Arthur Ter Hofstede, and Nick Russell. Modern Business Process Automation -YAWL and its Support Environment, 2010. ,
Business process configuration in the cloud: How to support and analyze multi-tenant processes ?, Web Services (ECOWS) Ninth IEEE European Conference on, pp.3-10, 2011. ,
Above the clouds: A berkeley view of cloud computing, 2009. ,
Quality of service approaches in cloud computing: A systematic mapping study, Journal of Systems and Software, vol.101, pp.159-179, 2015. ,
DOI : 10.1016/j.jss.2014.12.015
Towards BPEL in the Cloud: Exploiting Different Delivery Models for the Execution of Business Processes, 2009 Congress on Services, I, pp.670-677, 2009. ,
DOI : 10.1109/SERVICES-I.2009.32
A taxonomy for assessing security in business process modelling, IEEE 7th International Conference on Research Challenges in Information Science (RCIS), pp.1-10, 2013. ,
DOI : 10.1109/RCIS.2013.6577700
Securing business processes using security risk-oriented patterns, Computer Standards & Interfaces, vol.36, issue.4, pp.723-733, 2014. ,
DOI : 10.1016/j.csi.2013.12.007
Anonyfrag, Proceedings of the 1st International Workshop on Cloud Intelligence, Cloud-I '12, 2012. ,
DOI : 10.1145/2347673.2347682
URL : https://hal.archives-ouvertes.fr/hal-00727735
The quadratic assignment problem, Handbook of Combinatorial Optimization, pp.241-238, 1998. ,
Enhancing access control with risk metrics in collaborative federated cloud environments, 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 2015. ,
QoS Metrics for Cloud Computing Services Evaluation, International Journal of Intelligent Systems and Applications, vol.6, issue.12, p.2014 ,
DOI : 10.5815/ijisa.2014.12.04
Quality Assessment of Software as a Service on Cloud Using Fuzzy Logic, 2013 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM), 2013. ,
DOI : 10.1109/CCEM.2013.6684439
Cloud Computing: Web-Based Dynamic IT Services, BL74] D. Bell and L. Lapadula. Secure computer systems: mathematical foundations and model, 1974. ,
Systematically Deriving Quality Metrics for Cloud Computing Systems, Proceedings of the 6th ACM/SPEC International Conference on Performance Engineering, ICPE '15, 2015. ,
DOI : 10.1145/2668930.2688043
Bi-criteria strategies for business processes scheduling in cloud environments with fairness metrics, IEEE 7th International Conference on Research Challenges in Information Science (RCIS), pp.1-10, 2013. ,
DOI : 10.1109/RCIS.2013.6577701
URL : https://hal.archives-ouvertes.fr/hal-00920344
Top 10 cloud risks that will keep you awake at night, 2011. ,
Security Conscious Web Service Composition with Semantic Web Support, 2007 IEEE 23rd International Conference on Data Engineering Workshop, pp.695-704, 2007. ,
DOI : 10.1109/ICDEW.2007.4401057
Supporting Risk-Informed Decisions during Business Process Execution, Advanced Information Systems Engineering, pp.116-132, 2013. ,
DOI : 10.1007/978-3-642-38709-8_8
Cloudsim: A novel framework for modeling and simulation of cloud computing infrastructures and services. arXiv preprint, 2009. ,
From conceptual process models to running workflows : a holistic approach for the configuration of enterprise systems, PACIS'05, pp.363-376, 2005. ,
Fundamentals of Business Process Management, 2013. ,
DOI : 10.1007/978-3-642-33143-5
Scalable Business Process Execution in the Cloud, 2014 IEEE International Conference on Cloud Engineering, pp.175-184, 2014. ,
DOI : 10.1109/IC2E.2014.13
Heuristics for composite web service decentralization. Software and System Modeling, pp.599-619, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01098743
Using obfuscating transformations for supporting the sharing and analysis of conceptual models, Multikonferenz Wirtschaftsinformatik 2012 -Teilkonferenz Modellierung betrieblicher Informationssysteme ,
Modeling functional requirements for configurable content- and context-aware dynamic service selection in business process models, Journal of Visual Languages & Computing, vol.23, issue.4, pp.223-247, 2012. ,
DOI : 10.1016/j.jvlc.2012.02.003
BPM Architecture Design Based on Cloud Computing, Intelligent Information Management, pp.329-333, 2010. ,
DOI : 10.4236/iim.2010.25039
A Flexible Approach for Automatic Process Decentralization Using Dependency Tables, 2009 IEEE International Conference on Web Services, pp.6-10, 2009. ,
DOI : 10.1109/ICWS.2009.41
URL : https://hal.archives-ouvertes.fr/inria-00433293
Making and Breaking Cooperative Relations, Blackwell, vol.52, 1988. ,
Paving the Way towards Semi-automatic Design-Time Business Process Model Obfuscation, 2015 IEEE International Conference on Web Services, 2015. ,
