The evolving role of IT managers and CIOs? findings from the 2010 IBM global IT risk study, IBM, 2010. ,
Assessing the security risks of Cloud Computing, 2008. ,
Integration of Business and Industrial Knowledge on Services to Set Trusted Business Communities of Organisations, IFIP Advances in Information and Communication Technology, pp.420-426, 2010. ,
DOI : 10.1007/978-3-642-15961-9_50
URL : https://hal.archives-ouvertes.fr/hal-01055964
End-to-end security policy description and management for collaborative system, 2010 Sixth International Conference on Information Assurance and Security, pp.68-73, 2010. ,
DOI : 10.1109/ISIAS.2010.5604183
End-to-end security policy description and management for collaborative system, 2010 Sixth International Conference on Information Assurance and Security, pp.137-142 ,
DOI : 10.1109/ISIAS.2010.5604183
An Access-Control Framework for WS-BPEL, International Journal of Web Services Research, vol.5, issue.3, pp.20-43, 2008. ,
DOI : 10.4018/jwsr.2008070102
Security for Web Services, International Journal of Web Services Research, vol.6, issue.4, pp.48-74, 2009. ,
DOI : 10.4018/jwsr.2009071303
FORM : A Federated Rights Expression Model for Open DRM Frameworks, Proc. ASIAN 2006, pp.45-59, 2007. ,
DOI : 10.1007/978-3-540-77505-8_5
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.126.7247
O2O: Virtual Private Organizations to Manage Security Policy Interoperability, Proc. ICISS 2006, pp.101-115, 2006. ,
DOI : 10.1007/11961635_7
Modeling contextual security policies, International Journal of Information Security, vol.2, issue.3/4, pp.285-305, 2008. ,
DOI : 10.1007/s10207-007-0051-9
URL : https://hal.archives-ouvertes.fr/hal-01207773
A logic-based framework for attribute based access control, Proceedings of the 2004 ACM workshop on Formal methods in security engineering , FMSE '04, pp.45-55, 2004. ,
DOI : 10.1145/1029133.1029140
Complete analysis of configuration rules to guarantee reliable network security policies, International Journal of Information Security, vol.29, issue.2, pp.103-122, 2008. ,
DOI : 10.1007/s10207-007-0045-7
URL : https://hal.archives-ouvertes.fr/hal-01207771
A Service Dependency Modeling Framework for Policy-Based Response Enforcement, Proc. DIMVA 2009, pp.176-195, 2009. ,
DOI : 10.1007/978-3-540-74035-3_2
URL : https://hal.archives-ouvertes.fr/hal-00433302
Service Dependencies in Information Systems Security, Proc. MMM-ACNS 2010, pp.1-20, 2010. ,
DOI : 10.1007/978-3-642-14706-7_1
URL : https://hal.archives-ouvertes.fr/hal-01164740