1 minute read

International Journal for Research in Applied Science & Engineering Technology (IJRASET)

ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538

Volume 11 Issue III Mar 2023- Available at www.ijraset.com

Advertisement

[13] Kshetri, N. (2013). Privacy and security issues in cloud computing: The role of institutions and institutional evolution. Telecommunications Policy, 37(4-5), 372-386.

[14] Almorsy, M., Grundy, J., & Ibrahim, A. S. (2016). Security in cloud computing: Opportunities and challenges. Information and Communications Technology, 10(1), 1-23.

[15] Cloud Security Alliance. (2017). Top Threats to Cloud Computing: Egregious Eleven Deep Dive. https://downloads.cloudsecurityalliance.org/assets/research/top-threats/TRE_Research_Top_Threats_Egregious_Eleven_Deep_Dive.pdf

[16] U.S. Department ofHealth & Human Services. (n.d.). Health Insurance Portabilityand Accountability Act (HIPAA). https://www.hhs.gov/hipaa/index.html

[17] NIST. (2017). Multifactor Authentication for E-Commerce. Retrieved from https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-177r1.pdf

[18] European Union. (2016). General Data ProtectionRegulation. Retrieved from https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:32016R0679

This article is from: