L. Bobelin, A. Bousquet, J. Briffaut, J. Couturier, C. Toinard et al., An advanced securityaware cloud architecture, High Performance Computing & Simulation (HPCS), 2014 International Conference on. IEEE, pp.572-579, 2014.
DOI : 10.1109/hpcsim.2014.6903737

URL : https://hal.archives-ouvertes.fr/hal-01063852

. Cloud-security-alliance, Cloud Adoption Practices and Priorities Survey Report 2015, https://cloudsecurityalliance.org/download/cloud- adoption-practices-priorities-survey-report

T. Jaeger and J. Schiffman, Outlook: Cloudy with a Chance of Security Challenges and Improvements, IEEE Security & Privacy Magazine, vol.8, issue.1, pp.77-80, 2010.
DOI : 10.1109/MSP.2010.45

J. Y. Halpern and V. Weissman, Using First-Order Logic to Reason about Policies, ACM Transactions on Information and System Security, vol.11, issue.4, pp.1-21, 2008.
DOI : 10.1145/1380564.1380569

R. Sandhu, R. Boppana, R. Krishnan, J. Reich, T. Wolff et al., Towards a discipline of mission-aware cloud computing, Proceedings of the 2010 ACM workshop on Cloud computing security workshop, CCSW '10, pp.13-18, 2010.
DOI : 10.1145/1866835.1866839

K. Twidle, N. Dulay, E. Lupu, and M. Sloman, Ponder2: A policy system for autonomous pervasive environments, Autonomic and Autonomous Systems ICAS'09. Fifth International Conference on, pp.330-335, 2009.

S. Pearson, V. Tountopoulos, D. Catteddu, M. Südholt, R. Molva et al., Accountability for cloud and other future Internet services, 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, pp.629-632, 2012.
DOI : 10.1109/CloudCom.2012.6427512

URL : https://hal.archives-ouvertes.fr/hal-00778369

J. Chen, Y. Wang, and X. Wang, On-Demand Security Architecture for Cloud Computing, Computer, vol.45, issue.7, pp.73-78, 2012.
DOI : 10.1109/MC.2012.120

A. Wailly, M. Lacoste, and H. Debar, VESPA, Proceedings of the 9th international conference on Autonomic computing, ICAC '12, pp.155-160, 2012.
DOI : 10.1145/2371536.2371564

URL : https://hal.archives-ouvertes.fr/hal-00738174

A. D. Keromytis, R. Geambasu, S. Sethumadhavan, S. J. Stolfo, J. Yang et al., The MEERKATS Cloud Security Architecture, 2012 32nd International Conference on Distributed Computing Systems Workshops, pp.446-450, 2012.
DOI : 10.1109/ICDCSW.2012.42

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

R. He, M. Lacoste, and J. Leneutre, A Policy Management Framework for Self-Protection of Pervasive Systems, 2010 Sixth International Conference on Autonomic and Autonomous Systems, pp.104-109, 2010.
DOI : 10.1109/ICAS.2010.22

C. Ngo, P. Membrey, Y. Demchenko, and C. De-laat, Policy and Context Management in Dynamically Provisioned Access Control Service for Virtualized Cloud Infrastructures, 2012 Seventh International Conference on Availability, Reliability and Security, pp.343-349, 2012.
DOI : 10.1109/ARES.2012.81

V. C. Hu, E. Martin, J. Hwang, and T. Xie, Conformance Checking of Access Control Policies Specified in XACML, 31st Annual International Computer Software and Applications Conference, Vol. 2, (COMPSAC 2007), pp.275-280, 2007.
DOI : 10.1109/COMPSAC.2007.96

C. A. Ardagna, S. De-capitani-di-vimercati, S. Paraboschi, E. Pedrini, and P. Samarati, An XACML-based privacy-centered access control system, Proceedings of the first ACM workshop on Information security governance, WISG '09, pp.49-58, 2009.
DOI : 10.1145/1655168.1655178

R. Haines, The SELinux Notebook -Third Edition, 2012.

V. Samar, Unified login with pluggable authentication modules (PAM), Proceedings of the 3rd ACM conference on Computer and communications security , CCS '96, pp.1-10, 1996.
DOI : 10.1145/238168.238177

O. Andreasson, Iptables tutorial 1.2. 2, 2001.

T. Ylonen and C. Lonvick, The secure shell (ssh) connection protocol, 2006.
DOI : 10.17487/rfc4254

M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou, Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption, IEEE Transactions on Parallel and Distributed Systems, vol.24, issue.1, pp.131-143, 2013.
DOI : 10.1109/TPDS.2012.97

A. López-alt, E. Tromer, and V. Vaikuntanathan, On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption, Proceedings of the 44th symposium on Theory of Computing, STOC '12, pp.1219-1234, 2012.
DOI : 10.1145/2213977.2214086

S. Haddad, S. Dubus, A. Hecker, T. Kanstrén, B. Marquet et al., Operational security assurance evaluation in open infrastructures, 2011 6th International Conference on Risks and Security of Internet and Systems (CRiSIS), pp.1-6, 2011.
DOI : 10.1109/CRiSIS.2011.6061831

C. Criteria, Common Criteria for Information Technology Evaluation v3, 2012.

. Openscap, OpenSCAP Website, 2014.