M. P. Wil, M. Van-der-aalst, and . Adams, Arthur Ter Hofstede, and Nick Russell. Modern Business Process Automation -YAWL and its Support Environment, 2010.

M. P. Wil, . Van-der, and . Aalst, Business process configuration in the cloud: How to support and analyze multi-tenant processes ?, Web Services (ECOWS) Ninth IEEE European Conference on, pp.3-10, 2011.

A. Armbrust, R. Fox, A. D. Griffith, R. H. Joseph, A. Katz et al., Above the clouds: A berkeley view of cloud computing, 2009.

. Abdelmaboud, N. A. Dayang, I. Jawawi, A. Ghani, B. Elsafi et al., Quality of service approaches in cloud computing: A systematic mapping study, Journal of Systems and Software, vol.101, pp.159-179, 2015.
DOI : 10.1016/j.jss.2014.12.015

F. [. Anstett, R. Leymann, S. Mietzner, and . Strauch, Towards BPEL in the Cloud: Exploiting Different Delivery Models for the Execution of Business Processes, 2009 Congress on Services, I, pp.670-677, 2009.
DOI : 10.1109/SERVICES-I.2009.32

[. Ahmed and R. Matulevicius, A taxonomy for assessing security in business process modelling, IEEE 7th International Conference on Research Challenges in Information Science (RCIS), pp.1-10, 2013.
DOI : 10.1109/RCIS.2013.6577700

[. Ahmed and R. Matulevi?ius, Securing business processes using security risk-oriented patterns, Computer Standards & Interfaces, vol.36, issue.4, pp.723-733, 2014.
DOI : 10.1016/j.csi.2013.12.007

M. Bentounsi, S. Benbernou, C. S. Deme, and M. J. Atallah, Anonyfrag, Proceedings of the 1st International Workshop on Cloud Intelligence, Cloud-I '12, 2012.
DOI : 10.1145/2347673.2347682

URL : https://hal.archives-ouvertes.fr/hal-00727735

R. E. Burkard, E. Çela, P. M. Pardalos, and L. S. Pitsoulis, The quadratic assignment problem, Handbook of Combinatorial Optimization, pp.241-238, 1998.

A. Bouchami, E. Goettelmann, O. Perrin, and C. Godart, Enhancing access control with risk metrics in collaborative federated cloud environments, 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 2015.

[. Bardsiri and S. Hashemi, QoS Metrics for Cloud Computing Services Evaluation, International Journal of Intelligent Systems and Applications, vol.6, issue.12, p.2014
DOI : 10.5815/ijisa.2014.12.04

N. Baliyan and S. Kumar, Quality Assessment of Software as a Service on Cloud Using Fuzzy Logic, 2013 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM), 2013.
DOI : 10.1109/CCEM.2013.6684439

M. Bknt11-]-christian-baun, J. Kunze, S. Nimis, and . Tai, Cloud Computing: Web-Based Dynamic IT Services, BL74] D. Bell and L. Lapadula. Secure computer systems: mathematical foundations and model, 1974.

[. Becker, S. Lehrig, and S. Becker, Systematically Deriving Quality Metrics for Cloud Computing Systems, Proceedings of the 6th ACM/SPEC International Conference on Performance Engineering, ICPE '15, 2015.
DOI : 10.1145/2668930.2688043

K. Bessai, S. Youcef, A. Oulamara, and C. Godart, Bi-criteria strategies for business processes scheduling in cloud environments with fairness metrics, IEEE 7th International Conference on Research Challenges in Information Science (RCIS), pp.1-10, 2013.
DOI : 10.1109/RCIS.2013.6577701

URL : https://hal.archives-ouvertes.fr/hal-00920344

V. Shankar-babu-chebrolu, P. Bansal, and . Telang, Top 10 cloud risks that will keep you awake at night, 2011.

E. [. Carminati, R. Ferrari, P. C. Bishop, and . Hung, Security Conscious Web Service Composition with Semantic Web Support, 2007 IEEE 23rd International Conference on Data Engineering Workshop, pp.695-704, 2007.
DOI : 10.1109/ICDEW.2007.4401057

