In detail, how can the concept of cloud computing assist security managers in the future? In addition, in what way can the concept of concentric layers apply to the future design and application of access control and computers? Offer three specific examples.