Web services agreement specification (ws-agreement) In: Open Grid Forum, p.216, 2007. ,
Reaching Agreement in Security Policy Negotiation, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, pp.98-105, 2014. ,
DOI : 10.1109/TrustCom.2014.17
URL : https://hal.archives-ouvertes.fr/hal-01159836
Flexible sla negotiation using semantic annotations, Service-Oriented Computing. IC- SOC/ServiceWave 2009 Workshops, pp.165-175, 2010. ,
Optimis sla framework and term languages for slas in cloud environment, OPTIMIS Project Deliverable D, vol.2, 2011. ,
Organization based access control, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks, pp.120-131, 2003. ,
DOI : 10.1109/POLICY.2003.1206966
URL : https://hal.archives-ouvertes.fr/hal-01483818
Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996. ,
DOI : 10.1109/2.485845
Modeling contextual security policies, International Journal of Information Security, vol.2, issue.3/4, pp.285-305, 2008. ,
DOI : 10.1007/s10207-007-0051-9
URL : https://hal.archives-ouvertes.fr/hal-01207773
Context Ontology for Secure Interoperability, 2008 Third International Conference on Availability, Reliability and Security, pp.821-827, 2008. ,
DOI : 10.1109/ARES.2008.133
URL : https://hal.archives-ouvertes.fr/hal-00796516
The role mining problem, Proceedings of the 12th ACM symposium on Access control models and technologies , SACMAT '07, pp.175-184, 2007. ,
DOI : 10.1145/1266840.1266870
Mining a high level access control policy in a network with multiple firewalls, Journal of Information Security and Applications, vol.20, pp.61-73, 2015. ,
DOI : 10.1016/j.jisa.2014.10.010
URL : https://hal.archives-ouvertes.fr/hal-01207768
High Level Conflict Management Strategies in Advanced Access Control Models, Electronic Notes in Theoretical Computer Science, vol.186, pp.3-26, 2007. ,
DOI : 10.1016/j.entcs.2007.01.064
Preliminary architecture of the multi-cloud network virtualization infrastructure, 2015. ,
Motorbac 2: a security policy tool, 3rd Conference on Security in Network Architectures and Information Systems (SAR-SSI 2008), pp.273-288, 2008. ,
Automating resource selection and configuration in inter-clouds through a software product line method, 2015 IEEE 8th International Conference on, pp.726-733, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01252985
Policy based resource allocation in IaaS cloud, Future Generation Computer Systems, vol.28, issue.1, pp.94-103, 2012. ,
DOI : 10.1016/j.future.2011.05.016
A game-theoretic method of fair resource allocation for??cloud computing services, The Journal of Supercomputing, vol.21, issue.1, pp.252-269, 2010. ,
DOI : 10.1007/s11227-009-0318-1
Energy-aware resource allocation heuristics for efficient management of data centers for Cloud computing, Future Generation Computer Systems, vol.28, issue.5, pp.755-768, 2012. ,
DOI : 10.1016/j.future.2011.04.017
SLA-oriented resource provisioning for cloud computing: Challenges, architecture, and solutions, 2011 International Conference on Cloud and Service Computing, pp.1-10, 2011. ,
DOI : 10.1109/CSC.2011.6138522
Similarity Measure for Security Policies in Service Provider Selection, pp.227-242, 2015. ,
DOI : 10.1007/978-3-319-26961-0_14
URL : https://hal.archives-ouvertes.fr/hal-01392794
Security in service level agreements for cloud computing, In: CLOSER, pp.636-642, 2011. ,
Security for the cloud infrastructure: Trusted virtual data center implementation, IBM Journal of Research and Development, vol.53, issue.4, pp.6-7, 2009. ,
DOI : 10.1147/JRD.2009.5429060
Virtual Resource Orchestration Constraints in Cloud Infrastructure as a Service, Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, CODASPY '15, pp.183-194, 2015. ,
DOI : 10.1145/2699026.2699112
Mitigating Multi-Tenancy Risks in IaaS Cloud Through Constraints-Driven Virtual Resource Scheduling, Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, SACMAT '15, pp.63-74, 2015. ,
DOI : 10.1145/2752952.2752964
Supporting Security Requirements for Resource Management in Cloud Computing, 2012 IEEE 15th International Conference on Computational Science and Engineering, pp.170-177, 2012. ,
DOI : 10.1109/ICCSE.2012.32