Three-Layer Access Control Integrated with Policy Enforcement Point

Authors

  • Nader Shahata Cyber Security Research and Development Center, Natioanl Institute of Informatics, Tokyo, Japan

DOI:

https://doi.org/10.24203/hm10s210

Keywords:

Cloud Computing, Security, Distributed Systems, Network Systems.

Abstract

Cloud computing reflects significant risks which is associated with federal agencies and regulations. Any vulnerability that is initiated in the software or platform of the vendors will lead to the leakage of the data, as information may be related to more than one organization. Likewise, next generation solution provide assistance to the legacy system along with the provision of robust, elastic and low cost knowledge based tools of deeper exploration and understanding for processing massive data right to the end users. Moreover, the next generation solution business analytics provides in depth understanding of company clientele and product presentation

References

Zhou, Lan, Vijay Varadharajan, and Michael Hitchens. "Enforcing Role-Based Access Control for Secure Data Storage in the Cloud." Computer journal 54.10 (2011): 1675-87. Print.

Moreira, Marcelo Duffles Donato,"Capacity and Robustness Tradeoffs in Bloom Filters for Distributed Applications." IEEE Transactions on Parallel & Distributed Systems 23.12 (2012): 2219-30. Print.

Kanizo, Yossi, David Hay, and Isaac Keslassy. "Access-Efficient Balanced Bloom Filters." Depness Lab 36.4 (2013): 373-85. Print.

Guo, Deke, "The Dynamic Bloom Filters." IEEE Transactions on Knowledge & Data Engineering 22.1 (2010): 120-33. Print.

Crampton, J., W. Leung, and K. Beznosov. "The Secondary and Approximate Authorization Model and its Application to Bell-LaPadula Policies}, Booktitle = {Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies." (2006): 111. Print.

Guptill, Bruce, and William S. McNee. "SaaS SETS THE STAGE FOR 'Cloud Computing' (Cover Story)." Financial Executive 24.5 (2008): 37-44. Print.

SecureKey. "SecureKey Divests Hardware Security Token Group." (2013)Print.

Downloads

Published

06-02-2025

How to Cite

Three-Layer Access Control Integrated with Policy Enforcement Point . (2025). Asian Journal of Computer and Information Systems, 12(1). https://doi.org/10.24203/hm10s210

Similar Articles

11-20 of 65

You may also start an advanced similarity search for this article.