B. B. Linda, C. Richard, L. Kristin, T. Ric, and E. Mark, The evolving role of IT managers and CIOs? findings from the 2010 IBM global IT risk study, IBM, 2010.

H. Jay and N. Mark, Assessing the security risks of Cloud Computing, 2008.

F. Biennier, R. Aubry, and M. Maranzana, Integration of Business and Industrial Knowledge on Services to Set Trusted Business Communities of Organisations, IFIP Advances in Information and Communication Technology, pp.420-426, 2010.
DOI : 10.1007/978-3-642-15961-9_50

URL : https://hal.archives-ouvertes.fr/hal-01055964

Z. Su and F. Biennier, End-to-end security policy description and management for collaborative system, 2010 Sixth International Conference on Information Assurance and Security, pp.68-73, 2010.
DOI : 10.1109/ISIAS.2010.5604183

Z. Su and F. Biennier, End-to-end security policy description and management for collaborative system, 2010 Sixth International Conference on Information Assurance and Security, pp.137-142
DOI : 10.1109/ISIAS.2010.5604183

F. Paci, E. Bertino, and J. Crampton, An Access-Control Framework for WS-BPEL, International Journal of Web Services Research, vol.5, issue.3, pp.20-43, 2008.
DOI : 10.4018/jwsr.2008070102

L. Martino and . Bertinoe, Security for Web Services, International Journal of Web Services Research, vol.6, issue.4, pp.48-74, 2009.
DOI : 10.4018/jwsr.2009071303

T. Sans, F. Cuppens, and N. Cuppens-boulahia, FORM : A Federated Rights Expression Model for Open DRM Frameworks, Proc. ASIAN 2006, pp.45-59, 2007.
DOI : 10.1007/978-3-540-77505-8_5

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.126.7247

F. Cuppens, N. Cuppens-boulahis, and C. Coma, O2O: Virtual Private Organizations to Manage Security Policy Interoperability, Proc. ICISS 2006, pp.101-115, 2006.
DOI : 10.1007/11961635_7

F. Cuppens and N. Cuppens-boulahis, Modeling contextual security policies, International Journal of Information Security, vol.2, issue.3/4, pp.285-305, 2008.
DOI : 10.1007/s10207-007-0051-9

URL : https://hal.archives-ouvertes.fr/hal-01207773

L. Wang, D. Wijesekera, and S. Jajodia, A logic-based framework for attribute based access control, Proceedings of the 2004 ACM workshop on Formal methods in security engineering , FMSE '04, pp.45-55, 2004.
DOI : 10.1145/1029133.1029140

J. G. Alfaro, N. Cuppens-boulahia, and F. Cuppens, Complete analysis of configuration rules to guarantee reliable network security policies, International Journal of Information Security, vol.29, issue.2, pp.103-122, 2008.
DOI : 10.1007/s10207-007-0045-7

URL : https://hal.archives-ouvertes.fr/hal-01207771

N. Kheir, H. Debar, F. Cuppens, N. Cuppens-boulahia, and J. Viinikka, A Service Dependency Modeling Framework for Policy-Based Response Enforcement, Proc. DIMVA 2009, pp.176-195, 2009.
DOI : 10.1007/978-3-540-74035-3_2

URL : https://hal.archives-ouvertes.fr/hal-00433302

H. Debar, N. Kheir, N. Cuppens-boulahia, and F. Cuppens, Service Dependencies in Information Systems Security, Proc. MMM-ACNS 2010, pp.1-20, 2010.
DOI : 10.1007/978-3-642-14706-7_1

URL : https://hal.archives-ouvertes.fr/hal-01164740