In Table 2, we map the identified cloud security issues into the suita terjemahan - In Table 2, we map the identified cloud security issues into the suita Bahasa Indonesia Bagaimana mengatakan

In Table 2, we map the identified c

In Table 2, we map the identified cloud security issues into the suitable categories defined earlier
(Table 1). We have labeled these issues with “I1, I2, …, In” where Ix refers to cloud security issue
number x. Special attention is required towards mutual security standards such as Secure Sockets Layer
(SSL)/Transport Layer Security (TLS), XML signature, XML Encryption Syntax and Processing, and
Key Management Interoperability Protocols. Currently, cloud computing lacks appropriate security
standards (I1) [1]. Even if security standards are defined properly, many security issues are still
associated with compliance risks (I2) due to lack of governess for audits and assessment of corporate
standards [1]. Cloud customers do not have enough knowledge of procedures, processes and practices
of the provider, especially in the areas of identity management and segregation of duties. Organizations
that seek to obtain certifications may be put on risk by denying an audit by cloud customers. One of the
most important aspect of cloud computing security is auditability (I3); however, we do not have an audit
net for cloud service providers [13,31]. If a service provider outsources a service to a third party where
functionality is not transparent, users must be able to inspect the whole process [12]. Security standards
(C1) and governing bodies are part of service level agreements (SLA) (I4) and legal aspects, respectively
which have not been taken into practices for cloud computing [32,33]. SLA defines the relationship
among parties (provider—recipient) and is extremely important for both parties [9]. It includes
identifying/defining the customer’s needs, simplifying complex issues, encouraging dialog in the event
of disputes, providing a framework for understanding, reducing/removing areas of conflict, eliminating
unrealistic expectations. The user may suffer, in case of data loss, if the above factors are not taken into
consideration as he may not be able to put claims on service providers. These interactions shape the
Trust (I5) relationship between the users and the different cloud stakeholders which is required when
users transfer data on cloud infrastructure [34]. Strong justifications are required to gain customers’ trust
in that regard.
0/5000
Dari: -
Ke: -
Hasil (Bahasa Indonesia) 1: [Salinan]
Disalin!
In Table 2, we map the identified cloud security issues into the suitable categories defined earlier(Table 1). We have labeled these issues with “I1, I2, …, In” where Ix refers to cloud security issuenumber x. Special attention is required towards mutual security standards such as Secure Sockets Layer(SSL)/Transport Layer Security (TLS), XML signature, XML Encryption Syntax and Processing, andKey Management Interoperability Protocols. Currently, cloud computing lacks appropriate securitystandards (I1) [1]. Even if security standards are defined properly, many security issues are stillassociated with compliance risks (I2) due to lack of governess for audits and assessment of corporatestandards [1]. Cloud customers do not have enough knowledge of procedures, processes and practicesof the provider, especially in the areas of identity management and segregation of duties. Organizationsthat seek to obtain certifications may be put on risk by denying an audit by cloud customers. One of themost important aspect of cloud computing security is auditability (I3); however, we do not have an auditnet for cloud service providers [13,31]. If a service provider outsources a service to a third party wherefunctionality is not transparent, users must be able to inspect the whole process [12]. Security standards(C1) and governing bodies are part of service level agreements (SLA) (I4) and legal aspects, respectivelywhich have not been taken into practices for cloud computing [32,33]. SLA defines the relationshipamong parties (provider—recipient) and is extremely important for both parties [9]. It includesidentifying/defining the customer’s needs, simplifying complex issues, encouraging dialog in the eventof disputes, providing a framework for understanding, reducing/removing areas of conflict, eliminatingunrealistic expectations. The user may suffer, in case of data loss, if the above factors are not taken intoconsideration as he may not be able to put claims on service providers. These interactions shape theTrust (I5) relationship between the users and the different cloud stakeholders which is required whenusers transfer data on cloud infrastructure [34]. Strong justifications are required to gain customers’ trustin that regard.
Sedang diterjemahkan, harap tunggu..
Hasil (Bahasa Indonesia) 2:[Salinan]
Disalin!
Pada Tabel 2, kita memetakan masalah keamanan awan diidentifikasi ke dalam kategori yang sesuai ditetapkan sebelumnya
(Tabel 1). Kami telah diberi label masalah ini dengan "I1, I2, ..., In" di mana Ix mengacu pada awan masalah keamanan
nomor x. Perhatian khusus diperlukan terhadap standar keamanan bersama seperti Secure Sockets Layer
(SSL) / Transport Layer Security (TLS), XML signature, XML Encryption Syntax dan Pengolahan, dan
Key Management Interoperability Protokol. Saat ini, komputasi awan tidak memiliki keamanan yang sesuai
standar (I1) [1]. Bahkan jika standar keamanan yang ditetapkan dengan benar, masalah keamanan banyak yang masih
terkait dengan risiko kepatuhan (I2) karena kurangnya pengasuh untuk audit dan penilaian perusahaan
standar [1]. Pelanggan Cloud tidak memiliki pengetahuan yang cukup tentang prosedur, proses dan praktek
penyedia, terutama di bidang manajemen identitas dan pemisahan tugas. Organisasi
yang berusaha untuk memperoleh sertifikasi dapat diletakkan pada risiko dengan menyangkal audit oleh pelanggan cloud. Salah satu
aspek yang paling penting dari keamanan komputasi awan adalah auditability (I3); Namun, kami tidak memiliki audit
bersih untuk penyedia layanan cloud [13,31]. Jika penyedia layanan outsourcing layanan kepada pihak ketiga di mana
fungsi tidak transparan, pengguna harus dapat memeriksa seluruh proses [12]. Standar keamanan
(C1) dan badan pemerintah merupakan bagian dari perjanjian tingkat layanan (SLA) (I4) dan aspek hukum, masing-masing
yang belum diambil ke dalam praktek untuk komputasi awan [32,33]. SLA mendefinisikan hubungan
antar pihak (provider-penerima) dan sangat penting bagi kedua belah pihak [9]. Ini termasuk
mengidentifikasi / menentukan kebutuhan pelanggan, menyederhanakan masalah yang kompleks, mendorong dialog dalam hal
sengketa, menyediakan kerangka kerja untuk memahami, mengurangi / menghilangkan daerah konflik, menghilangkan
harapan yang tidak realistis. Pengguna mungkin menderita, dalam kasus kehilangan data, jika faktor di atas tidak diambil dalam
pertimbangan karena ia mungkin tidak dapat menempatkan klaim pada penyedia layanan. Interaksi ini membentuk
Trust (I5) hubungan antara pengguna dan stakeholder awan yang berbeda yang diperlukan bila
pengguna mentransfer data pada infrastruktur cloud [34]. Pembenaran yang kuat diperlukan untuk mendapatkan kepercayaan pelanggan
dalam hal itu.
Sedang diterjemahkan, harap tunggu..
 
