Watermarking, tamper-proofing, and obfuscation - tools for software protection, IEEE Transactions on Software Engineering, vol.28, issue.8, pp.735-746, 2002. ,
DOI : 10.1109/TSE.2002.1027797
A general approach for a trusted deployment of a business process in clouds, ACM Fifth International Conference on Management of Emergent Digital EcoSystems (MEDES), pp.92-99, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00922189
Workflow mining: A survey of issues and approaches, Data & Knowledge Engineering, vol.47, issue.2, pp.237-267, 2003. ,
DOI : 10.1016/S0169-023X(03)00066-1
Heuristics for composite Web service decentralization, Software and System Modeling, pp.599-619, 2014. ,
DOI : 10.1007/s10270-012-0262-z
URL : https://hal.archives-ouvertes.fr/hal-01098743
Optimized decentralization of composite web services, Proceedings of the 6th International ICST Conference on Collaborative Computing: Networking, Applications, Worksharing, pp.1-10, 2010. ,
DOI : 10.4108/icst.collaboratecom.2010.1
URL : https://hal.archives-ouvertes.fr/inria-00537925
The Notorious Nine -Cloud Computing Top Threats in 2013, Tech. Rep, 2013. ,
A Security Risk Assessment Model for Business Process Deployment in the Cloud, 2014 IEEE International Conference on Services Computing, pp.307-314, 2014. ,
DOI : 10.1109/SCC.2014.48
URL : https://hal.archives-ouvertes.fr/hal-01095874
Security, Trust and Assurance Registry, 2014. ,
Eurocloud Star Audit, p.2012 ,
Structuring acyclic process models, Business Process Management -8th International Conference (BPM), pp.276-293, 2010. ,
The genesis of attribute grammars, Attribute Grammars and their Applications, International Conference (WAGA) ,
DOI : 10.1007/3-540-53101-7_1
Scheduling Strategies for Business Process Applications in Cloud Environments, International Journal of Grid and High Performance Computing, vol.5, issue.4, pp.65-78, 2013. ,
DOI : 10.4018/ijghpc.2013100105
Security Prospects through Cloud Computing by Adopting Multiple Clouds, 2011 IEEE 4th International Conference on Cloud Computing, pp.565-572, 2011. ,
DOI : 10.1109/CLOUD.2011.85
Real-time risk monitoring in business processes: A sensor-based approach, Journal of Systems and Software, vol.86, issue.11, pp.2939-2965, 2013. ,
DOI : 10.1016/j.jss.2013.07.024
Using obfuscating transformations for supporting the sharing and analysis of conceptual models, Multikonferenz Wirtschaftsinformatik, 2012. ,
Privacy-Preserving Business Process Outsourcing, 2012 IEEE 19th International Conference on Web Services, pp.662-663, 2012. ,
DOI : 10.1109/ICWS.2012.34
URL : https://hal.archives-ouvertes.fr/hal-00727717
E Role-based Decomposition of Business Processes using BPEL, 2006 IEEE International Conference on Web Services (ICWS'06), pp.770-780, 2006. ,
DOI : 10.1109/ICWS.2006.56
Partitioning and Cloud Deployment of Composite Web Services under Security Constraints, 2013 IEEE International Conference on Cloud Engineering (IC2E), pp.193-200, 2013. ,
DOI : 10.1109/IC2E.2013.22
URL : https://hal.archives-ouvertes.fr/hal-00922186
A Transformation-Based Approach to Business Process Management in the Cloud, Journal of Grid Computing, vol.58, issue.5, pp.191-219, 2014. ,
DOI : 10.1007/s10723-013-9278-z