Three-Layer Access Control Integrated with Policy Enforcement Point
DOI:
https://doi.org/10.24203/hm10s210Keywords:
Cloud Computing, Security, Distributed Systems, Network Systems.Abstract
Cloud computing reflects significant risks which is associated with federal agencies and regulations. Any vulnerability that is initiated in the software or platform of the vendors will lead to the leakage of the data, as information may be related to more than one organization. Likewise, next generation solution provide assistance to the legacy system along with the provision of robust, elastic and low cost knowledge based tools of deeper exploration and understanding for processing massive data right to the end users. Moreover, the next generation solution business analytics provides in depth understanding of company clientele and product presentation
References
Zhou, Lan, Vijay Varadharajan, and Michael Hitchens. "Enforcing Role-Based Access Control for Secure Data Storage in the Cloud." Computer journal 54.10 (2011): 1675-87. Print.
Moreira, Marcelo Duffles Donato,"Capacity and Robustness Tradeoffs in Bloom Filters for Distributed Applications." IEEE Transactions on Parallel & Distributed Systems 23.12 (2012): 2219-30. Print.
Kanizo, Yossi, David Hay, and Isaac Keslassy. "Access-Efficient Balanced Bloom Filters." Depness Lab 36.4 (2013): 373-85. Print.
Guo, Deke, "The Dynamic Bloom Filters." IEEE Transactions on Knowledge & Data Engineering 22.1 (2010): 120-33. Print.
Crampton, J., W. Leung, and K. Beznosov. "The Secondary and Approximate Authorization Model and its Application to Bell-LaPadula Policies}, Booktitle = {Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies." (2006): 111. Print.
Guptill, Bruce, and William S. McNee. "SaaS SETS THE STAGE FOR 'Cloud Computing' (Cover Story)." Financial Executive 24.5 (2008): 37-44. Print.
SecureKey. "SecureKey Divests Hardware Security Token Group." (2013)Print.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Nader Shahata

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
- Papers must be submitted on the understanding that they have not been published elsewhere (except in the form of an abstract or as part of a published lecture, review, or thesis) and are not currently under consideration by another journal published by any other publisher.
- It is also the authors responsibility to ensure that the articles emanating from a particular source are submitted with the necessary approval.
- The authors warrant that the paper is original and that he/she is the author of the paper, except for material that is clearly identified as to its original source, with permission notices from the copyright owners where required.
- The authors ensure that all the references carefully and they are accurate in the text as well as in the list of references (and vice versa).
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Attribution-NonCommercial 4.0 International that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
- The journal/publisher is not responsible for subsequent uses of the work. It is the author's responsibility to bring an infringement action if so desired by the author.