M. Luis, L. Vaquero, J. Rodero-merino, M. Caceres, and . Lindner, A break in the clouds: Towards a cloud definition, SIGCOMM Comput. Commun. Rev, vol.39, issue.1, pp.50-55, 2008.

A. Madhavapeddy, R. Mortier, C. Rotsos, D. Scott, B. Singh et al., Unikernels, ACM SIGPLAN Notices, vol.48, issue.4, pp.461-472, 2013.
DOI : 10.1145/2499368.2451167

A. Waller, I. Sandy, E. Power, E. Aivaloglou, C. Skianis et al., Policy Based Management for Security in Cloud Computing, FTRA International Conference on Secure and Trust Computing, Data Management, and Application, pp.130-137, 2011.
DOI : 10.1109/EUROMICRO.2005.52

A. Bessani, A. Leucio, G. Cutillo, N. Ramunno, P. Schirmer et al., The TClouds Platform, ACM SIGOPS Operating Systems Review, vol.48, issue.2, pp.13-22, 2014.
DOI : 10.1145/1435417.1435432

G. Dreo, M. Golling, W. Hommel, and F. Tietze, ICEMAN: An Architecture for Secure Federated Inter-cloud Identity Management, Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management (IFIP/IEEE IM 2013), 2013.

. Olubisi-atinuke-runsewe, A Policy-Based Management Framework for Cloud Computing Security, 2014.

M. Compastié, R. Badonnel, O. Festor, R. He, and M. Kassi-lahlou, Towards a Software-Defined Security Framework for Supporting Distributed Cloud, Proceedings of the 11th IFIP International Conference on Autonomous Infrastructure, Management and Security (IFIP AIMS 2017), pp.47-61, 2017.
DOI : 10.1561/1800000006

V. Seyed-kaveh-fayazbakhsh, M. Sekar, J. Yu, and . Mogul, Flowtags: Enforcing Network-wide Policies in the Presence of Dynamic Middlebox Actions, Proceedings of the second ACM SIGCOMM workshop on Hot topics in Software Defined Networking, pp.19-24, 2013.

T. Koorevaar, Dynamic Enforcement of Security Policies in Multi-Tenant Cloud Networks, 2012.

G. Hurel, R. Badonnel, A. Lahmadi, and O. Festor, Behavioral and dynamic security functions chaining for Android devices, 2015 11th International Conference on Network and Service Management (CNSM), p.2015
DOI : 10.1109/CNSM.2015.7367339

URL : https://hal.archives-ouvertes.fr/hal-01231173

J. J. Park, H. Jeong, and . Kim, Software-Defined Networking Based Security Services using Interface to Network Security Functions, 2015.

B. D. Payne, M. Carbone, M. Sharif, and W. Lee, Lares: An Architecture for Secure Active Monitoring Using Virtualization, 2008 IEEE Symposium on Security and Privacy (sp 2008), pp.233-247, 2008.
DOI : 10.1109/SP.2008.24

X. Jiang, X. Wang, and D. Xu, Stealthy Malware Detection Through Vmm-based "Out-of-the-box" Semantic View Reconstruction, Proceedings of the 14th ACM Conference on Computer and Communications Security, ACM CCS 2007, pp.128-138, 2007.
DOI : 10.1145/1315245.1315262

URL : http://www.cerias.purdue.edu/ssl/techreports-ssl/2007-80.pdf

T. Garfinkel and M. Rosenblum, A Virtual Machine Introspection Based Architecture for Intrusion Detection, Ndss, pp.191-206, 2003.

A. Bacs, C. Giuffrida, B. Grill, and H. Bos, Slick, Proceedings of the 31st Annual ACM Symposium on Applied Computing, SAC '16, pp.2033-2040, 2016.
DOI : 10.1145/2851613.2851795

J. Liedtke, On Micro-kernel Construction, Proceedings of the Fifteenth ACM Symposium on Operating Systems Principles, SOSP '95, pp.237-250, 1995.
DOI : 10.1145/224057.224075

URL : http://www-db.stanford.edu/~manku/quals/95-mkernel.ps.gz

D. R. Engler, M. F. Kaashoek, J. O-'toole, and J. , Exokernel, ACM SIGOPS Operating Systems Review, vol.29, issue.5, pp.251-266, 1995.
DOI : 10.1145/224057.224076

D. E. Porter, S. Boyd-wickizer, J. Howell, R. Olinsky, and G. C. Hunt, Rethinking the library OS from the top down, ACM SIGARCH Computer Architecture News, vol.39, issue.1, pp.291-304, 2011.
DOI : 10.1145/1961295.1950399

URL : http://www.cse.unsw.edu.au/%7Ecs9242/current/papers/libraryos_asplos11.pdf

D. Williams and R. Koller, Unikernel monitors: extending minimalism outside of the box, 8th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 16). USENIX Association, 2016.

A. Bratterud, A. Happe, R. A. , and K. Duncan, Enhancing Cloud Security and Privacy: The Unikernel Solution, Eighth International Conference on Cloud Computing, GRIDs, and Virtualization, 2017.

J. Francisco and . Ballesteros, The clive operating system, 2014.

A. Bratterud, A. A. Walla, H. Haugerud, P. E. Engelstad, and K. Begnum, IncludeOS: A Minimal, Resource Efficient Unikernel for Cloud Services, 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom), pp.250-257, 2015.
DOI : 10.1109/CloudCom.2015.89

A. Kivity, D. Laor-glauber, P. Costa, and . Enberg, OSv-optimizing the operating system for virtual machines, Proceedings of USENIX ATC'14: 2014 USENIX Annual Technical Conference, p.61, 2014.

F. Mancinelli, J. Boender, R. D. Cosmo, J. Vouillon, B. Durak et al., Managing the Complexity of Large Free and Open Source Package-Based Software Distributions, 21st IEEE/ACM International Conference on Automated Software Engineering (ASE'06), pp.199-208, 2006.
DOI : 10.1109/ASE.2006.49

URL : https://hal.archives-ouvertes.fr/hal-00149566

X. Jiang, X. Wang, and D. Xu, Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction, Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS '07, pp.128-138, 2007.
DOI : 10.1145/1315245.1315262

URL : http://www.cerias.purdue.edu/ssl/techreports-ssl/2007-80.pdf

M. Pattaranantakul, R. He, A. Meddahi, and Z. Zhang, SecMANO: Towards Network Functions Virtualization (NFV) Based Security MANagement and Orchestration, 2016 IEEE Trustcom/BigDataSE/ISPA, pp.598-605, 2016.
DOI : 10.1109/TrustCom.2016.0115

URL : https://hal.archives-ouvertes.fr/hal-01740185

S. Luo and M. B. Salem, Orchestration of software-defined security services, 2016 IEEE International Conference on Communications Workshops (ICC), pp.436-441, 2016.

. Cohttp, Very lightweight HTTP Server using Lwt or Async, 2017.

W. Glozer, Wrk: Modern HTTP Benchmarking Tool, 2017.