A. Lara, A. K. Ramamurthy, and B. , Network Innovation using OpenFlow: A Survey, IEEE Communications Surveys & Tutorials, vol.16, issue.1, pp.493-511, 2014.
DOI : 10.1109/SURV.2013.081313.00105

URL : http://digitalcommons.unl.edu/cgi/viewcontent.cgi?article=1164&context=csetechreports

B. Batista and M. Fernandez, Ponderflow: A policy specification language for openflow networks, The Thirteenth International Conference on Networks, pp.204-209, 2014.

Y. Ben-itzhak, K. Barabash, R. Cohen, A. Levin, and E. Raichstein, EnforSDN: Network policies enforcement with SDN, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), pp.80-88, 2015.
DOI : 10.1109/INM.2015.7140279

K. Bernsmed, M. G. Jaatun, and A. Undheim, Security in service level agreements for cloud computing, pp.636-642, 2011.

V. G. Bharadwaj and J. S. Baras, Towards automated negotiation of access control policies, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks, pp.111-119, 2003.
DOI : 10.1109/POLICY.2003.1206965

K. Bijon, R. Krishnan, and R. Sandhu, Virtual Resource Orchestration Constraints in Cloud Infrastructure as a Service, Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, CODASPY '15, pp.183-194, 2015.
DOI : 10.1007/978-3-642-27180-9_70

S. Bistarelli, U. Montanari, F. Rossi, T. Schiex, G. Verfaillie et al., Semiring-based csps and valued csps: Frameworks, properties, and comparison, Constraints, vol.4, issue.3, pp.199-240, 1999.
DOI : 10.1023/A:1026441215081

D. V. Chernov, Attribute based access control models, Prikladnaya Diskretnaya Matematika. Supplement pp, pp.79-82, 2012.

N. Damianou, N. Dulay, E. Lupu, and M. Sloman, The Ponder Policy Specification Language, Policies for Distributed Systems and Networks, pp.18-38, 2001.
DOI : 10.1007/3-540-44569-2_2

P. W. Fong, Relationship-based access control, Proceedings of the first ACM conference on Data and application security and privacy, CODASPY '11, pp.191-202, 2011.
DOI : 10.1145/1943513.1943539

V. D. Gligor, H. Khurana, R. K. Koleva, V. G. Bharadwaj, and J. S. Baras, On the negotiation of access control policies, International Workshop on Security Protocols, pp.188-201, 2001.

T. Hegr, L. Bohac, V. Uhlir, and P. Chlumsky, OpenFlow Deployment and Concept Analysis, Advances in Electrical and Electronic Engineering, vol.11, issue.5, p.327, 2013.
DOI : 10.15598/aeee.v11i5.884

URL : https://doi.org/10.15598/aeee.v11i5.884

H. Hu, W. Han, G. J. Ahn, and Z. Zhao, FLOWGUARD, Proceedings of the third workshop on Hot topics in software defined networking, HotSDN '14, pp.97-102, 2014.
DOI : 10.1145/2620728.2620749

S. S. Huang, T. J. Green, and B. T. Loo, Datalog and emerging applications, Proceedings of the 2011 international conference on Management of data, SIGMOD '11, pp.1213-1216, 2011.
DOI : 10.1145/1989323.1989456

A. A. Kalam, R. Baida, P. Balbiani, S. Benferhat, F. Cuppens et al., Organization based access control, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks, pp.120-131, 2003.
DOI : 10.1109/POLICY.2003.1206966

URL : https://hal.archives-ouvertes.fr/hal-01483818

K. Kaur, S. Kaur, and V. Gupta, Software Defined networking based routing firewall, 2016 International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT), pp.267-269, 2016.
DOI : 10.1109/ICCTICT.2016.7514590

A. Lara and B. Ramamurthy, OpenSec: Policy-Based Security Using Software-Defined Networking, IEEE Transactions on Network and Service Management, vol.13, issue.1, pp.30-42, 2016.
DOI : 10.1109/TNSM.2016.2517407

A. F. Leite, V. Alves, G. N. Rodrigues, C. Tadonki, C. Eisenbeis et al., Automating Resource Selection and Configuration in Inter-clouds through a Software Product Line Method, 2015 IEEE 8th International Conference on Cloud Computing, pp.2015-726, 2015.
DOI : 10.1109/CLOUD.2015.101

