@incollection{, E7A903DD6CAEC25CD0FD3C6207D96998 , author={{Yaser FuadAl-Dubai} and {Swami Ramanand Teerth Marathwada University}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}1411116 } @book{b0, , title={{Security Guidance for Critical Areas of Focus in Cloud Computing}} V3.0 Cloud Security Alliance } @book{b1, , author={{ WayneJansen } and { TimothyGrance }} , title={{Guidelines on Security and Privacy in Public Cloud Computing" NIST, NIST Special Publication}} , year={December 2011} } @incollection{b2, , title={{Cloud Computing: Benefits, risks and recommendations for information security}} , author={{ DCatteddu } and { GHogben }} , booktitle={{ENISA2009}} } @book{b3, , title={{An IntroductionTo Securing a Cloud Environment}} , author={{ ToddSteiner } and { HamedKhiabani }} , note={SANS institute 2012} } @incollection{b4, , title={{Security and Privacy Challenges in Cloud Computing Environments}} , author={{ HTakabi } and { JB DJoshi } and { GJAhn }} , journal={{IEEE Security and Privacy}} 8 6 , year={2010} } @book{b5, , title={{}} , author={{ LanZhou }} } @incollection{b6, , title={{Trusted Administration of Large-Scale Cryptographic Role-Based Access Control Systems}} , author={{ VVaradharajan } and { MHitchens }} , booktitle={{Trust, Security and Privacy in Computing and Communications (TrustCom)}} , year={2012. June 2012} 721 , note={IEEE 11th International Conference on} } @incollection{b7, , title={{Constructing Role-Based Access Control and Delegation Based on Hierarchical IBS}} , author={{ JinWang } and { ; Daxing Li; Qiang Li; BaiXi }} , booktitle={{NPC Workshops. IFIP International Conference on}} , year={2007. Sept. 2007} 118 , note={Network and Parallel Computing Workshops} } @incollection{b8, , title={{Role based access control models}} , author={{ RSSandhu } and { E1Coyne } and { HLFeinstein } and { CEYouman }} , journal={{IEEE Computer}} 29 2 , year={February 1996} } @book{b9, , title={{Above the Clouds: A Berkeley View of Cloud Computing}} , author={{ MArmbrust } and { AFox } and { RGriffith } and { ADJoseph } and { RHKatz } and { AKon-Winski } and { GLee }} , year={2009} } @book{b10, , title={{Limitations of the Kerberos Authentication System}} , author={{ SMBellovin } and { MMerritt }} }