Keamanan komputasi awan: Perbedaan antara revisi

Konten dihapus Konten ditambahkan
InternetArchiveBot (bicara | kontrib)
Rescuing 1 sources and tagging 0 as dead.) #IABot (v2.0.9.2
InternetArchiveBot (bicara | kontrib)
Add 2 books for Wikipedia:Pemastian (20231209)) #IABot (v2.0.9.5) (GreenC bot
 
(Satu revisi perantara oleh satu pengguna lainnya tidak ditampilkan)
Baris 121:
;Persyaratan kepatuhan yang unik
:Selain persyaratan yang menjadi subjek pelanggan, pusat data yang digunakan oleh penyedia cloud juga dapat tunduk pada persyaratan kepatuhan. Menggunakan penyedia layanan cloud (CSP) dapat menyebabkan masalah keamanan tambahan di sekitar yurisdiksi data karena data pelanggan atau penyewa tidak boleh tetap berada di sistem yang sama, atau di pusat data yang sama atau bahkan di dalam awan penyedia yang sama.<ref name="Securing the Cloud Winkler">{{cite book|last=Winkler|first=Vic|title=Securing the Cloud: Cloud Computer Security Techniques and Tactics|year=2011|publisher=Elsevier|location=Waltham, MA USA|isbn=978-1-59749-592-9|pages=65, 68, 72, 81, 218–219, 231, 240|url=http://www.elsevier.com/wps/find/bookdescription.cws_home/723529/description#description}}</ref>
:Peraturan GDPR Uni Eropa telah memperkenalkan persyaratan kepatuhan baru untuk data pelanggan.<ref>{{Cite web|url=https://www.safeswisscloud.ch/en/blog/general-data-protection-regulation-gdpr-how-does-new-european-data-protection-standard-impact|title=General Data Protection Regulation (GDPR): How does the new European data-protection standard impact a company's cloud strategy? Safe Swiss Cloud|url=https://safeswisscloud.com/en/blog/general-data-protection-regulation-gdpr-how-does-new-european-data-protection-standard-impact/|website=www.safeswisscloud.chcom|language=en|}}</ref>
 
== Masalah hukum dan kontrak ==
Baris 133:
== Bacaan lanjutan ==
* {{cite journal|ref=harv|title=The Fog over the Grimpen Mire: Cloud Computing and the Law|first=Miranda|last=Mowbray|year=2009|volume=6|issue=1|journal=SCRIPTed|page=129|url=http://www.law.ed.ac.uk/ahrc/script-ed/vol6-1/mowbray.asp|access-date=2018-10-21|archive-date=2015-12-21|archive-url=https://web.archive.org/web/20151221010802/http://www2.law.ed.ac.uk/ahrc/script-ed/vol6-1/mowbray.asp|dead-url=yes}}
* {{cite book|ref=harv|title=Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance|url=https://archive.org/details/cloudsecuritypri0000math|first1=Tim|last1=Mather|first2=Subra|last2=Kumaraswamy|first3=Shahed|last3=Latif|publisher=O'Reilly Media, Inc.|year=2009|isbn=9780596802769}}
* {{cite book|ref=harv|title=Securing the Cloud: Cloud Computer Security Techniques and Tactics|url=https://archive.org/details/securingcloudclo0000wink|first1=Vic|last1=Winkler|publisher=Elsevier|year=2011|isbn=9781597495929}}
* {{cite book|ref=harv|title=Securing the Virtual Environment: How to Defend the Enterprise Against Attack|url=https://archive.org/details/securingvirtuale0000otte|first1=Davi|last1=Ottenheimer|publisher=Wiley|year=2012|isbn=9781118155486}}
* {{cite journal|title=CloudID: Trustworthy Cloud-based and Cross-Enterprise Biometric Identification|first=Mohammad|last=Haghighat|year=2015|volume=42|issue=21|journal=Expert Systems with Applications|pages=7905–7916|doi=10.1016/j.eswa.2015.06.025}}