M. Armbrust, M. Fox, A. Griffith, and R. , Above the Clouds: A Berkeley View of Cloud Computing, 2009.

P. Mell and T. Grace, The NIST Definition of Cloud Computing (Draft), National Institute of Standards and Technology, 2011.

A. Lenk, M. Klems, J. Nimis, S. Tai, and T. Sandholm, What's inside the Cloud? An architectural map of the Cloud landscape, 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing, pp.23-31, 2009.
DOI : 10.1109/CLOUD.2009.5071529

W. A. Jansen, Cloud Hooks: Security and Privacy Issues in Cloud Computing, 2011 44th Hawaii International Conference on System Sciences, 2011.
DOI : 10.1109/HICSS.2011.103

R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon et al., Controlling data in the cloud, Proceedings of the 2009 ACM workshop on Cloud computing security, CCSW '09, 2009.
DOI : 10.1145/1655008.1655020

. Amazon, Case Studies http://aws.amazon.com/solutions

D. Nurmi, R. Wolski, C. Grzegorczyk, G. Obertelli, S. Soman et al., Eucalyptus: A technical Report on an Elastic Utility Computing Architecture Linking your Programs to Useful Systems, 2008.

C. Gentry, Fully homomorphic encryption using ideal lattices, Symposium on the Theory of, Computing, pp.169-178, 2009.

R. Leenes, Who Controls the Cloud?, IDP Revista de Internet Derecho y Pol??tica, vol.0, issue.11, 2010.
DOI : 10.7238/idp.v0i11.1081

R. France and B. Rumpe, Model-driven Development of Complex Software: A Research Roadmap, Future of Software Engineering (FOSE '07), pp.37-54, 2007.
DOI : 10.1109/FOSE.2007.14

URL : https://hal.archives-ouvertes.fr/inria-00511368

W. M. Van-der-aalst, Process Discovery: Capturing the Invisible, IEEE Computational Intelligence Magazine, vol.5, issue.1, pp.28-41, 2010.
DOI : 10.1109/MCI.2009.935307

D. Tancock, S. Pearson, and A. Charlesworth, A Privacy Impact Assessment Tool for Cloud Computing, Proceeding CLOUDCOM '10 Proceedings of the 2010 IEEE Second International Conference on Cloud Computing Technology and Science IEEE, 2010.
DOI : 10.1007/978-1-4471-4189-1_3

R. Neisse, D. Holling, and A. Pretschner, Implementing Trust in Cloud Infrastructures, 2011 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, 2011.
DOI : 10.1109/CCGrid.2011.35

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

. Amazon, Summary of the Amazon EC2 and Amazon RDS Service Disruption in the US East Region http

M. Christodorescu, R. Sailer, D. L. Schales, D. Sgandurra, and D. Zamboni, Cloud security is not (just) virtualization security, Proceedings of the 2009 ACM workshop on Cloud computing security, CCSW '09, 2009.
DOI : 10.1145/1655008.1655022

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

F. Doelitzscher, C. Reich, and A. Sulistio, Designing Cloud Services Adhering to Government Privacy Laws, 2010 10th IEEE International Conference on Computer and Information Technology, 2010.
DOI : 10.1109/CIT.2010.172

S. Pearson, Taking account of privacy when designing cloud computing services, 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing, pp.44-52, 2009.
DOI : 10.1109/CLOUD.2009.5071532

S. Pearson and A. Charlesworth, Accountability as a Way Forward for Privacy Protection in the Cloud, Proceedings of the 1st International Conference on Cloud Computing, 2009.
DOI : 10.1007/978-3-642-10665-1_12