M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz et al., A view of cloud computing, Communications of the ACM, vol.53, issue.4, pp.50-58, 2010.
DOI : 10.1145/1721654.1721672

. Cloud-security-alliance, The Notorious Nine -Cloud Computing Top Threats in 2013, Tech. Rep, 2013.

M. Jensen, J. Schwenk, J. Bohli, N. Gruschka, and L. Iacono, Security Prospects through Cloud Computing by Adopting Multiple Clouds, 2011 IEEE 4th International Conference on Cloud Computing, pp.565-572, 2011.
DOI : 10.1109/CLOUD.2011.85

M. Alzain, E. Pardede, B. Soh, and J. Thom, Cloud Computing Security: From Single to Multi-clouds, 2012 45th Hawaii International Conference on System Sciences, pp.5490-5499, 2012.
DOI : 10.1109/HICSS.2012.153

E. Goettelmann, W. Fdhila, and C. Godart, Partitioning and Cloud Deployment of Composite Web Services under Security Constraints, 2013 IEEE International Conference on Cloud Engineering (IC2E), 2013.
DOI : 10.1109/IC2E.2013.22

URL : https://hal.archives-ouvertes.fr/hal-00922186

N. Mayer, Model-based Management of Information System Security Risk, 2009.
URL : https://hal.archives-ouvertes.fr/tel-00402996

. Cloud-security-alliance, Cloud Control Matrix, " https: //cloudsecurityalliance.org/download/cloud-controls-matrix-v3, 2014.

W. Fdhila, M. Dumas, and C. Godart, Optimized decentralization of composite web services, Proceedings of the 6th International ICST Conference on Collaborative Computing: Networking, Applications, Worksharing, pp.1-10, 2010.
DOI : 10.4108/icst.collaboratecom.2010.1

URL : https://hal.archives-ouvertes.fr/inria-00537925

E. Goettelmann, N. Mayer, and C. Godart, A general approach for a trusted deployment of a business process in clouds, Proceedings of the Fifth International Conference on Management of Emergent Digital EcoSystems, MEDES '13, 2013.
DOI : 10.1145/2536146.2536164

URL : https://hal.archives-ouvertes.fr/hal-00922189

K. Dahman, F. Charoy, and C. Godart, Alignment and Change Propagation between Business Processes and Service-Oriented Architectures, 2013 IEEE International Conference on Services Computing, 2013.
DOI : 10.1109/SCC.2013.101

URL : https://hal.archives-ouvertes.fr/hal-00870721

T. Grandison, M. Bilger, L. O. Connor, M. Graf, M. Swimmer et al., Elevating the Discussion on Security Management: The Data Centric Paradigm, 2007 2nd IEEE/IFIP International Workshop on Business-Driven IT Management, pp.84-93, 2007.
DOI : 10.1109/BDIM.2007.375015

W. Zhou, M. Sherr, W. R. Marczak, Z. Zhang, T. Tao et al., Towards a data-centric view of cloud security, Proceedings of the second international workshop on Cloud data management, CloudDB '10, pp.25-32, 2010.
DOI : 10.1145/1871929.1871934

P. Watson, A multi-level security model for partitioning workflows over federated clouds, Journal of Cloud Computing: Advances, Systems and Applications, vol.1, issue.1, pp.180-188, 2011.
DOI : 10.1007/3-540-45848-4_57

S. Sackmann, L. Lowis, and K. Kittel, A risk based approach for selecting services in business process execution, Wirtschaftsinformatik, issue.1, pp.357-366, 2009.

. Cloud-security-alliance, Security, Trust and Assurance Registry, 2014.

W. Fdhila, U. Yildiz, and C. Godart, A Flexible Approach for Automatic Process Decentralization Using Dependency Tables, 2009 IEEE International Conference on Web Services, pp.9-847
DOI : 10.1109/ICWS.2009.41

URL : https://hal.archives-ouvertes.fr/inria-00433293

F. Leymann, C. Fehling, R. Mietzner, A. Nowak, and S. Dustdar, MOVING APPLICATIONS TO THE CLOUD: AN APPROACH BASED ON APPLICATION MODEL ENRICHMENT, International Journal of Cooperative Information Systems, vol.20, issue.03, pp.307-356, 2011.
DOI : 10.1142/S0218843011002250

N. Ahmed and R. Matulevicius, A taxonomy for assessing security in business process modelling, IEEE 7th International Conference on Research Challenges in Information Science (RCIS), pp.1-10
DOI : 10.1109/RCIS.2013.6577700

R. Conforti, M. De-leoni, M. L. Rosa, and W. M. Van-der-aalst, Supporting Risk-Informed Decisions during Business Process Execution, CAiSE'13, pp.116-132, 2013.
DOI : 10.1007/978-3-642-38709-8_8

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.380.3456

O. Altuhhova, R. Matulevicius, and N. Ahmed, Towards Definition of Secure Business Processes, CAiSE Workshops, pp.1-15, 2012.
DOI : 10.1007/978-3-642-31069-0_1

S. Wenzel, C. Wessel, T. Humberg, and J. Jürjens, Securing processes for outsourcing into the cloud, CLOSER, 2012, pp.675-680

B. Martens, M. Walterbusch, and F. Teuteberg, Costing of Cloud Computing Services: A Total Cost of Ownership Approach, 2012 45th Hawaii International Conference on System Sciences, pp.1563-1572, 2012.
DOI : 10.1109/HICSS.2012.186