R. Conforti, M. De-leoni, M. L. Rosa, W. M. Van-der, and . Aalst, Supporting Risk-Informed Decisions during Business Process Execution, Advanced Information Systems Engineering, pp.116-132, 2013.
DOI : 10.1007/978-3-642-38709-8_8

N. Rodrigo, R. Calheiros, C. Ranjan, R. Af-de-rose, and . Buyya, Cloudsim: A novel framework for modeling and simulation of cloud computing infrastructures and services. arXiv preprint, 2009.

[. Dreiling, M. Rosemann, W. M. Van-der, and . Aalst, From conceptual process models to running workflows : a holistic approach for the configuration of enterprise systems, PACIS'05, pp.363-376, 2005.

M. Dumas, M. L. , R. Mendling, and H. A. Reijers, Fundamentals of Business Process Management, 2013.
DOI : 10.1007/978-3-642-33143-5

S. Euting, C. Janiesch, R. Fischer, S. Tai, and I. Weber, Scalable Business Process Execution in the Cloud, 2014 IEEE International Conference on Cloud Engineering, pp.175-184, 2014.
DOI : 10.1109/IC2E.2014.13

W. Fdhila, M. Dumas, C. Godart, and L. García-bañuelos, Heuristics for composite web service decentralization. Software and System Modeling, pp.599-619, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01098743

H. Fill, Using obfuscating transformations for supporting the sharing and analysis of conceptual models, Multikonferenz Wirtschaftsinformatik 2012 -Teilkonferenz Modellierung betrieblicher Informationssysteme

[. Frece and M. B. Juric, Modeling functional requirements for configurable content- and context-aware dynamic service selection in business process models, Journal of Visual Languages & Computing, vol.23, issue.4, pp.223-247, 2012.
DOI : 10.1016/j.jvlc.2012.02.003

C. [. Fang and . Yin, BPM Architecture Design Based on Cloud Computing, Intelligent Information Management, pp.329-333, 2010.
DOI : 10.4236/iim.2010.25039

[. Fdhila, U. Yildiz, and C. Godart, A Flexible Approach for Automatic Process Decentralization Using Dependency Tables, 2009 IEEE International Conference on Web Services, pp.6-10, 2009.
DOI : 10.1109/ICWS.2009.41

URL : https://hal.archives-ouvertes.fr/inria-00433293

D. Gambetta and . Trust, Making and Breaking Cooperative Relations, Blackwell, vol.52, 1988.

E. Goettelmann, A. Ahmed-nacer, S. Youcef, and C. Godart, Paving the Way towards Semi-automatic Design-Time Business Process Model Obfuscation, 2015 IEEE International Conference on Web Services, 2015.
DOI : 10.1109/ICWS.2015.80

URL : https://hal.archives-ouvertes.fr/hal-01237681

. Gar13 and . Gartner, Gartner says worldwide public cloud services market to total $131 billionOnline ; accessed 21, 2013.

T. Grandison, M. Bilger, L. O. Connor, M. Graf, M. Swimmer et al., Elevating the Discussion on Security Management: The Data Centric Paradigm, 2007 2nd IEEE/IFIP International Workshop on Business-Driven IT Management, pp.84-93, 2007.
DOI : 10.1109/BDIM.2007.375015

K. Elio-goettelmann, B. Dahman, E. Gâteau, C. Dubois, and . Godart, A Security Risk Assessment Model for Business Process Deployment in the Cloud, 2014 IEEE International Conference on Services Computing, pp.307-314, 2014.
DOI : 10.1109/SCC.2014.48

E. Goettelmann, K. Dahman, B. Gâteau, and C. Godart, A Formal Broker Framework for Secure and Cost-Effective Business Process Deployment on Multiple Clouds, Information Systems Engineering in Complex Environments -CAiSE Forum 2014, pp.3-19, 2014.
DOI : 10.1007/978-3-319-19270-3_1

