C. Collberg and C. Thomborson, Watermarking, tamper-proofing, and obfuscation - tools for software protection, IEEE Transactions on Software Engineering, vol.28, issue.8, pp.735-746, 2002.
DOI : 10.1109/TSE.2002.1027797

E. G. , N. Mayer, and C. Godart, A general approach for a trusted deployment of a business process in clouds, ACM Fifth International Conference on Management of Emergent Digital EcoSystems (MEDES), pp.92-99, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00922189

W. M. Van-der-aalst, B. F. Van-dongen, J. Herbst, L. Maruster, G. Schimm et al., Workflow mining: A survey of issues and approaches, Data & Knowledge Engineering, vol.47, issue.2, pp.237-267, 2003.
DOI : 10.1016/S0169-023X(03)00066-1

W. Fdhila, M. Dumas, C. Godart, and L. García-bañuelos, Heuristics for composite Web service decentralization, Software and System Modeling, pp.599-619, 2014.
DOI : 10.1007/s10270-012-0262-z

URL : https://hal.archives-ouvertes.fr/hal-01098743

W. Fdhila, M. Dumas, and C. Godart, Optimized decentralization of composite web services, Proceedings of the 6th International ICST Conference on Collaborative Computing: Networking, Applications, Worksharing, pp.1-10, 2010.
DOI : 10.4108/icst.collaboratecom.2010.1

URL : https://hal.archives-ouvertes.fr/inria-00537925

. Cloud-security-alliance, The Notorious Nine -Cloud Computing Top Threats in 2013, Tech. Rep, 2013.

E. Goettelmann, K. Dahman, B. Gâteau, E. Dubois, and C. Godart, A Security Risk Assessment Model for Business Process Deployment in the Cloud, 2014 IEEE International Conference on Services Computing, pp.307-314, 2014.
DOI : 10.1109/SCC.2014.48

URL : https://hal.archives-ouvertes.fr/hal-01095874

. Cloud-security-alliance, Security, Trust and Assurance Registry, 2014.

E. V. Deutschland-eco-e, Eurocloud Star Audit, p.2012

A. Polyvyanyy, L. García-bañuelos, and M. Dumas, Structuring acyclic process models, Business Process Management -8th International Conference (BPM), pp.276-293, 2010.

D. E. Knuth, The genesis of attribute grammars, Attribute Grammars and their Applications, International Conference (WAGA)
DOI : 10.1007/3-540-53101-7_1

K. Bessai, S. Youcef, A. Oulamara, C. Godart, and S. Nurcan, Scheduling Strategies for Business Process Applications in Cloud Environments, International Journal of Grid and High Performance Computing, vol.5, issue.4, pp.65-78, 2013.
DOI : 10.4018/ijghpc.2013100105

M. Jensen, J. Schwenk, J. Bohli, N. Gruschka, and L. Iacono, Security Prospects through Cloud Computing by Adopting Multiple Clouds, 2011 IEEE 4th International Conference on Cloud Computing, pp.565-572, 2011.
DOI : 10.1109/CLOUD.2011.85

R. Conforti, M. L. Rosa, G. Fortino, A. H. Ter-hofstede, J. Recker et al., Real-time risk monitoring in business processes: A sensor-based approach, Journal of Systems and Software, vol.86, issue.11, pp.2939-2965, 2013.
DOI : 10.1016/j.jss.2013.07.024

H. Fill, Using obfuscating transformations for supporting the sharing and analysis of conceptual models, Multikonferenz Wirtschaftsinformatik, 2012.

M. Bentounsi, S. Benbernou, and M. J. Atallah, Privacy-Preserving Business Process Outsourcing, 2012 IEEE 19th International Conference on Web Services, pp.662-663, 2012.
DOI : 10.1109/ICWS.2012.34

URL : https://hal.archives-ouvertes.fr/hal-00727717

R. Khalaf and F. Leymann, E Role-based Decomposition of Business Processes using BPEL, 2006 IEEE International Conference on Web Services (ICWS'06), pp.770-780, 2006.
DOI : 10.1109/ICWS.2006.56

E. Goettelmann, W. Fdhila, and C. Godart, Partitioning and Cloud Deployment of Composite Web Services under Security Constraints, 2013 IEEE International Conference on Cloud Engineering (IC2E), pp.193-200, 2013.
DOI : 10.1109/IC2E.2013.22

URL : https://hal.archives-ouvertes.fr/hal-00922186

E. F. Duipmans, L. F. Pires, L. O. Da, and S. Santos, A Transformation-Based Approach to Business Process Management in the Cloud, Journal of Grid Computing, vol.58, issue.5, pp.191-219, 2014.
DOI : 10.1007/s10723-013-9278-z