I. Iec, Information security risk management, IEC 27005, 2011.

R. T. Fielding and R. N. Taylor, Principled design of the modern web architecture, Proceedings of the 22nd international conference on Software engineering, pp.407-416, 2000.

E. Bertino, L. Martino, F. Paci, and A. Squicciarini, Security for Web Services and Service-Oriented Architectures, 2009.
DOI : 10.1007/978-3-540-87742-4

K. Beznosov, D. J. Flinn, S. Kawamoto, and B. Hartman, Introduction to Web services and their security, Information Security Technical Report, vol.10, issue.1, pp.2-14, 2005.
DOI : 10.1016/j.istr.2005.02.001

C. Geuer-pollmann and J. Claessens, Web services and web service security standards, Information Security Technical Report, vol.10, issue.1, pp.15-24, 2005.
DOI : 10.1016/j.istr.2004.11.001

D. Eastlake and J. Reagle, XML Encryption Syntax and Processing, W3C, Tech. Rep, 2002.

A. Nadalin, C. Kaler, P. Hallam-baker, R. Monzillo, and E. Al, Web Services Security: SOAP Message Security 1.0 (WS-Security, Security Assertion Markup Language (SAML), " OASIS, Tech. Rep, 2004.

T. Moses and S. Godik, eXtensible Access Control Markup Language (XACML) Version 1.0, OASIS, Tech. Rep, 2003.

M. Lorch, S. Proctor, R. Lepro, D. Kafura, and S. Shah, First experiences using XACML for access control in distributed systems, Proceedings of the 2003 ACM workshop on XML security , XMLSEC '03, pp.25-37, 2003.
DOI : 10.1145/968559.968563

C. Alberts and A. Dorofee, An introduction to the OCTAVE method, 2001.

B. Grobauer, T. Walloschek, E. Stocker, G. Alvarez, and S. Petrovi´cpetrovi´c, Understanding cloud computing vulnerabilities A new taxonomy of web attacks suitable for efficient encoding, IEEE Computers & Security, vol.9, issue.22 5, pp.50-57, 2003.

M. Jensen, N. Gruschka, and R. Herkenhöner, A??survey of attacks on web services, Computer Science - Research and Development, vol.28, issue.11, pp.185-197, 2009.
DOI : 10.1007/s00450-009-0092-6

V. Dialani, S. Miles, L. Moreau, D. De-roure, and M. Luck, Transparent Fault Tolerance for Web Services Based Architectures, Euro-Par 2002 Parallel Processing, pp.889-898, 2002.
DOI : 10.1007/3-540-45706-2_126

L. T. Lee, USA PATRIOT Act and telecommunications: Privacy under attack, Rutgers Computer & Tech. LJ, vol.29, p.371, 2003.

M. Zhou, R. Zhang, W. Xie, W. Qian, and A. Zhou, Security and Privacy in Cloud Computing: A Survey, 2010 Sixth International Conference on Semantics, Knowledge and Grids, pp.105-112, 2010.
DOI : 10.1109/SKG.2010.19

W. Pieters, Security and privacy in the clouds: a bird's eye view, " in Computers, privacy and data protection: An element of choice, pp.445-457, 2011.

K. Hamlen, M. Kantarcioglu, L. Khan, and B. Thuraisingham, Security Issues for Cloud Computing, International Journal of Information Security and Privacy, vol.4, issue.2, pp.36-48, 2010.
DOI : 10.4018/jisp.2010040103

D. Dasgupta and M. M. Rahman, Estimating security coverage for cloud services, " in Privacy, security, risk and trust (PASSAT), IEEE third international conference on and 2011 IEEE third international conference on social computing (SocialCom, pp.1064-1071, 2011.

S. Pearson, V. Tountopoulos, D. Catteddu, M. Sudholt, R. Molva et al., Accountability for cloud and other future Internet services, 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, pp.629-632, 2012.
DOI : 10.1109/CloudCom.2012.6427512

URL : https://hal.archives-ouvertes.fr/hal-00778369

A. C. Squicciarini, G. Petracca, and E. Bertino, Adaptive data protection in distributed systems, Proceedings of the third ACM conference on Data and application security and privacy, CODASPY '13, pp.365-376, 2013.
DOI : 10.1145/2435349.2435401

M. Munier, V. Lalanne, and M. Ricarde, Self-protecting documents for cloud storage security, " in TrustCom, IEEE, pp.1231-1238, 2012.

M. Munier, A Secure Autonomous Document Architecture for Enterprise Digital Right Management, 2011 Seventh International Conference on Signal Image Technology & Internet-Based Systems, pp.16-23, 2011.
DOI : 10.1109/SITIS.2011.37

URL : https://hal.archives-ouvertes.fr/hal-00634052

M. Munier, A multi-view approach for embedded information system security, 2010 Fifth International Conference on Risks and Security of Internet and Systems (CRiSIS), pp.65-72, 2010.
DOI : 10.1109/CRISIS.2010.5764917

URL : https://hal.archives-ouvertes.fr/hal-00531630

E. Jaramillo, M. Munier, and P. Aniorté, Information security in business intelligence based on cloud: A survey of key issues and the premises of a proposal, WOSIS, 2013.
URL : https://hal.archives-ouvertes.fr/hal-01082063