Towards Definition of Secure Business Processes, CAiSE Workshops, pp.1-15, 2012. ,
DOI : 10.1007/978-3-642-31069-0_1
Cloud Control Matrix / Security, Trust & Assurance Registry / Consensus Assessments Initiative Questionnaire ,
Supporting riskinformed decisions during business process execution, CAiSE'13, pp.116-132, 2013. ,
Optimized decentralization of composite web services, Proceedings of the 6th International ICST Conference on Collaborative Computing: Networking, Applications, Worksharing, pp.1-10, 2010. ,
DOI : 10.4108/icst.collaboratecom.2010.1
URL : https://hal.archives-ouvertes.fr/inria-00537925
A Flexible Approach for Automatic Process Decentralization Using Dependency Tables, 2009 IEEE International Conference on Web Services, pp.847-855 ,
DOI : 10.1109/ICWS.2009.41
URL : https://hal.archives-ouvertes.fr/inria-00433293
Partitioning and Cloud Deployment of Composite Web Services under Security Constraints, 2013 IEEE International Conference on Cloud Engineering (IC2E), 2013. ,
DOI : 10.1109/IC2E.2013.22
URL : https://hal.archives-ouvertes.fr/hal-00922186
MOVING APPLICATIONS TO THE CLOUD: AN APPROACH BASED ON APPLICATION MODEL ENRICHMENT, International Journal of Cooperative Information Systems, vol.20, issue.03, pp.307-356, 2011. ,
DOI : 10.1142/S0218843011002250
Costing of Cloud Computing Services: A Total Cost of Ownership Approach, 2012 45th Hawaii International Conference on System Sciences, pp.1563-1572, 2012. ,
DOI : 10.1109/HICSS.2012.186
A risk based approach for selecting services in business process execution, pp.357-366, 2009. ,
A multi-level security model for partitioning workflows over federated clouds, CloudCom, pp.180-188, 2011. ,
DOI : 10.1007/3-540-45848-4_57
Securing processes for outsourcing into the cloud, CLOSER, pp.675-680, 2012. ,