[. Gentry, Fully homomorphic encryption using ideal lattices, Proceedings of the 41st annual ACM symposium on Symposium on theory of computing, STOC '09, pp.169-178, 2009.
DOI : 10.1145/1536414.1536440

[. Goettelmann, W. Fdhila, and C. Godart, Partitioning and Cloud Deployment of Composite Web Services under Security Constraints, 2013 IEEE International Conference on Cloud Engineering (IC2E), pp.193-200, 2013.
DOI : 10.1109/IC2E.2013.22

URL : https://hal.archives-ouvertes.fr/hal-00922186

F. Glover and M. Laguna, Tabu Search, 1997.
URL : https://hal.archives-ouvertes.fr/hal-01389283

[. Goettelmann, N. Mayer, and C. Godart, A general approach for a trusted deployment of a business process in clouds, Proceedings of the Fifth International Conference on Management of Emergent Digital EcoSystems, MEDES '13, pp.92-99, 2013.
DOI : 10.1145/2536146.2536164

URL : https://hal.archives-ouvertes.fr/hal-00922189

[. Goettelmann, N. Mayer, and C. Godart, Integrating Security Risk Management into Business Process Management for the Cloud, 2014 IEEE 16th Conference on Business Informatics, pp.86-93, 2014.
DOI : 10.1109/CBI.2014.29

URL : https://hal.archives-ouvertes.fr/hal-01095868

N. Gonzalez, C. Miers, F. Redigolo, and M. Simplicio, Mats Näslund, and Makan Pourzandi. A quantitative analysis of current security concerns and solutions for cloud computing, Journal of Cloud Computing, 2012.

S. Hernan, S. Lambert, T. Ostwald, and A. Shostack, Uncover security design flaws using the stride approach, 2006.

C. Hwang, A. Syed-md, and . Masud, Methods for Multiple Objective Decision Making, Multiple Objective Decision Making ? Methods and Applications, pp.21-283, 1979.
DOI : 10.1007/978-3-642-45511-7_3

R. Hull, Artifact-Centric Business Process Models: Brief Survey of Research Results and Challenges, On the Move to Meaningful Internet Systems: OTM 2008, pp.1152-1163, 2008.
DOI : 10.1007/978-3-540-88873-4_17

J. Jiang, Y. Le, and . Wang, Jie Sun, and Feng He. The bpm architecture based on cloud computing, Knowledge Acquisition and Modeling (KAM), 2011 Fourth International Symposium on, pp.196-198, 2011.

J. M. Jensen, J. Schwenk, N. Bohli, L. L. Gruschka, and . Iacono, Security Prospects through Cloud Computing by Adopting Multiple Clouds, 2011 IEEE 4th International Conference on Cloud Computing, pp.565-572, 2011.
DOI : 10.1109/CLOUD.2011.85

J. Jürjens and . Umlsec, UMLsec: Extending UML for Secure Systems Development, UML 2002 ? The Unified Modeling Language, pp.412-425, 2002.
DOI : 10.1007/3-540-45800-X_32

[. Khera and B. Hefley, eSourcing Capability Model for Client Organizations (eSCM-CL) Annotated Bibliography, SSRN Electronic Journal, 2007.
DOI : 10.2139/ssrn.1393310

[. Kumaran, R. Liu, and F. Wu, On the Duality of Information-Centric and Activity-Centric Models of Business Processes, Advanced Information Systems Engineering, pp.32-47, 2008.
DOI : 10.1007/978-3-540-69534-9_3

W. Brian, P. L. Kernighan, and . Plauger, Software Tools, 1976.

K. Knorr and S. Röhrig, Security Requirements of E-Business Processes, Towards the E-Society IFIP International Federation for Information Processing, pp.72-86, 2001.
DOI : 10.1007/0-306-47009-8_6

[. Linthicum, Soa cloud computing relationship leaves some folks in a fog [Online ; accessed 03, 2009.

