D. Androcec, N. Vrcek, and J. Seva, Cloud computing ontologies: a systematic review, Proceedings of the third international conference on models and ontology-based design of protocols, architectures and services. 2012, pp.9-14

P. Barot, Cloud Computing -Evolution in der Technik, Revolution im Business, 2009.

M. Benantar, Access control systems: security, identity management and trust models, 2006.

E. Commission, R. Proposal, . Of, . European, . Parliament et al., on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation), 2012.

S. Fenz and A. Ekelhart, Formalizing information security knowledge, Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, ASIACCS '09, pp.183-194, 2009.
DOI : 10.1145/1533057.1533084

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.205.9959

A. Herzog, N. Shahmehri, and C. Duma, An Ontology of Information Security, International Journal of Information Security and Privacy, vol.1, issue.4, pp.1-23, 2007.
DOI : 10.4018/jisp.2007100101

T. Humberg, Using Ontologies to Analyze Compliance Requirements of Cloud-Based Processes, Cloud Computing and Services Science, pp.36-51, 2014.
DOI : 10.1007/978-3-319-14224-1_3

J. Kebbedies, Conceptualized Policy Design for User-Regulated Trusted Clouds, UCC 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing, 2015.

M. Kifer and G. Lausen, F-logic: A Higher-order Language for Reasoning About Objects, Inheritance, and Scheme, Proceedings of the 1989 ACM SIGMOD International Conference on Management of Data. SIGMOD '89, pp.134-146, 1989.
DOI : 10.1145/66926.66939

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1032.4486

F. Kluge, Entwicklung und Konzeption zur Umsetzung einer Transformation von einer ontologischen beschriebenen Policysemantik in eine sichere agentenbasierte Ablaufsteuerung, 2016.

A. Ott, Mandatory Rule Set Based Access Control in Linux: A Multipolicy Security Framework and Role Model Solution for Access Control in Networked Linux Systems, pp.383226423-9783832264239, 2007.

G. Recht, Bundesdatenschutzgesetz (BDSG) (German Edition) CreateSpace Independent Publishing Platform, 2014.

C. Trusting and . Group, TCG Software Stack Specification, 2009.

L. Youseff, M. Butrico, and D. Silva, Toward a Unified Ontology of Cloud Computing, 2008 Grid Computing Environments Workshop, pp.1-10, 2008.
DOI : 10.1109/GCE.2008.4738443