A view of cloud computing, Communications of the ACM, vol.53, issue.4, pp.50-58, 2010. ,
DOI : 10.1145/1721654.1721672
The Notorious Nine -Cloud Computing Top Threats in 2013, Tech. Rep, 2013. ,
Security Prospects through Cloud Computing by Adopting Multiple Clouds, 2011 IEEE 4th International Conference on Cloud Computing, pp.565-572, 2011. ,
DOI : 10.1109/CLOUD.2011.85
Cloud Computing Security: From Single to Multi-clouds, 2012 45th Hawaii International Conference on System Sciences, pp.5490-5499, 2012. ,
DOI : 10.1109/HICSS.2012.153
Partitioning and Cloud Deployment of Composite Web Services under Security Constraints, 2013 IEEE International Conference on Cloud Engineering (IC2E), 2013. ,
DOI : 10.1109/IC2E.2013.22
URL : https://hal.archives-ouvertes.fr/hal-00922186
Model-based Management of Information System Security Risk, 2009. ,
URL : https://hal.archives-ouvertes.fr/tel-00402996
Cloud Control Matrix, " https: //cloudsecurityalliance.org/download/cloud-controls-matrix-v3, 2014. ,
Optimized decentralization of composite web services, Proceedings of the 6th International ICST Conference on Collaborative Computing: Networking, Applications, Worksharing, pp.1-10, 2010. ,
DOI : 10.4108/icst.collaboratecom.2010.1
URL : https://hal.archives-ouvertes.fr/inria-00537925
A general approach for a trusted deployment of a business process in clouds, Proceedings of the Fifth International Conference on Management of Emergent Digital EcoSystems, MEDES '13, 2013. ,
DOI : 10.1145/2536146.2536164
URL : https://hal.archives-ouvertes.fr/hal-00922189
Alignment and Change Propagation between Business Processes and Service-Oriented Architectures, 2013 IEEE International Conference on Services Computing, 2013. ,
DOI : 10.1109/SCC.2013.101
URL : https://hal.archives-ouvertes.fr/hal-00870721
Elevating the Discussion on Security Management: The Data Centric Paradigm, 2007 2nd IEEE/IFIP International Workshop on Business-Driven IT Management, pp.84-93, 2007. ,
DOI : 10.1109/BDIM.2007.375015
Towards a data-centric view of cloud security, Proceedings of the second international workshop on Cloud data management, CloudDB '10, pp.25-32, 2010. ,
DOI : 10.1145/1871929.1871934
A multi-level security model for partitioning workflows over federated clouds, Journal of Cloud Computing: Advances, Systems and Applications, vol.1, issue.1, pp.180-188, 2011. ,
DOI : 10.1007/3-540-45848-4_57
A risk based approach for selecting services in business process execution, Wirtschaftsinformatik, issue.1, pp.357-366, 2009. ,
Security, Trust and Assurance Registry, 2014. ,
A Flexible Approach for Automatic Process Decentralization Using Dependency Tables, 2009 IEEE International Conference on Web Services, pp.9-847 ,
DOI : 10.1109/ICWS.2009.41
URL : https://hal.archives-ouvertes.fr/inria-00433293
MOVING APPLICATIONS TO THE CLOUD: AN APPROACH BASED ON APPLICATION MODEL ENRICHMENT, International Journal of Cooperative Information Systems, vol.20, issue.03, pp.307-356, 2011. ,
DOI : 10.1142/S0218843011002250
A taxonomy for assessing security in business process modelling, IEEE 7th International Conference on Research Challenges in Information Science (RCIS), pp.1-10 ,
DOI : 10.1109/RCIS.2013.6577700
Supporting Risk-Informed Decisions during Business Process Execution, CAiSE'13, pp.116-132, 2013. ,
DOI : 10.1007/978-3-642-38709-8_8
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.380.3456
Towards Definition of Secure Business Processes, CAiSE Workshops, pp.1-15, 2012. ,
DOI : 10.1007/978-3-642-31069-0_1
Securing processes for outsourcing into the cloud, CLOSER, 2012, pp.675-680 ,
Costing of Cloud Computing Services: A Total Cost of Ownership Approach, 2012 45th Hawaii International Conference on System Sciences, pp.1563-1572, 2012. ,
DOI : 10.1109/HICSS.2012.186