. Amdocs, Cloud Adoption in Small to Medium Sized Businesses, 2014.

S. Axelsson, The base-rate fallacy and its implications for the difficulty of intrusion detection, Proceedings of the 6th ACM conference on Computer and communications security , CCS '99, pp.1-7, 1999.
DOI : 10.1145/319709.319710

K. Bernsmed, M. G. Jaatun, and A. Undheim, Security in Service Level Agreements for Cloud Computing, CLOSER, pp.636-642, 2011.

R. G. Cascella, L. Blasi, Y. Jegou, M. Coppola, and C. Morin, Contrail: Distributed Application Deployment under SLA in Federated Heterogeneous Clouds, 2013.
DOI : 10.1007/978-3-642-38082-2_8

URL : https://hal.archives-ouvertes.fr/hal-00805713

G. Gu, P. Fogla, D. Dagon, W. Lee, and B. Skori´cskori´c, Measuring intrusion detection capability, Proceedings of the 2006 ACM Symposium on Information, computer and communications security , ASIACCS '06, pp.90-101, 2006.
DOI : 10.1145/1128817.1128834

Y. Jegou, P. Harsh, R. G. Cascella, F. Dudouet, and C. Morin, Managing OVF applications under SLA constraints on contrail virtual execution platform, Network and service management (cnsm), 2012 8th international conference and 2012 workshop on systems virtualiztion management (svm), pp.399-405, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00721786

K. T. Kearney, F. Torelli, and C. Kotsokalis, SLA★: An abstract syntax for Service Level Agreements, 2010 11th IEEE/ACM International Conference on Grid Computing, pp.217-224, 2010.
DOI : 10.1109/GRID.2010.5697973

F. Massicotte, F. Gagnon, Y. Labiche, L. Briand, and M. Couture, Automatic Evaluation of Intrusion Detection Systems, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06), pp.361-370, 2006.
DOI : 10.1109/ACSAC.2006.15

T. Probst, E. Alata, M. Kaâniche, and V. Nicomette, An Approach for the Automated Analysis of Network Access Controls in Cloud Computing Infrastructures, Network and System Security, pp.1-14, 2014.
DOI : 10.1007/978-3-319-11698-3_1

URL : https://hal.archives-ouvertes.fr/hal-01176045

T. Probst, E. Alata, M. Kaâniche, and V. Nicomette, Automated Evaluation of Network Intrusion Detection Systems in IaaS Clouds, 2015 11th European Dependable Computing Conference (EDCC), pp.49-60, 2015.
DOI : 10.1109/EDCC.2015.10

URL : https://hal.archives-ouvertes.fr/hal-01212064

D. Riquet, G. Grimaud, and M. Hauspie, DIS- CUS: A massively distributed IDS architecture using a DSL-based configuration, Information Science, Electronics and Electrical Engineering (ISEEE), 2014 International Conference on, pp.1193-1197, 2014.