Bahasa lainnya
Dukungan alat penerjemahan: Afrikans, Albania, Amhara, Arab, Armenia, Azerbaijan, Bahasa Indonesia, Basque, Belanda, Belarussia, Bengali, Bosnia, Bulgaria, Burma, Cebuano, Ceko, Chichewa, China, Cina Tradisional, Denmark, Deteksi bahasa, Esperanto, Estonia, Farsi, Finlandia, Frisia, Gaelig, Gaelik Skotlandia, Galisia, Georgia, Gujarati, Hausa, Hawaii, Hindi, Hmong, Ibrani, Igbo, Inggris, Islan, Italia, Jawa, Jepang, Jerman, Kannada, Katala, Kazak, Khmer, Kinyarwanda, Kirghiz, Klingon, Korea, Korsika, Kreol Haiti, Kroat, Kurdi, Laos, Latin, Latvia, Lituania, Luksemburg, Magyar, Makedonia, Malagasi, Malayalam, Malta, Maori, Marathi, Melayu, Mongol, Nepal, Norsk, Odia (Oriya), Pashto, Polandia, Portugis, Prancis, Punjabi, Rumania, Rusia, Samoa, Serb, Sesotho, Shona, Sindhi, Sinhala, Slovakia, Slovenia, Somali, Spanyol, Sunda, Swahili, Swensk, Tagalog, Tajik, Tamil, Tatar, Telugu, Thai, Turki, Turkmen, Ukraina, Urdu, Uyghur, Uzbek, Vietnam, Wales, Xhosa, Yiddi, Yoruba, Yunani, Zulu, Bahasa terjemahan.

Copyright ©2025 I Love Translation. All reserved.

E-mail: