provisioning and de-provisioning help ensure that users receive the correct permissions at the right time and that privileges are promptly revoked when no longer needed. Policy-as-code frameworks allow continuous compliance monitoring and rapid detection of misconfigurations [11], automation, organizations achieve more consistent enforcement of security policies and reduce operational overhead.

4.7 Logging, Monitoring, and Auditing

Effective IAM requires comprehensive visibility into identity-related activities. Logging and monitoring tools help track authentication attempts, privilege changes, and sensitive data access events, enabling early detection of suspicious behavior. Security Information and Event Management (SIEM) platforms provide advanced capabilities for correlating logs across systems, detecting anomalies, and supporting incident response. Regular audits and penetration testing further strengthen the IAM posture by identifying loopholes and ensuring alignment with best practices. Such continuous oversight is vital for maintaining trust and integrity in cloud systems.

4.8 Enforce Governance and Compliance

IAM governance ensures that identity policies and processes align with industry regulations and organizational standards. Regulatory frameworks such as GDPR, HIPAA, and PCI-DSS mandate strong authentication, access controls, and auditability. Maintaining detailed audit trails supports accountability and forensic investigations in the event of a breach. Compliance automation tools help organizations detect and remediate IAM policy violations in real time, improving readiness and reducing regulatory risks [12]. Effective governance integrates IAM into broader corporate security strategies, ensuring consistent protection of cloud assets and sensitive data.

5. Challenges in Cloud IAM Implementation

5.1 Complexity of Multi-Cloud Environments

Adopting multi-cloud strategies offers flexibility and resilience, but it also introduces significant IAM complexity. Each cloud provider—such as AWS, Azure, and Google Cloud—operates with its own unique identity models, policy structures, and access management frameworks. As organizations distribute workloads across these environments, maintaining consistent identity governance becomes increasingly difficult. Administrators must manage different permission models, authentication mechanisms, and policy languages, often resulting in fragmented control [14]. This lack of uniformity can lead to policy misalignment, configuration drift, and gaps in visibility, all of which elevate the risk of unauthorized access or security vulnerabilities.

5.2 Poorly Managed Privileged Accounts

Privileged accounts represent one of the most powerful and potentially dangerous identity categories within cloud environments. When privileged access is not tightly controlled, monitored, or restricted, it becomes a major attack vector for cybercriminals. Issues such as excessive privilege allocation, use of shared administrator accounts, and failure to rotate elevated permissions significantly weaken cloud security. Attackers often target privileged credentials because they provide unrestricted access to mission-critical systems and sensitive data. Without effective privileged access management (PAM), organizations face increased risks of insider abuse, escalation attacks, and large-scale breaches.

5.3 Credential Leakage

Credential leakage is one of the most pervasive and damaging challenges in cloud IAM. Exposed API keys, hard-coded passwords, access tokens stored in version control systems, and secrets embedded in scripts can inadvertently provide attackers with direct entry into cloud environments. Developers frequently commit these items unintentionally when pushing code, while automated workloads may rely on static credentials that are rarely rotated. Once leaked, such credentials can be exploited to bypass authentication controls entirely. The prevalence of credential exposure emphasizes the need for secure secret-management practices, automated rotation, and robust monitoring.

5.4 Human Errors in Configuration

Misconfigurations remain among the leading causes of cloud security incidents, and IAM errors contribute significantly to this category. Incorrectly configured roles, overly permissive policies, public access settings, and inconsistent permission inheritance can expose critical resources to unauthorized users or even the public internet. The complexity of cloud IAM tools, combined with manual policy creation, increases the likelihood of mistakes [15]. These errors often go unnoticed until an audit, penetration test, or breach occurs. Because cloud environments evolve rapidly, configuration oversight becomes an ongoing challenge, requiring continuous validation and automated policy checks.

