
1 minute read
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue III Mar 2023- Available at www.ijraset.com
Advertisement
[13] Kshetri, N. (2013). Privacy and security issues in cloud computing: The role of institutions and institutional evolution. Telecommunications Policy, 37(4-5), 372-386.
[14] Almorsy, M., Grundy, J., & Ibrahim, A. S. (2016). Security in cloud computing: Opportunities and challenges. Information and Communications Technology, 10(1), 1-23.
[15] Cloud Security Alliance. (2017). Top Threats to Cloud Computing: Egregious Eleven Deep Dive. https://downloads.cloudsecurityalliance.org/assets/research/top-threats/TRE_Research_Top_Threats_Egregious_Eleven_Deep_Dive.pdf
[16] U.S. Department ofHealth & Human Services. (n.d.). Health Insurance Portabilityand Accountability Act (HIPAA). https://www.hhs.gov/hipaa/index.html
[17] NIST. (2017). Multifactor Authentication for E-Commerce. Retrieved from https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-177r1.pdf
[18] European Union. (2016). General Data ProtectionRegulation. Retrieved from https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:32016R0679