CHAPTER 12
Cloud Security Access Control: Distributed Access Control
Jim Harmening
Computer Bits, Inc.
Chicago, Illinois
Randall DeVitto
Illinois State University
Orland Park, Illinois
Contents
12.4 Layer 2 Application Software
12.5 Layer 3 Hosting Server Operating System
12.6 Layer 4 Hosting Infrastructure Hardware and Networking
12.7 Improvement at All Levels
12.8 Multi-Level Authentication
12.1 Introduction
Cloud Security Access control can be a daunting task. Having hundreds of users accessing systems from across the world and with many different devices can require a great ...