. Gartner, The Market trends: Business process outsourcing, Western Europe, 2003.

A. Pasic, D. Serrano, P. Soria, J. Clarke, and P. Carvalho, Antonio Maña: Security and Dependability in the Evolving Service-Centric Architectures, Published in the Book " At Your service, 2009.

M. El-kharbili, S. Stein, I. Markovic, and E. Pulvermüller, Towards a Framework for Semantic Business Process Compliance Management, Proceedings of GRCIS, 2008.

T. Henry, Products for Managing Governance, Risk, and Compliance: Market Fluff or Relevant Stuff?, Burton Group In-Depth Research Report, 2008.

M. Bitsaki, O. Danylevych, W. J. Van-den-heuvel, G. Koutras, F. Leymann et al., An Architecture for Managing the Lifecycle of Business Goals for Partners in a Service Network, p.2008
DOI : 10.1007/978-3-540-89897-9_17

M. Bitsaki, O. Danylevych, W. J. Van-den-heuvel, G. Koutras, F. Leymann et al., Model Transformations to Leverage Service Networks, Proceedings of the 4th International Workshop on Engineering Service-Oriented Applications, 2008.
DOI : 10.1109/MS.2003.1231150

K. Namiri and N. Stojanovic, Towards Business Level Verification of Cross-Organizational Business Processes, Workshop on Semantics for Business Process Management (SBPM07), 2006.

K. Namiri and N. Stojanovic, A Formal Approach for Internal Controls Compliance in Business Processes, 8th Workshop on Business Process Modeling, Development, and Support (BPMDS07), 2007.

S. Sadiq, G. Governatori, and K. Namiri, Modeling Control Objectives for Business Process Compliance, Proceedings of the 5th International Conference, pp.149-164, 2007.
DOI : 10.1007/978-3-540-75183-0_12

M. E. Kharbili1, S. Stein, I. Markovic, and E. Pulvermuller, Towards a Framework for Semantic Business Process Compliance Management, 2008.

W. Olivier, The Economic Institutions of Capitalism, 1985.

A. Pasic, P. Soria-rodriguez, B. Gallego-nicasio, J. Calvo, R. Llarena et al., Towards a Real-Time Risk Assessment for Compliance Enforcement, 2009.

A. Refsdal and K. Stølen, Employing Key Indicators to Provide a Dynamic Risk Picture with a Notion of Confidence, Proceedings of the 3rd IFIP International Conference on Trust Management, 2009.
DOI : 10.1145/310889.310919

M. Gil-perez, G. Lopez, A. F. Gomez-skarmeta, and A. Pasic, Advanced Policies for the Administrative Delegation in Federated Environments

V. , D. Giacomo, K. Julisch, S. Burri, G. Karjoth et al., Protection and Assessment Model for Single Trust Domain. Public Deliverable of EU Research Project D2.1.1, MASTER -Managing Assurance, Security and Trust for sERvices, 2009.

M. Blaze, J. Feigenbaum, and J. Lacy, Decentralized trust management, Proceedings 1996 IEEE Symposium on Security and Privacy, 1996.
DOI : 10.1109/SECPRI.1996.502679

M. Blaze, J. Feigenbaum, and J. Lacy, Decentralized trust management, Proceedings 1996 IEEE Symposium on Security and Privacy, pp.164-173, 1996.
DOI : 10.1109/SECPRI.1996.502679

M. Blaze, J. Feigenbaum, J. Ioannidis, and A. Keromytis, The KeyNote Trust-Management System, 1999.

D. Clarke, J. E. Elien, C. Ellison, M. Fredette, A. Morcos et al., Certificate chain discovery in SPKI/SDSI, Journal of Computer Security, vol.9, issue.4, pp.285-322, 2001.
DOI : 10.3233/JCS-2001-9402

M. Y. Becker and P. Sewell, Cassandra: distributed access control policies with tunable expressiveness, Proceedings. Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, 2004. POLICY 2004., pp.159-168, 2004.
DOI : 10.1109/POLICY.2004.1309162

A. Herzberg, Y. Mass, J. Michaeli, Y. Ravid, and D. Naor, Access control meets public key infrastructure, or: assigning roles to strangers, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, pp.2-14, 2000.
DOI : 10.1109/SECPRI.2000.848442

C. Gunter and T. Jim, Policy-directed Certificate Retrieval. Software: Practice & Experience, pp.1609-1640, 2000.