5.5 Scalability Issues with Traditional IAM Models

Traditional IAM systems were designed for static, on-premises environments and struggle to support the dynamic nature of modern cloud architectures. Cloud workloads frequently scale up and down, deploy automatically, and rely heavily on machine identities. Legacy IAM frameworks cannot efficiently manage the volume, diversity, and rapid lifecycle changes of cloud resources. This results in delays in provisioning, inconsistent access enforcement, and operational bottlenecks [13]. As organizations adopt microservices, containers, and serverless computing, the limitations of traditional IAM solutions become more pronounced, highlighting the need for cloud-native IAM approaches tailored for elastic and distributed systems.

6. Future Trends in Cloud IAM

6.1 Identity Security Driven by Artificial Intelligence

Artificial intelligence (AI) and machine learning (ML) are poised to play a transformative role in the evolution of cloud IAM. As cloud environments become more dynamic and complex, traditional rule-based security tools struggle to keep pace with emerging threats. AI-driven IAM systems can continuously analyze vast volumes of identity-related data, including login patterns, device fingerprints, geolocation information, and application usage. These systems can identify anomalies, detect suspicious behavior, and predict potential breaches before they materialize. Machine learning models also enable adaptive authentication by adjusting security requirements based on real-time risk scores. Overall, AI-powered identity security strengthens threat detection, reduces false positives, and enhances the overall responsiveness of IAM frameworks.

6.2 Decentralized Identity Systems (Self-Sovereign Identity)

The rise of decentralized identity (DID), often referred to as self-sovereign identity, represents a fundamental shift in how digital identities are managed and verified. Unlike traditional identity systems that rely on centralized authorities, DID leverages blockchain technology to create secure, user-controlled, and cryptographically verifiable identities. This approach enhances privacy by allowing users to control how their identity attributes are shared across cloud platforms without exposing more information than necessary. For enterprises, decentralized identity systems streamline cross-platform authentication, reduce dependency on centralized identity providers, and improve trust in distributed cloud ecosystems. As cloud computing expands into multi-cloud and hybrid environments, DID is expected to provide a more secure, transparent, and interoperable identity model.

6.3 Automated Zero-Touch Access Control

Zero-touch access control represents the next stage in the evolution of automated identity management. Instead of relying on manual provisioning or administrative approval workflows, future IAM systems will dynamically evaluate contextual signals and automatically grant or revoke permissions. These signals may include user behavior, device posture, network conditions, and workload sensitivity. Zero-touch IAM ensures that access rights continuously adapt to changes in risk, workload requirements, and organizational policies [16]. This eliminates human error, reduces administrative overhead, and enhances real-time security. As organizations adopt microservices, DevOps, and continuous deployment pipelines, zero-touch access will become essential for maintaining accurate, least-privilege access at scale.

6.4 Identity Governance as Code

Identity Governance as Code (IGaC) is an emerging paradigm that applies infrastructure-as-code principles to the governance of identities and access policies. In this model, IAM configurations—such as roles, permissions, and compliance rules—are written in machine-readable code, version-controlled, and tested automatically before deployment [17]. This approach ensures consistency across environments, reduces misconfigurations, and provides a transparent audit trail of policy changes. By integrating policy code into CI/CD pipelines, organizations can enforce security and compliance earlier in the development process. As cloud ecosystems grow more complex, IGaC will become a critical mechanism for ensuring scalable, automated, and highly reliable identity governance.

7. Conclusion

Identity and access management is a critical pillar of cloud security. As organizations migrate to multi-cloud and hybrid environments, IAM grows in complexity and importance. Implementing best practices such as multi-factor authentication, least privilege access, identity federation, zero trust principles, and continuous monitoring ensures strong protection against evolving cyber threats. Automation, governance, and centralized identity controls further strengthen cloud security posture. By adopting these strategies, organizations can safeguard sensitive data, maintain regulatory compliance, and support efficient digital transformation.

