The evolving role of IT managers and CIOs?findings from the 2010 IBM global IT risk study, IBM, 2010. ,
An architecture for implementing 'collaborative usage control' policy toward end-to-end security management in collaborative computing, p.2012 ,
A method to build information systems engineering process metamodels, Journal of Systems and Software, vol.82, issue.10, pp.1730-1742, 2009. ,
DOI : 10.1016/j.jss.2009.05.020
URL : https://hal.archives-ouvertes.fr/hal-00450705
Interoperability in enterprise modelling: requirements and roadmap, Advanced Engineering Informatics, vol.18, issue.4, pp.193-203, 2004. ,
DOI : 10.1016/j.aei.2005.01.006
Toward Comprehensive Security Policy Governance in Collaborative Enterprise, APMS 2011, IFIP WG5, 2011. ,
DOI : 10.1007/978-3-642-33980-6_39
URL : https://hal.archives-ouvertes.fr/hal-01354489
Towards a context-based multi-type policy approach for Web services composition, Data & Knowledge Engineering, vol.62, issue.2, pp.327-351, 2007. ,
DOI : 10.1016/j.datak.2006.08.007
A collaborative-context oriented policy model for usage-control in business federation, 2011 International Conference on Uncertainty Reasoning and Knowledge Engineering, pp.201-204, 2011. ,
DOI : 10.1109/URKE.2011.6007870
Downstream Usage Control, 2010 IEEE International Symposium on Policies for Distributed Systems and Networks, pp.22-29, 2010. ,
DOI : 10.1109/POLICY.2010.17
An authorization model for collaborative access control, Journal of Zhejiang University SCIENCE C, vol.11, issue.9, pp.699-717, 2010. ,
DOI : 10.1631/jzus.C0910564
Positive perspectives on cloud security, Information Security Technical Report, vol.16, issue.3-4, pp.97-101, 2011. ,
DOI : 10.1016/j.istr.2011.08.002
Assessing the security risks of Cloud Computing, 2008. ,
Trusted platform-as-a-service, Proceedings of the 3rd ACM workshop on Cloud computing security workshop, CCSW '11, pp.15-20, 2011. ,
DOI : 10.1145/2046660.2046665
Enforcing end-to-end application security in the cloud (big ideas paper), Proc. 11th International Conference on Middleware, pp.293-312, 2010. ,
Evolution management towards interoperable supply chains using performance measurement, Computers in Industry, vol.58, issue.7, pp.720-732, 2007. ,
DOI : 10.1016/j.compind.2007.05.011
URL : https://hal.archives-ouvertes.fr/hal-00187297
Fine-grained integration of access control policies, Computers & Security, vol.30, issue.2-3, pp.91-107, 2011. ,
DOI : 10.1016/j.cose.2010.10.006