Authentication and authorization in service oriented cloud computing architecture

(9) pp. 104-119 Arbër Beshiri