B. B. Linda, C. Richard, L. Kristin, T. Ric, and E. Mark, The evolving role of IT managers and CIOs?findings from the 2010 IBM global IT risk study, IBM, 2010.

Z. Su and F. Biennier, An architecture for implementing 'collaborative usage control' policy toward end-to-end security management in collaborative computing, p.2012

C. Hug, A. Front, D. Rieu, and B. Henderson-sellers, A method to build information systems engineering process metamodels, Journal of Systems and Software, vol.82, issue.10, pp.1730-1742, 2009.
DOI : 10.1016/j.jss.2009.05.020

URL : https://hal.archives-ouvertes.fr/hal-00450705

Y. Ducq, D. Chen, and B. Vallespir, Interoperability in enterprise modelling: requirements and roadmap, Advanced Engineering Informatics, vol.18, issue.4, pp.193-203, 2004.
DOI : 10.1016/j.aei.2005.01.006

Z. Su and F. Biennier, Toward Comprehensive Security Policy Governance in Collaborative Enterprise, APMS 2011, IFIP WG5, 2011.
DOI : 10.1007/978-3-642-33980-6_39

URL : https://hal.archives-ouvertes.fr/hal-01354489

Z. Maamar, D. Benslimane, P. Thiran, C. Ghedira, S. Dustdar et al., Towards a context-based multi-type policy approach for Web services composition, Data & Knowledge Engineering, vol.62, issue.2, pp.327-351, 2007.
DOI : 10.1016/j.datak.2006.08.007

Z. Su and F. Biennier, A collaborative-context oriented policy model for usage-control in business federation, 2011 International Conference on Uncertainty Reasoning and Knowledge Engineering, pp.201-204, 2011.
DOI : 10.1109/URKE.2011.6007870

L. Bussard, G. Neven, and F. Preiss, Downstream Usage Control, 2010 IEEE International Symposium on Policies for Distributed Systems and Networks, pp.22-29, 2010.
DOI : 10.1109/POLICY.2010.17

C. Ma, G. Lu, and J. Qiu, An authorization model for collaborative access control, Journal of Zhejiang University SCIENCE C, vol.11, issue.9, pp.699-717, 2010.
DOI : 10.1631/jzus.C0910564

P. Wilson, Positive perspectives on cloud security, Information Security Technical Report, vol.16, issue.3-4, pp.97-101, 2011.
DOI : 10.1016/j.istr.2011.08.002

H. Jay and N. Mark, Assessing the security risks of Cloud Computing, 2008.

A. Brown and J. S. Chase, Trusted platform-as-a-service, Proceedings of the 3rd ACM workshop on Cloud computing security workshop, CCSW '11, pp.15-20, 2011.
DOI : 10.1145/2046660.2046665

J. Bacon, D. Evans, D. M. Eyers, M. Migliavacca, P. Pietzuch et al., Enforcing end-to-end application security in the cloud (big ideas paper), Proc. 11th International Conference on Middleware, pp.293-312, 2010.

S. Blanc, Y. Ducq, and B. Vallespir, Evolution management towards interoperable supply chains using performance measurement, Computers in Industry, vol.58, issue.7, pp.720-732, 2007.
DOI : 10.1016/j.compind.2007.05.011

URL : https://hal.archives-ouvertes.fr/hal-00187297

P. Rao, D. Lin, E. Bertino, N. Li, and J. Lobo, Fine-grained integration of access control policies, Computers & Security, vol.30, issue.2-3, pp.91-107, 2011.
DOI : 10.1016/j.cose.2010.10.006