W. Saas and C. Services, 2012 ? New Models for Delivering Software Available from: http://www.idc.com/getdoc.jsp?containerId=238635#, UM4QauTqmuM. 2. Media, M.R. Global Cloud Computing Market, p.839, 2012.

A. Gouglidis and I. Mavridis, On the Definition of Access Control Requirements for Grid and Cloud Computing Systems, Networks for Grid Applications, vol.37, issue.1, pp.19-26, 2010.
DOI : 10.1145/1057977.1057979

F. Hansen and V. Oleshchuk, Conformance checking of RBAC policy and its implementation. Information Security Practice and Experience, pp.144-155, 2005.

K. Jayaraman, Automatic error finding in access-control policies, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, 2011.
DOI : 10.1145/2046707.2046727

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.207.9707

K. Fisler, Verification and change-impact analysis of access-control policies, Proceedings of the 27th international conference on Software engineering, 2005.

C. Di-vimercati, S. , S. Foresti, and P. Samarati, Authorization and Access Control, in Security, Privacy, and Trust in Modern Data Management, pp.39-53, 2007.

R. S. Sandhu and P. S. , Access control: principle and practice, IEEE Communications Magazine, vol.32, issue.9, pp.40-49, 1994.
DOI : 10.1109/35.312842

I. Foster, Cloud computing and grid computing 360-degree compared. in Grid Computing Environments Workshop GCE'08 and Privacy: An Enterprise Perspective on Risks and Compliance, pp.292-304, 2008.
DOI : 10.1109/gce.2008.4738445

URL : http://arxiv.org/abs/0901.0131

P. Mell and T. Grance, The NIST definition of cloud computing (draft) NIST special publication 800: p. 145. 13. Sommerville, I. and G. Kotonya, Requirements engineering: processes and techniques, 1998.

C. Baier and J. P. Katoen, Principles of model checking, 2008.

K. Heljanko, Model Checking based Software Verification Available from: http://iplu.vtt.fi/digitalo/modelchecking.pdf. 16. Girard, A. and G. Pappas, Verification using simulation, Hybrid Systems: Computation and Control, pp.272-286, 2006.

R. Stevens, Systems engineering: coping with complexity. 1998: Pearson Education. 18. Gouglidis, A. and I. Mavridis, domRBAC: An access control model for modern collaborative systems, Computers & Security, 2012.

W. Tolone, Access control in collaborative systems, ACM Computing Surveys, vol.37, issue.1, pp.29-41, 1996.
DOI : 10.1145/1057977.1057979

V. C. Hu, D. R. Kuhn, and T. Xie, Property Verification for Generic Access Control Models, 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, 2008.
DOI : 10.1109/EUC.2008.22

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.143.3964

R. Kuhn, Y. Lei, and R. Kacker, Practical combinatorial testing: Beyond pairwise. IT Professional, pp.19-23, 2008.
DOI : 10.6028/NIST.SP.800-142

J. H. Hwang, ACPT: A Tool for Modeling and Verifying Access Control Policies, 2010 IEEE International Symposium on Policies for Distributed Systems and Networks, 2010.
DOI : 10.1109/POLICY.2010.22