K. Beaver, What admins should know about Microsoft Azure security and vulnerabilities. http://searchwindowsserver.techtarget.com/tip/What- admins-should-know-about-Microsoft-Azure-security

B. Tech, Why enterprises that value security trust Microsoft Azure

A. L. Ferrara, P. Madhusudan, T. Lam-nguyen, and G. Parlato, Vac - Verifier of Administrative Role-Based Access Control Policies, CAV, 2014.
DOI : 10.1007/978-3-319-08867-9_12

A. L. Ferrara, P. Madhusudan, and G. Parlato, Security Analysis of Role-Based Access Control through Program Verification, 2012 IEEE 25th Computer Security Foundations Symposium, pp.113-125, 2012.
DOI : 10.1109/CSF.2012.28

A. L. Ferrara, P. Madhusudan, and G. Parlato, Policy Analysis for Self-administrated Role-Based Access Control, TACAS, pp.432-447, 2013.
DOI : 10.1007/978-3-642-36742-7_30

URL : https://eprints.soton.ac.uk/344391/1/ARBACpruning%2520%25282%2529.pdf

R. Freato, Microsoft Azure Security, 2015.

. Inforworld, The dirty dozen: 12 cloud security threats, 2016.

K. Jayaraman, M. V. Tripunitara, V. Ganesh, M. C. Rinard, and S. J. Chapin, Mohawk, ACM Transactions on Information and System Security, vol.15, issue.4, p.18, 2013.
DOI : 10.1145/2445566.2445570

X. Jin, R. Krishnan, and R. Sandhu, A role-based administration model for attributes, Proceedings of the First International Workshop on Secure and Resilient Architectures and Systems, SRAS '12, pp.7-12, 2012.
DOI : 10.1145/2420936.2420938

X. Jin, R. Krishnan, and R. Sandhu, Reachability analysis for role-based administration of attributes, Proceedings of the 2013 ACM workshop on Digital identity management, DIM '13, pp.73-84, 2013.
DOI : 10.1145/2517881.2517891

R. Krishnan, R. Sandhu, J. Niu, and W. Winsborough, A conceptual framework for Group-Centric secure information sharing, Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, ASIACCS '09, pp.384-387, 2009.
DOI : 10.1145/1533057.1533111

URL : http://www.list.gmu.edu/confrnc/asiaccs/p384-krishnan.pdf

L. Ronald, R. D. Krutz, and . Vines, Cloud security: A comprehensive guide to secure cloud computing, 2010.

N. Li and M. V. Tripunitara, Security analysis in role-based access control, 9th ACM SACMAT, pp.126-135, 2004.
DOI : 10.1145/990036.990058

M. Qiu, K. Gai, B. Thuraisingham, L. Tao, and H. Zhao, Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry, Future Generation Computer Systems, vol.80, 2016.
DOI : 10.1016/j.future.2016.01.006

S. Ranise, A. T. Truong, and A. Armando, Boosting Model Checking to Analyse Large ARBAC Policies, Security and Trust Management -8th International Workshop, STM, pp.273-288, 2012.
DOI : 10.1007/978-3-642-38004-4_18

M. Raykova, H. Zhao, M. Steven, and . Bellovin, Privacy Enhanced Access Control for Outsourced Data Sharing, International Conference on Financial Cryptography and Data Security, pp.223-238, 2012.
DOI : 10.1007/978-3-642-32946-3_17

K. Riad and Z. Yan, EAR-ABAC: An Extended AR-ABAC Access Control Model for SDN-Integrated Cloud Computing, International Journal of Computer Applications, vol.132, issue.14, pp.132-2015
DOI : 10.5120/ijca2015907649

K. Riad, Z. Yan, H. Hu, and G. Ahn, AR-ABAC: A New Attribute Based Access Control Model Supporting Attribute-Rules for Cloud Computing, 2015 IEEE Conference on Collaboration and Internet Computing (CIC), pp.28-35, 2015.
DOI : 10.1109/CIC.2015.38

A. Sasturkar, P. Yang, S. D. Stoller, and C. R. Ramakrishnan, Policy analysis for administrative role based access control, 19th IEEE Computer Security Foundations Workshop, pp.124-138, 2006.
DOI : 10.1016/j.tcs.2011.05.009

URL : https://doi.org/10.1016/j.tcs.2011.05.009

Z. Wan, . Jun-'e, R. Liu, and . Deng, HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing, IEEE Transactions on Information Forensics and Security, vol.7, issue.2, pp.743-754, 2012.
DOI : 10.1109/TIFS.2011.2172209

S. Yu, C. Wang, K. Ren, and W. Lou, Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing, 2010 Proceedings IEEE INFOCOM, pp.1-9, 2010.
DOI : 10.1109/INFCOM.2010.5462174

Y. Zhang, F. Patwa, and R. Sandhu, Community-Based Secure Information and Resource Sharing in Azure Cloud IaaS, Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, SCC '16, pp.82-89, 2016.
DOI : 10.1109/IRI.2015.71

Y. Zhang, F. Patwa, R. Sandhu, and B. Tang, Hierarchical Secure Information and Resource Sharing in OpenStack Community Cloud, 2015 IEEE International Conference on Information Reuse and Integration, pp.419-426, 2015.
DOI : 10.1109/IRI.2015.71