![Quantum technique for access control in cloud computing II: Encryption and key distribution - ScienceDirect Quantum technique for access control in cloud computing II: Encryption and key distribution - ScienceDirect](https://ars.els-cdn.com/content/image/1-s2.0-S1084804517303922-gr1.jpg)
Quantum technique for access control in cloud computing II: Encryption and key distribution - ScienceDirect
![A survey on access control mechanisms for cloud computing - El Sibai - 2020 - Transactions on Emerging Telecommunications Technologies - Wiley Online Library A survey on access control mechanisms for cloud computing - El Sibai - 2020 - Transactions on Emerging Telecommunications Technologies - Wiley Online Library](https://onlinelibrary.wiley.com/cms/asset/e07946fb-6164-4e5a-9e5b-65c6473c2242/ett3720-fig-0001-m.jpg)
A survey on access control mechanisms for cloud computing - El Sibai - 2020 - Transactions on Emerging Telecommunications Technologies - Wiley Online Library
![A Modified Things Role Based Access Control Model for Securing Utilities in Cloud Computing | Semantic Scholar A Modified Things Role Based Access Control Model for Securing Utilities in Cloud Computing | Semantic Scholar](https://d3i71xaburhd42.cloudfront.net/4f5c568af5d27fc350e86820aa10935157fbf219/3-Figure1-1.png)