CHAPTER 12

Cloud Security Access Control

Distributed Access Control

James T. Harmening

Computer Bits, Inc.

Chicago, Illinois

Randall DeVitto

Illinois State University

Orland Park, Illinois

CONTENTS

12.1  Introduction

12.2  Layers of Security Needs

12.2.1  Layer 1: User Interface

12.2.2  Layer 2: Application Software

12.2.3  Layer 3: Hosting Server Operating System

12.2.4  Layer 4: Hosting Infrastructure Hardware and Networking

12.3  Improvement at All Levels

12.4  Multilevel Authentication

12.5  Encryption

12.6  Password Management

12.7  Distributed Servers

12.8  Summary

Further Reading

References

12.1  INTRODUCTION

Cloud security access control can be a daunting task. Having hundreds of users accessing systems from across the world and with ...

Get Cloud Computing Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.