• Gadad V and Sowmyarani C. N. . (2023). A Comprehensive Review of Privacy Preserving Data Publishing (PPDP) Algorithms for Multiple Sensitive Attributes (MSA). Information Security and Privacy in Smart Devices. 10.4018/978-1-6684-5991-1.ch006. (142-193).

    https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-6684-5991-1.ch006

  • Sun P. Privacy Protection and Data Security in Cloud Computing: A Survey, Challenges, and Solutions. IEEE Access. 10.1109/ACCESS.2019.2946185. 7. (147420-147452).

    https://ieeexplore.ieee.org/document/8863330/

  • Pattaranantakul M, He R, Song Q, Zhang Z and Meddahi A. NFV Security Survey: From Use Case Driven Threat Analysis to State-of-the-Art Countermeasures. IEEE Communications Surveys & Tutorials. 10.1109/COMST.2018.2859449. 20:4. (3330-3368).

    https://ieeexplore.ieee.org/document/8419241/

  • Udoh E and Patterson B. Using the Balanced Scorecard Approach to Appraise the Performance of Cloud Computing. International Journal of Grid and High Performance Computing. 10.4018/IJGHPC.2016010104. 8:1. (50-57).

    http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJGHPC.2016010104

  • Ye X. (2015). Access Control for Cloud Applications 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom). 10.1109/UIC-ATC-ScalCom-CBDCom-IoP.2015.183. 978-1-4673-7211-4. (970-977).

    http://ieeexplore.ieee.org/document/7518362/

  • Udoh E, Patterson B and Cordle S. A Performance Analysis of Cloud Computing Using the Balanced Scorecard Approach. Proceedings of the 2014 Annual Global Online Conference on Information and Computer Technology. (11-16).

    https://doi.org/10.1109/GOCICT.2014.8

  • Manasrah A, Abu Nasir M and Salem M. (2019). A privacy-preserving multi-keyword search approach in cloud computing. Soft Computing. 10.1007/s00500-019-04033-z.

    http://link.springer.com/10.1007/s00500-019-04033-z

  • Kanwal T, Anjum A and Khan A. (2020). Privacy preservation in e-health cloud: taxonomy, privacy requirements, feasibility analysis, and opportunities. Cluster Computing. 10.1007/s10586-020-03106-1.

    http://link.springer.com/10.1007/s10586-020-03106-1