References

  1. Mangiuc, D. M. (2012). Cloud identity and access management–A model proposal. Journal of Accounting and Management Information Systems (JAMIS)11(3), 484-500.
  2. Indu, I., Anand, P. R., & Bhaskar, V. (2018). Identity and access management in cloud environment: Mechanisms and challenges. Engineering science and technology, an international journal21(4), 574-588.
  3. Ahmed, K. E. U., & Alexandrov, V. (2011). Identity and Access Management in Cloud Computing. In Cloud Computing for Enterprise Architectures (pp. 115-133). London: Springer London.
  4. Mohiuddin Hussain Sohail Mohammed, Mohammed Shujath Ali Khan and Muffasil Mohiuddin Syed (2024). Enhancing Supply Chain Transparency and Trust through Blockchain Innovation. Journal of e-Science Letters. DOI: https://doi.org/10.51470/eSL.2024.5.4.08
  5. Bradford, M., Earp, J. B., & Grabski, S. (2014). Centralized end-to-end identity and access management and ERP systems: A multi-case analysis using the Technology Organization Environment framework. International Journal of Accounting Information Systems15(2), 149-165.
  6. Kumar, P. R., Raj, P. H., & Jelciana, P. (2018). Exploring data security issues and solutions in cloud computing. Procedia Computer Science125, 691-697.
  7. Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of network and computer applications34(1), 1-11.
  8. Mahalle, P. N., Anggorojati, B., Prasad, N. R., & Prasad, R. (2012). Identity authentication and capability based access control (iacac) for the internet of things. Journal of Cyber Security and Mobility1(4), 309-348.
  9. Ruj, S., Nayak, A., & Stojmenovic, I. (2011, November). DACC: Distributed access control in clouds. In 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (pp. 91-98). IEEE.
  10. Krutz, R. L., Krutz, R. L., & Russell Dean Vines, R. D. V. (2010). Cloud security a comprehensive guide to secure cloud computing. Wiley.
  11. Mohiuddin Hussain Sohail Mohammed, Mohammed Shujath Ali Khan, Muffasil Mohiuddin Syed (2023). Green Business Strategies: Sustainable Technologies and Digital Transformation. Journal of e-Science Letters. DOI: https://doi.org/10.51470/eSL.2023.4.1.06
  12. Tawalbeh, L. A., Muheidat, F., Tawalbeh, M., & Quwaider, M. (2020). IoT Privacy and security: Challenges and solutions. Applied Sciences10(12), 4102.
  13. Alouffi, B., Hasnain, M., Alharbi, A., Alosaimi, W., Alyami, H., & Ayaz, M. (2021). A systematic literature review on cloud computing security: threats and mitigation strategies. Ieee Access9, 57792-57807.
  14. Mohiuddin Hussain Sohail Mohammed, Mohammed Shujath Ali Khan, Muffasil Mohiuddin Syed (2023). Remote Work Culture: The Impact of Digital Transformation on Workforce Productivity. Journal of e-Science Letters. DOI: https://doi.org/10.51470/eSL.2023.4.1.01
  15. Campbell, Lori D., Jonas J. Astrin, Yvonne DeSouza, Judith Giri, Ashokkumar A. Patel, Melissa Rawley-Payne, Amanda Rush, and Nicole Sieffert. “The 2018 revision of the ISBER best practices: summary of changes and the editorial team’s development process.” Biopreservation and biobanking 16, no. 1 (2018): 3-6.
  16. Mishra, T. S. U., & Shubhalakshmi, B. S. (2010). Nonlinear finite element analysis of retrofitting of RCC beam column joint using CFRP. International Journal of Engineering and Technology, 2(5), 459.
  17. Alagar, V., & Wan, K. (2018, November). Uniform service description and contextual access control for trustworthy cloud computing. In 2018 International Conference on Cloud Computing, Big Data and Blockchain (ICCBB) (pp. 1-7). IEEE.
Scroll to Top