40
DAFTAR PUSTAKA
Al-Qur’an dan terjemahan, Departemen Agama RI,Bandung: CV Diponegoro,2010 Ali, O., Shrestha, A., Soar, J., & Wamba, S. F. (2018). Cloud computing-enabled
healthcare opportunities, issues, and applications: A systematic review.
International Journal of Information Management, 43(July), 146–158.
https://doi.org/10.1016/j.ijinfomgt.2018.07.009
Aprianto, N. E. K. (2017). Konsep Harta dalam Tinjauan Maqashid Syariah. Journal of Islamic Economics Lariba, 3(2), 65–74. Retrieved from http://journal.uii.ac.id/JIELariba/article/download/9655/7819
Azeez, A., Perera, S., Gamage, D., Linton, R., Siriwardana, P., Leelaratne, D., … Fremantle, P. (2010). Multi-tenant SOA middleware for cloud computing.
Proceedings - 2010 IEEE 3rd International Conference on Cloud Computing, CLOUD 2010, 458–465. https://doi.org/10.1109/CLOUD.2010.50
Chen, D., & Zhao, H. (2012). Data security and privacy protection issues in cloud computing. Proceedings - 2012 International Conference on Computer Science and Electronics Engineering, ICCSEE 2012, 1(973), 647–651.
https://doi.org/10.1109/ICCSEE.2012.193
Dašić, P., Dašić, J., & Crvenković, B. (2016). Applications of access control as a service for software security. International Journal of Industrial Engineering and Management, 7(3), 111–116.
Harris S. Mike Meyers’ CISSP(R) Certification Passport. 1st ed. United States:
McGraw-Hill; 2002. p. 422
Haryanti, S. C., Pradipta, A., Atmoko, S. P. U., Rachmawati, U. A., Suhartanto, H.
(2017). Indonesian E-Health Community Cloud. Poster, SEAIP 4-8 Desember 2017, Taiwan.
Hermawan, K. D. (2003). 1 Perkembangan Iptek Dan Perspektif Al- Qur’an (Hermawan K. Dipojono). (September), 1–6.
Iswandi, A. (2015). Maslahat Memelihara Harta Dalam Sistem Ekonomi Islam.
SALAM: Jurnal Sosial Dan Budaya Syar’i, 1(1).
https://doi.org/10.15408/sjsbs.v1i1.1522
41
Katsir, I. (2014). Tafsir Ibnu Katsir. Terjemahan dalam Bahasa Indonesia oleh M.
Abdul Ghooffar E.M., Abdurrahim Mu’thi, Abu Ihsan Al-Atsari. Bogor: Pustaka Imam Asy-Syafi’i.
Kuo, A. M. H. (2011). Opportunities and challenges of cloud computing to improve health care services. Journal of medical Internet research, 13(3).
Liu, W. (2012). Research on Cloud Computing Security Problem and.pdf. 1216–1219.
Mell, P., & Grance, T. (2011). Certificate of registration - dried milk, why & whey protein. National Institute of Standard AndTechnology.
https://doi.org/10.1136/emj.2010.096966
Satapathy, S. C., Biswal, B. N., Udgata, S. K., & Mandal, J. K. (2015). Proceedings of the 3rd international conference on frontiers of intelligent computing: Theory and applications (FICTA) 2014: Volume 2. Advances in Intelligent Systems and Computing, 328, 1–11. https://doi.org/10.1007/978-3-319-12012-6
Wood, K., & Anderson, M. (2011). Understanding the complexity surrounding multitenancy in cloud computing. Proceedings - 2011 8th IEEE International Conference on e-Business Engineering, ICEBE 2011, 119–124.
https://doi.org/10.1109/ICEBE.2011.68
Wu, R., Zhang, X., Ahn, G. J., Sharifi, H., & Xie, H. (2013). Design and Implementation of Access Control as a Service for IaaS Cloud. Science, 2(3), 115–
130.
Younis, Y. A., Kifayat, K., & Merabti, M. (2014). An access control model for cloud computing. Journal of Information Security and Applications, 19(1), 45–60.
https://doi.org/10.1016/j.jisa.2014.04.003
Internet
Amazon(2019) Tentang Amazon https://aws.amazon.com/id/about-aws/
Diakses pada tanggal 30 April 2019, pukul 10.00.
IBM. (2012,). What is cloud computing? Available:
http://www.ibm.com/cloud1computing/ca/en/what1is1cloud1computing.html Diakses pada 28 April 2019, pukul 9.00.