URL : https://hal.archives-ouvertes.fr/hal-01252985

Y. Li, N. Cuppens-boulahia, J. M. Crom, F. Cuppens, and V. Frey, Reaching Agreement in Security Policy Negotiation, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, pp.98-105, 2014.
DOI : 10.1109/TrustCom.2014.17

URL : https://hal.archives-ouvertes.fr/hal-01159836

Y. Li, N. Cuppens-boulahia, J. M. Crom, F. Cuppens, and V. Frey, Expression and Enforcement of Security Policy for Virtual Resource Allocation in IaaS Cloud, IFIP International Information Security and Privacy Conference, pp.105-118, 2016.
DOI : 10.1007/978-3-319-33630-5_8

URL : https://hal.archives-ouvertes.fr/hal-01369546

Y. Li, N. Cuppens-boulahia, J. M. Crom, F. Cuppens, V. Frey et al., Similarity Measure for Security Policies in Service Provider Selection, International Conference on Information Systems Security, pp.227-242, 2015.
DOI : 10.1109/TrustCom.2014.17

URL : https://hal.archives-ouvertes.fr/hal-01392794

P. Mehregan and P. W. Fong, Policy Negotiation for Co-owned Resources in Relationship-Based Access Control, Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, SACMAT '16, pp.125-136, 2016.
DOI : 10.1145/605434.605435

A. Nathani, S. Chaudhary, and G. Somani, Policy based resource allocation in IaaS cloud, Future Generation Computer Systems, vol.28, issue.1, pp.94-103, 2012.
DOI : 10.1016/j.future.2011.05.016

B. Pfaff, J. Pettit, K. Amidon, M. Casado, T. Koponen et al., Extending networking into the virtualization layer, p.Hotnets, 2009.

B. Pfaff, J. Pettit, T. Koponen, E. J. Jackson, A. Zhou et al., The design and implementation of open vswitch, pp.117-130, 2015.

E. Rissanen, extensible access control markup language (xacml) version 3.0 (committe specification 01). Tech. rep, OASIS, 2010.

S. Sadki and H. Bakkali, An approach for privacy policies negotiation in mobile health-Cloud environments, 2015 International Conference on Cloud Technologies and Applications (CloudTech), pp.1-6, 2015.
DOI : 10.1109/CloudTech.2015.7336983

R. S. Sandhu, E. J. Coynek, H. L. Feinsteink, and C. E. Youmank, Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996.
DOI : 10.1109/2.485845

URL : http://www.list.gmu.edu/journals/computer/pdf_ver/i93lbacm.pdf

D. Satasiya, Analysis of Software Defined Network firewall (SDF), 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), pp.228-231, 2016.
DOI : 10.1109/WiSPNET.2016.7566125

S. Shin and G. Gu, Cloudwatcher: Network security monitoring using openflow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?, 2012 20th IEEE international conference on network protocols (ICNP), pp.1-6, 2012.

S. Shin, P. A. Porras, V. Yegneswaran, M. W. Fong, G. Gu et al., Fresco: Modular composable security services for software-defined networks, p.NDSS, 2013.

Y. Tang, G. Cheng, Z. Xu, F. Chen, K. Elmansor et al., Automatic belief network modeling via policy inference for SDN fault localization, Journal of Internet Services and Applications, vol.5, issue.1, p.1, 2016.
DOI : 10.1145/2619239.2626304

URL : https://jisajournal.springeropen.com/track/pdf/10.1186/s13174-016-0043-y?site=jisajournal.springeropen.com

W. Xue, J. Huai, and Y. Liu, Access control policy negotiation for remote hotdeployed grid services, First International Conference on e-Science and Grid Computing (e-Science'05, p.9, 2005.

S. Zerkane, D. Espes, L. Parc, P. Cuppens, and F. , A Proactive Stateful Firewall for Software Defined Networking, Risks and Security of Internet and Systems - 11th International Conference, pp.123-138, 2016.
DOI : 10.1145/2602204.2602211

URL : https://hal.archives-ouvertes.fr/hal-01411346

S. Zerkane, D. Espes, L. Parc, P. Cuppens, and F. , Software Defined Networking Reactive Stateful Firewall, ICT Systems Security and Privacy Protection -31st IFIP TC 11 International Conference Proceedings. pp, pp.119-132, 2016.
DOI : 10.1007/978-3-319-33630-5_9

URL : https://hal.archives-ouvertes.fr/hal-01333445