A. Andrieux, K. Czajkowski, A. Dan, K. Keahey, H. Ludwig et al., Web services agreement specification (ws-agreement) In: Open Grid Forum, p.216, 2007.

Y. Li, N. Cuppens-boulahia, J. M. Crom, F. Cuppens, and V. Frey, Reaching Agreement in Security Policy Negotiation, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, pp.98-105, 2014.
DOI : 10.1109/TrustCom.2014.17

URL : https://hal.archives-ouvertes.fr/hal-01159836

H. Muñoz, I. Kotsiopoulos, A. Micsik, B. Koller, and J. Mora, Flexible sla negotiation using semantic annotations, Service-Oriented Computing. IC- SOC/ServiceWave 2009 Workshops, pp.165-175, 2010.

W. Ziegler, M. Jiang, and K. Konstanteli, Optimis sla framework and term languages for slas in cloud environment, OPTIMIS Project Deliverable D, vol.2, 2011.

A. A. Kalam, R. Baida, P. Balbiani, S. Benferhat, F. Cuppens et al., Organization based access control, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks, pp.120-131, 2003.
DOI : 10.1109/POLICY.2003.1206966

URL : https://hal.archives-ouvertes.fr/hal-01483818

R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996.
DOI : 10.1109/2.485845

F. Cuppens and N. Cuppens-boulahia, Modeling contextual security policies, International Journal of Information Security, vol.2, issue.3/4, pp.285-305, 2008.
DOI : 10.1007/s10207-007-0051-9

URL : https://hal.archives-ouvertes.fr/hal-01207773

C. Coma, N. Cuppens-boulahia, F. Cuppens, and A. R. Cavalli, Context Ontology for Secure Interoperability, 2008 Third International Conference on Availability, Reliability and Security, pp.821-827, 2008.
DOI : 10.1109/ARES.2008.133

URL : https://hal.archives-ouvertes.fr/hal-00796516

J. Vaidya, V. Atluri, and Q. Guo, The role mining problem, Proceedings of the 12th ACM symposium on Access control models and technologies , SACMAT '07, pp.175-184, 2007.
DOI : 10.1145/1266840.1266870

S. Hachana, N. Cuppens-boulahia, and F. Cuppens, Mining a high level access control policy in a network with multiple firewalls, Journal of Information Security and Applications, vol.20, pp.61-73, 2015.
DOI : 10.1016/j.jisa.2014.10.010

URL : https://hal.archives-ouvertes.fr/hal-01207768

F. Cuppens, N. Cuppens-boulahia, and M. B. Ghorbel, High Level Conflict Management Strategies in Advanced Access Control Models, Electronic Notes in Theoretical Computer Science, vol.186, pp.3-26, 2007.
DOI : 10.1016/j.entcs.2007.01.064

M. V. Fernando and N. N. Ramos, Preliminary architecture of the multi-cloud network virtualization infrastructure, 2015.

F. Autrel, F. Cuppens, N. Cuppens-boulahia, and C. Coma, Motorbac 2: a security policy tool, 3rd Conference on Security in Network Architectures and Information Systems (SAR-SSI 2008), pp.273-288, 2008.

A. Ferreira-leite, V. Alves, G. Nunes-rodrigues, C. Tadonki, C. Eisenbeis et al., Automating resource selection and configuration in inter-clouds through a software product line method, 2015 IEEE 8th International Conference on, pp.726-733, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01252985

A. Nathani, S. Chaudhary, and G. Somani, Policy based resource allocation in IaaS cloud, Future Generation Computer Systems, vol.28, issue.1, pp.94-103, 2012.
DOI : 10.1016/j.future.2011.05.016

G. Wei, A. V. Vasilakos, Y. Zheng, and N. Xiong, A game-theoretic method of fair resource allocation for??cloud computing services, The Journal of Supercomputing, vol.21, issue.1, pp.252-269, 2010.
DOI : 10.1007/s11227-009-0318-1

A. Beloglazov, J. Abawajy, and R. Buyya, Energy-aware resource allocation heuristics for efficient management of data centers for Cloud computing, Future Generation Computer Systems, vol.28, issue.5, pp.755-768, 2012.
DOI : 10.1016/j.future.2011.04.017

R. Buyya, S. K. Garg, and R. N. Calheiros, SLA-oriented resource provisioning for cloud computing: Challenges, architecture, and solutions, 2011 International Conference on Cloud and Service Computing, pp.1-10, 2011.
DOI : 10.1109/CSC.2011.6138522

Y. Li, N. Cuppens-boulahia, J. M. Crom, F. Cuppens, V. Frey et al., Similarity Measure for Security Policies in Service Provider Selection, pp.227-242, 2015.
DOI : 10.1007/978-3-319-26961-0_14

URL : https://hal.archives-ouvertes.fr/hal-01392794

K. Bernsmed, M. G. Jaatun, and A. Undheim, Security in service level agreements for cloud computing, In: CLOSER, pp.636-642, 2011.

S. Berger, R. Cáceres, K. Goldman, D. Pendarakis, R. Perez et al., Security for the cloud infrastructure: Trusted virtual data center implementation, IBM Journal of Research and Development, vol.53, issue.4, pp.6-7, 2009.
DOI : 10.1147/JRD.2009.5429060

K. Bijon, R. Krishnan, and R. Sandhu, Virtual Resource Orchestration Constraints in Cloud Infrastructure as a Service, Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, CODASPY '15, pp.183-194, 2015.
DOI : 10.1145/2699026.2699112

K. Bijon, R. Krishnan, and R. Sandhu, Mitigating Multi-Tenancy Risks in IaaS Cloud Through Constraints-Driven Virtual Resource Scheduling, Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, SACMAT '15, pp.63-74, 2015.
DOI : 10.1145/2752952.2752964

R. Jhawar, V. Piuri, and P. Samarati, Supporting Security Requirements for Resource Management in Cloud Computing, 2012 IEEE 15th International Conference on Computational Science and Engineering, pp.170-177, 2012.
DOI : 10.1109/ICCSE.2012.32