DOI : 10.1109/ICWS.2015.80
URL : https://hal.archives-ouvertes.fr/hal-01237681
Gartner says worldwide public cloud services market to total $131 billionOnline ; accessed 21, 2013. ,
Elevating the Discussion on Security Management: The Data Centric Paradigm, 2007 2nd IEEE/IFIP International Workshop on Business-Driven IT Management, pp.84-93, 2007. ,
DOI : 10.1109/BDIM.2007.375015
A Security Risk Assessment Model for Business Process Deployment in the Cloud, 2014 IEEE International Conference on Services Computing, pp.307-314, 2014. ,
DOI : 10.1109/SCC.2014.48
A Formal Broker Framework for Secure and Cost-Effective Business Process Deployment on Multiple Clouds, Information Systems Engineering in Complex Environments -CAiSE Forum 2014, pp.3-19, 2014. ,
DOI : 10.1007/978-3-319-19270-3_1
Fully homomorphic encryption using ideal lattices, Proceedings of the 41st annual ACM symposium on Symposium on theory of computing, STOC '09, pp.169-178, 2009. ,
DOI : 10.1145/1536414.1536440
Partitioning and Cloud Deployment of Composite Web Services under Security Constraints, 2013 IEEE International Conference on Cloud Engineering (IC2E), pp.193-200, 2013. ,
DOI : 10.1109/IC2E.2013.22
URL : https://hal.archives-ouvertes.fr/hal-00922186
Tabu Search, 1997. ,
URL : https://hal.archives-ouvertes.fr/hal-01389283
A general approach for a trusted deployment of a business process in clouds, Proceedings of the Fifth International Conference on Management of Emergent Digital EcoSystems, MEDES '13, pp.92-99, 2013. ,
DOI : 10.1145/2536146.2536164
URL : https://hal.archives-ouvertes.fr/hal-00922189
Integrating Security Risk Management into Business Process Management for the Cloud, 2014 IEEE 16th Conference on Business Informatics, pp.86-93, 2014. ,
DOI : 10.1109/CBI.2014.29
URL : https://hal.archives-ouvertes.fr/hal-01095868
Mats Näslund, and Makan Pourzandi. A quantitative analysis of current security concerns and solutions for cloud computing, Journal of Cloud Computing, 2012. ,
Uncover security design flaws using the stride approach, 2006. ,
Methods for Multiple Objective Decision Making, Multiple Objective Decision Making ? Methods and Applications, pp.21-283, 1979. ,
DOI : 10.1007/978-3-642-45511-7_3
Artifact-Centric Business Process Models: Brief Survey of Research Results and Challenges, On the Move to Meaningful Internet Systems: OTM 2008, pp.1152-1163, 2008. ,
DOI : 10.1007/978-3-540-88873-4_17
Jie Sun, and Feng He. The bpm architecture based on cloud computing, Knowledge Acquisition and Modeling (KAM), 2011 Fourth International Symposium on, pp.196-198, 2011. ,
Security Prospects through Cloud Computing by Adopting Multiple Clouds, 2011 IEEE 4th International Conference on Cloud Computing, pp.565-572, 2011. ,
DOI : 10.1109/CLOUD.2011.85
UMLsec: Extending UML for Secure Systems Development, UML 2002 ? The Unified Modeling Language, pp.412-425, 2002. ,
DOI : 10.1007/3-540-45800-X_32
eSourcing Capability Model for Client Organizations (eSCM-CL) Annotated Bibliography, SSRN Electronic Journal, 2007. ,
DOI : 10.2139/ssrn.1393310
On the Duality of Information-Centric and Activity-Centric Models of Business Processes, Advanced Information Systems Engineering, pp.32-47, 2008. ,
DOI : 10.1007/978-3-540-69534-9_3
Software Tools, 1976. ,
Security Requirements of E-Business Processes, Towards the E-Society IFIP International Federation for Information Processing, pp.72-86, 2001. ,
DOI : 10.1007/0-306-47009-8_6
Soa cloud computing relationship leaves some folks in a fog [Online ; accessed 03, 2009. ,
NIST cloud computing reference architecture, National Institute of Standards and Technology (NIST), 2011. ,
DOI : 10.6028/NIST.SP.500-292
Requirements elicitation using bpm notations: Focusing on the strategic level representation, pp.235-241, 2011. ,
Model-based Management of Information System Security Risk, 2009. ,
URL : https://hal.archives-ouvertes.fr/tel-00402996
Greedy and local search heuristics for unconstrained binary quadratic programming, Journal of Heuristics, vol.8, issue.2, pp.197-213, 2002. ,
DOI : 10.1023/A:1017912624016
Securely Storing and Executing Business Processes in the Cloud, Business Process Management Workshops -BPM 2012 International Workshops, pp.707-712, 2012. ,
DOI : 10.1007/978-3-642-36285-9_70
The NIST definition of cloud computing, National Institute of Standards and Technology, 2011. ,
DOI : 10.6028/NIST.SP.800-145
Risk Management in the BPM Lifecycle, Business Process Management Workshops, pp.454-466, 2006. ,
DOI : 10.1007/11678564_42
