Information security risk management, IEC 27005, 2011. ,
Principled design of the modern web architecture, Proceedings of the 22nd international conference on Software engineering, pp.407-416, 2000. ,
Security for Web Services and Service-Oriented Architectures, 2009. ,
DOI : 10.1007/978-3-540-87742-4
Introduction to Web services and their security, Information Security Technical Report, vol.10, issue.1, pp.2-14, 2005. ,
DOI : 10.1016/j.istr.2005.02.001
Web services and web service security standards, Information Security Technical Report, vol.10, issue.1, pp.15-24, 2005. ,
DOI : 10.1016/j.istr.2004.11.001
XML Encryption Syntax and Processing, W3C, Tech. Rep, 2002. ,
Web Services Security: SOAP Message Security 1.0 (WS-Security, Security Assertion Markup Language (SAML), " OASIS, Tech. Rep, 2004. ,
eXtensible Access Control Markup Language (XACML) Version 1.0, OASIS, Tech. Rep, 2003. ,
First experiences using XACML for access control in distributed systems, Proceedings of the 2003 ACM workshop on XML security , XMLSEC '03, pp.25-37, 2003. ,
DOI : 10.1145/968559.968563
An introduction to the OCTAVE method, 2001. ,
Understanding cloud computing vulnerabilities A new taxonomy of web attacks suitable for efficient encoding, IEEE Computers & Security, vol.9, issue.22 5, pp.50-57, 2003. ,
A??survey of attacks on web services, Computer Science - Research and Development, vol.28, issue.11, pp.185-197, 2009. ,
DOI : 10.1007/s00450-009-0092-6
Transparent Fault Tolerance for Web Services Based Architectures, Euro-Par 2002 Parallel Processing, pp.889-898, 2002. ,
DOI : 10.1007/3-540-45706-2_126
USA PATRIOT Act and telecommunications: Privacy under attack, Rutgers Computer & Tech. LJ, vol.29, p.371, 2003. ,
Security and Privacy in Cloud Computing: A Survey, 2010 Sixth International Conference on Semantics, Knowledge and Grids, pp.105-112, 2010. ,
DOI : 10.1109/SKG.2010.19
Security and privacy in the clouds: a bird's eye view, " in Computers, privacy and data protection: An element of choice, pp.445-457, 2011. ,
Security Issues for Cloud Computing, International Journal of Information Security and Privacy, vol.4, issue.2, pp.36-48, 2010. ,
DOI : 10.4018/jisp.2010040103
Estimating security coverage for cloud services, " in Privacy, security, risk and trust (PASSAT), IEEE third international conference on and 2011 IEEE third international conference on social computing (SocialCom, pp.1064-1071, 2011. ,
Accountability for cloud and other future Internet services, 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, pp.629-632, 2012. ,
DOI : 10.1109/CloudCom.2012.6427512
URL : https://hal.archives-ouvertes.fr/hal-00778369
Adaptive data protection in distributed systems, Proceedings of the third ACM conference on Data and application security and privacy, CODASPY '13, pp.365-376, 2013. ,
DOI : 10.1145/2435349.2435401
Self-protecting documents for cloud storage security, " in TrustCom, IEEE, pp.1231-1238, 2012. ,
A Secure Autonomous Document Architecture for Enterprise Digital Right Management, 2011 Seventh International Conference on Signal Image Technology & Internet-Based Systems, pp.16-23, 2011. ,
DOI : 10.1109/SITIS.2011.37
URL : https://hal.archives-ouvertes.fr/hal-00634052
A multi-view approach for embedded information system security, 2010 Fifth International Conference on Risks and Security of Internet and Systems (CRiSIS), pp.65-72, 2010. ,
DOI : 10.1109/CRISIS.2010.5764917
URL : https://hal.archives-ouvertes.fr/hal-00531630
Information security in business intelligence based on cloud: A survey of key issues and the premises of a proposal, WOSIS, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-01082063