O. Altuhhova, R. Matulevicius, and N. Ahmed, Towards Definition of Secure Business Processes, CAiSE Workshops, pp.1-15, 2012.
DOI : 10.1007/978-3-642-31069-0_1

. Cloud-security-alliance, Cloud Control Matrix / Security, Trust & Assurance Registry / Consensus Assessments Initiative Questionnaire

R. Conforti, M. De-leoni, M. L. Rosa, and W. M. Van-der-aalst, Supporting riskinformed decisions during business process execution, CAiSE'13, pp.116-132, 2013.

W. Fdhila, M. Dumas, and C. Godart, Optimized decentralization of composite web services, Proceedings of the 6th International ICST Conference on Collaborative Computing: Networking, Applications, Worksharing, pp.1-10, 2010.
DOI : 10.4108/icst.collaboratecom.2010.1

URL : https://hal.archives-ouvertes.fr/inria-00537925

W. Fdhila, U. Yildiz, and C. Godart, A Flexible Approach for Automatic Process Decentralization Using Dependency Tables, 2009 IEEE International Conference on Web Services, pp.847-855
DOI : 10.1109/ICWS.2009.41

URL : https://hal.archives-ouvertes.fr/inria-00433293

E. Goettelmann, W. Fdhila, and C. Godart, Partitioning and Cloud Deployment of Composite Web Services under Security Constraints, 2013 IEEE International Conference on Cloud Engineering (IC2E), 2013.
DOI : 10.1109/IC2E.2013.22

URL : https://hal.archives-ouvertes.fr/hal-00922186

F. Leymann, C. Fehling, R. Mietzner, A. Nowak, and S. Dustdar, MOVING APPLICATIONS TO THE CLOUD: AN APPROACH BASED ON APPLICATION MODEL ENRICHMENT, International Journal of Cooperative Information Systems, vol.20, issue.03, pp.307-356, 2011.
DOI : 10.1142/S0218843011002250

B. Martens, M. Walterbusch, and F. Teuteberg, Costing of Cloud Computing Services: A Total Cost of Ownership Approach, 2012 45th Hawaii International Conference on System Sciences, pp.1563-1572, 2012.
DOI : 10.1109/HICSS.2012.186

S. Sackmann, L. Lowis, and K. Kittel, A risk based approach for selecting services in business process execution, pp.357-366, 2009.

P. Watson, A multi-level security model for partitioning workflows over federated clouds, CloudCom, pp.180-188, 2011.
DOI : 10.1007/3-540-45848-4_57

S. Wenzel, C. Wessel, T. Humberg, and J. Jürjens, Securing processes for outsourcing into the cloud, CLOSER, pp.675-680, 2012.