J. Liu, J. Tong, R. Mao, J. Bohn, L. Messina et al., NIST cloud computing reference architecture, National Institute of Standards and Technology (NIST), 2011.
DOI : 10.6028/NIST.SP.500-292

[. Monsalve, A. April, and A. Abran, Requirements elicitation using bpm notations: Focusing on the strategic level representation, pp.235-241, 2011.

[. Mayer, Model-based Management of Information System Security Risk, 2009.
URL : https://hal.archives-ouvertes.fr/tel-00402996

P. Merz and B. Freisleben, Greedy and local search heuristics for unconstrained binary quadratic programming, Journal of Heuristics, vol.8, issue.2, pp.197-213, 2002.
DOI : 10.1023/A:1017912624016

D. Martinho and D. R. Ferreira, Securely Storing and Executing Business Processes in the Cloud, Business Process Management Workshops -BPM 2012 International Workshops, pp.707-712, 2012.
DOI : 10.1007/978-3-642-36285-9_70

P. Mell and T. Grance, The NIST definition of cloud computing, National Institute of Standards and Technology, 2011.
DOI : 10.6028/NIST.SP.800-145

M. Zur-muehlen, D. Ting, and -. Ho, Risk Management in the BPM Lifecycle, Business Process Management Workshops, pp.454-466, 2006.
DOI : 10.1007/11678564_42

J. Morin and A. Hovav, Strategic value and drivers behind organizational adoption of enterprise DRM: The korean case, Journal of Service Science Research, vol.1, issue.1, pp.143-168, 2012.
DOI : 10.1007/s12927-012-0006-1

V. Muthusamy and H. Jacobsen, BPM in Cloud Architectures: Business Process Management with SLAs and Events, Business Process Management, pp.5-10, 2010.
DOI : 10.1007/978-3-642-15618-2_2

[. Mouratidis, G. A. Manson, A. Gani, and P. Giorgini, Analysing security requirements of information systems using tropos, 2003.

R. Matulevicius, N. Mayer, H. Mouratidis, E. Dubois, P. Heymans et al., Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development, Advanced Information Systems Engineering, 20th International Conference Proceedings, pp.541-555, 2008.
DOI : 10.1007/978-3-540-69534-9_40

G. Münzl, B. Przywra, M. Reti, J. Schäfer, K. Sondermann et al., Cloud computing -evolution in der technik, revolution im business, 2009.

J. Mangler and S. , CPEE -cloud process execution engine, Proceedings of the BPM Demo Sessions 2014 Co-located with the 12th International Conference on Business Process Management, p.51, 2014.

T. Salvatore, G. F. March, and . Smith, Design and natural science research on information technology, Decis. Support Syst, vol.15, issue.4, pp.251-266, 1995.

J. Mendling, M. Strembeck, G. Stermsek, and G. Neumann, An approach to extract RBAC models from BPEL4WS processes, 13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp.81-86, 2004.
DOI : 10.1109/ENABL.2004.9

[. Ouedraogo, F. Biennier, and P. Ghodous, Model driven security in a multi-cloud context, IJEBM, vol.11, issue.3, p.2013
URL : https://hal.archives-ouvertes.fr/hal-01339187

A. Polyvyanyy, L. García-bañuelos, and M. Dumas, Structuring acyclic process models, Information Systems, vol.37, issue.6, pp.518-538, 2010.
DOI : 10.1016/j.is.2011.10.005

E. Paja, P. Giorgini, S. Paul, and P. Meland, Security Requirements Engineering for Secure Business Processes, Workshops on Business Informatics Research of Lecture Notes in Business Information Processing, pp.77-89, 2012.
DOI : 10.1007/978-3-642-29231-6_7

M. Pathirage, S. Perera, I. Kumara, and S. Weerawarana, A Multi-tenant Architecture for Business Process Executions, 2011 IEEE International Conference on Web Services, pp.121-128, 2011.
DOI : 10.1109/ICWS.2011.99

A. Raluca, C. M. Popa, N. Redfield, H. Zeldovich, and . Balakrishnan, Cryptdb: processing queries on an encrypted database, Commun. ACM, vol.55, issue.9, pp.103-111, 2012.

