P. Mell and T. Grance, The NIST Definition of Cloud Computing, 2011.
DOI : 10.6028/NIST.SP.800-145

. Cloud-security-alliance, Top Threats to Cloud Computing v1, 2010.

M. Compastié, R. Badonnel, O. Festor, R. He, and M. Kassi-lahlou, A Software-Defined Security Strategy for Supporting Autonomic Security Enforcement in Distributed Cloud, 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), pp.464-467, 2016.
DOI : 10.1109/CloudCom.2016.0079

A. Waller, I. Sandy, E. Power, E. Aivaloglou, C. Skianis et al., Policy Based Management for Security in Cloud Computing, FTRA International Conference on Secure and Trust Computing, Data Management, and Application, pp.130-137, 2011.
DOI : 10.1109/EUROMICRO.2005.52

A. Bessani, A. Leucio, G. Cutillo, N. Ramunno, P. Schirmer et al., The TClouds Platform, ACM SIGOPS Operating Systems Review, vol.48, issue.2, pp.13-22, 2014.
DOI : 10.1145/1435417.1435432

G. Dreo, M. Golling, W. Hommel, and F. Tietze, ICEMAN: An Architecture for Secure Federated Inter-cloud Identity Management, Proc. of the IFIP/IEEE Int. Symposium on Integrated Network Management, 2013.

. Olubisi-atinuke-runsewe, A Policy-Based Management Framework for Cloud Computing Security, 2014.

V. Seyed-kaveh-fayazbakhsh, M. Sekar, . Yu, C. Jeffrey, and . Mogul, Flowtags: Enforcing network-wide policies in the presence of dynamic middlebox actions, Proceedings of the second ACM SIGCOMM workshop on Hot topics in Software Defined Networking, pp.19-24, 2013.

T. Koorevaar, Dynamic Enforcement of Security Policies in Multi-Tenant Cloud Networks, 2012.

G. Hurel, R. Badonnel, A. Lahmadi, and O. Festor, Behavioral and dynamic security functions chaining for Android devices, 2015 11th International Conference on Network and Service Management (CNSM), 2015.
DOI : 10.1109/CNSM.2015.7367339

URL : https://hal.archives-ouvertes.fr/hal-01231173

J. J. Park, H. Jeong, and . Kim, Software-Defined Networking Based Security Services using Interface to Network Security Functions, 2015.

T. Ball, Vericon: Towards Verifying Controller Programs in Software- Defined Networks, Proc. 35th ACM SIGPLAN Intl. Conf. Programming Language Design (PLDI'14), pp.282-293, 2014.

E. Al-shaer, S. Al-haj, and . Flowchecker, Configuration Analysis and Verification of Federated OpenFlow Infrastructures, Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration (CCS'10), 2010.

O. Jeffrey, . Kephart, M. David, and . Chess, The Vision of Autonomic Computing, Computer, vol.36, issue.1, pp.41-50, 2003.

E. Maler, Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML), OASIS, 2003.

J. Golbeck, Trust on the World Wide Web: A Survey, Foundations and Trends?? in Web Science, vol.1, issue.2, pp.131-197, 2006.
DOI : 10.1561/1800000006

URL : http://www.cs.umd.edu/~golbeck/pubs/Golbeck - 2006 - Trust on the World Wide Web A Survey.pdf

D. Waltermire, S. Quinn, K. Scarfone, and A. Halbardier, The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP version 1.2, NIST Special Publication, vol.800, p.126, 2011.
DOI : 10.6028/NIST.SP.800-126r2

URL : https://doi.org/10.6028/nist.sp.800-126r3