Strategic value and drivers behind organizational adoption of enterprise DRM: The korean case, Journal of Service Science Research, vol.1, issue.1, pp.143-168, 2012. ,
DOI : 10.1007/s12927-012-0006-1
BPM in Cloud Architectures: Business Process Management with SLAs and Events, Business Process Management, pp.5-10, 2010. ,
DOI : 10.1007/978-3-642-15618-2_2
Analysing security requirements of information systems using tropos, 2003. ,
Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development, Advanced Information Systems Engineering, 20th International Conference Proceedings, pp.541-555, 2008. ,
DOI : 10.1007/978-3-540-69534-9_40
Cloud computing -evolution in der technik, revolution im business, 2009. ,
CPEE -cloud process execution engine, Proceedings of the BPM Demo Sessions 2014 Co-located with the 12th International Conference on Business Process Management, p.51, 2014. ,
Design and natural science research on information technology, Decis. Support Syst, vol.15, issue.4, pp.251-266, 1995. ,
An approach to extract RBAC models from BPEL4WS processes, 13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp.81-86, 2004. ,
DOI : 10.1109/ENABL.2004.9
Model driven security in a multi-cloud context, IJEBM, vol.11, issue.3, p.2013 ,
URL : https://hal.archives-ouvertes.fr/hal-01339187
Structuring acyclic process models, Information Systems, vol.37, issue.6, pp.518-538, 2010. ,
DOI : 10.1016/j.is.2011.10.005
Security Requirements Engineering for Secure Business Processes, Workshops on Business Informatics Research of Lecture Notes in Business Information Processing, pp.77-89, 2012. ,
DOI : 10.1007/978-3-642-29231-6_7
A Multi-tenant Architecture for Business Process Executions, 2011 IEEE International Conference on Web Services, pp.121-128, 2011. ,
DOI : 10.1109/ICWS.2011.99
Cryptdb: processing queries on an encrypted database, Commun. ACM, vol.55, issue.9, pp.103-111, 2012. ,
A BPMN Extension for the Modeling of Security Requirements in Business Processes, IEICE Transactions on Information and Systems, vol.90, issue.4, pp.90-745, 2007. ,
DOI : 10.1093/ietisy/e90-d.4.745
Professional Social Networking, Current Psychiatry Reports, vol.16, issue.12, p.2014 ,
DOI : 10.1007/s11920-014-0522-4
The future of cloud computing -opportunities for european cloud computing beyond 2012, 2010. ,
A risk based approach for selecting services in business process execution [Sta08] Richard Stallman. Cloud computing is a trap, warns GNU founder Richard Stallman, Wirtschaftsinformatik (1), pp.357-366, 2008. ,
Modeling Security Requirements in Service Based Business Processes, Enterprise, Business-Process and Information Systems Modeling -13th International Conference, BPMDS 2012, 17th International Conference, EMMSAD 2012, and 5th EuroSymposium. Proceedings, pp.76-90, 2012. ,
DOI : 10.1007/978-3-642-31072-0_6
A formal approach enabling risk-aware business process modeling and simulation. Services Computing, IEEE Transactions on, vol.4, issue.2, pp.153-166, 2011. ,
A break in the clouds: Towards a cloud definition, SIGCOMM Comput. Commun. Rev, vol.39, issue.1, pp.50-55, 2008. ,
The Refined Process Structure Tree, Business Process Management, pp.100-115, 2008. ,
DOI : 10.1007/978-3-540-85758-7_10
A multi-level security model for partitioning workflows over federated clouds, Journal of Cloud Computing: Advances, Systems and Applications, vol.1, issue.1, p.2012 ,
DOI : 10.1007/3-540-45848-4_57
Business Process Management -Concepts, Languages, Architectures, 2012. ,
Design science as nested problem solving, Proceedings of the 4th International Conference on Design Science Research in Information Systems and Technology, DESRIST '09, 2009. ,
DOI : 10.1145/1555619.1555630
Cloud computing (en) http://en.wikipedia.org/wiki/Cloud_ computing, 2013. [Online ; accessed 05, 2013. ,
Cloud computing (fr) http://fr.wikipedia.org/wiki/Cloud_ computing, 2013. [Online ; accessed 05, 2013. ,
Modelling security goals in business processes, Modellierung 2008, volume P-127 of LNI, pp.201-216, 2008. ,
Model-driven business process security requirement specification, Journal of Systems Architecture, vol.55, issue.4, pp.211-223, 2009. ,
DOI : 10.1016/j.sysarc.2008.10.002
Apple co-founder wozniak sees trouble in the cloud, 2012. ,
Securing processes for outsourcing into the cloud, CLOSER 2012 -Proceedings of the 2nd International Conference on Cloud Computing and Services Science, pp.675-680, 2012. ,
Collaborative reputation mechanisms for online communities, 1999. ,
Boon Thau Loo, and Insup Lee. Towards a data-centric view of cloud security, Proceedings of the Second International CIKM Workshop on Cloud Data Management, pp.25-32, 2010. ,