A. Rodríguez, E. Fernández-medina, and M. Piattini, A BPMN Extension for the Modeling of Security Requirements in Business Processes, IEICE Transactions on Information and Systems, vol.90, issue.4, pp.90-745, 2007.
DOI : 10.1093/ietisy/e90-d.4.745

R. D. Rowley, Professional Social Networking, Current Psychiatry Reports, vol.16, issue.12, p.2014
DOI : 10.1007/s11920-014-0522-4

L. Schubert, The future of cloud computing -opportunities for european cloud computing beyond 2012, 2010.

[. Sackmann, L. Lowis, and K. Kittel, A risk based approach for selecting services in business process execution [Sta08] Richard Stallman. Cloud computing is a trap, warns GNU founder Richard Stallman, Wirtschaftsinformatik (1), pp.357-366, 2008.

[. Turki, F. Bellaaj, A. Charfi, and R. Bouaziz, Modeling Security Requirements in Service Based Business Processes, Enterprise, Business-Process and Information Systems Modeling -13th International Conference, BPMDS 2012, 17th International Conference, EMMSAD 2012, and 5th EuroSymposium. Proceedings, pp.76-90, 2012.
DOI : 10.1007/978-3-642-31072-0_6

]. S. Tjg-+-11, S. Tjoa, G. Jakoubi, G. Goluch, S. Kitzler et al., A formal approach enabling risk-aware business process modeling and simulation. Services Computing, IEEE Transactions on, vol.4, issue.2, pp.153-166, 2011.

M. Luis, L. Vaquero, J. Rodero-merino, M. Caceres, and . Lindner, A break in the clouds: Towards a cloud definition, SIGCOMM Comput. Commun. Rev, vol.39, issue.1, pp.50-55, 2008.

J. Vanhatalo, H. Völzer, and J. Koehler, The Refined Process Structure Tree, Business Process Management, pp.100-115, 2008.
DOI : 10.1007/978-3-540-85758-7_10

P. Watson, A multi-level security model for partitioning workflows over federated clouds, Journal of Cloud Computing: Advances, Systems and Applications, vol.1, issue.1, p.2012
DOI : 10.1007/3-540-45848-4_57

M. Weske, Business Process Management -Concepts, Languages, Architectures, 2012.

R. Wieringa, Design science as nested problem solving, Proceedings of the 4th International Conference on Design Science Research in Information Systems and Technology, DESRIST '09, 2009.
DOI : 10.1145/1555619.1555630

. Wikipedia, Cloud computing (en) http://en.wikipedia.org/wiki/Cloud_ computing, 2013. [Online ; accessed 05, 2013.

. Wikipedia, Cloud computing (fr) http://fr.wikipedia.org/wiki/Cloud_ computing, 2013. [Online ; accessed 05, 2013.

[. Wolter, M. Menzel, and C. Meinel, Modelling security goals in business processes, Modellierung 2008, volume P-127 of LNI, pp.201-216, 2008.

C. Wolter, M. Menzel, A. Schaad, P. Miseldine, and C. Meinel, Model-driven business process security requirement specification, Journal of Systems Architecture, vol.55, issue.4, pp.211-223, 2009.
DOI : 10.1016/j.sysarc.2008.10.002

S. Wozniak, Apple co-founder wozniak sees trouble in the cloud, 2012.

S. Wenzel, C. Wessel, T. Humberg, and J. Jürjens, Securing processes for outsourcing into the cloud, CLOSER 2012 -Proceedings of the 2nd International Conference on Cloud Computing and Services Science, pp.675-680, 2012.

[. Zacharia, Collaborative reputation mechanisms for online communities, 1999.

M. Zhou, W. R. Sherr, Z. Marczak, T. Zhang, and . Tao, Boon Thau Loo, and Insup Lee. Towards a data-centric view of cloud security, Proceedings of the Second International CIKM Workshop on Cloud Data Management, pp.25-32, 2010.