[1]
Jain, R. et al. 2015. Analyzing Various Existing Security Techniques to Secure Data Access in Cloud Environment. International Journal of Computer Sciences and Engineering. 3, 1 (Jan. 2015), 130–136.