목차
Title page 1
Contents 1
Executive Summary 1
Introduction 2
A shared cloud computing vocabulary 2
Cloud computing and artificial intelligence 4
Building trust 5
Digital sovereignty and data localization 7
Implications for cybersecurity and AI 14
Conclusion 17
Tables 8
Table 1. Key characteristics for digital sovereignty policies affecting cloud computing systems 8
Table 2. Illustrative policies mapped to characteristics for digital sovereignty policies affecting cloud computing systems 14
Graphics 10
Graphic 1. Region and Launch year 10
