A. A. Nacer, E. Goettelmann, S. Youcef, A. Tari, and C. Godart, Obfuscating a business process by splitting its logic with fake fragments for securing a multi-coud deployment, the IEEE international Congress on Services (SERVICES), p.8, 2016.

U. Arnold, New dimensions of outsourcing: a combination of transaction cost economics and the core competencies concept, European Journal of Purchasing & Supply Management, vol.6, issue.1, pp.23-29, 2000.
DOI : 10.1016/S0969-7012(99)00028-3

S. Australia, Handbook: Risk management guidelines, companion to as/nzs 4360, 2004.

R. Conforti, M. De-leoni, M. L. Rosa, W. M. Van-der-aalst, and A. H. Ter-hofstede, A recommendation system for predicting risks across multiple business process instances, Decision Support Systems, vol.69, pp.1-19, 2015.
DOI : 10.1016/j.dss.2014.10.006

E. Goettelmann, A. Ahmed-nacer, S. Youcef, and C. Godart, Paving the Way towards Semi-automatic Design-Time Business Process Model Obfuscation, 2015 IEEE International Conference on Web Services, pp.559-566, 2015.
DOI : 10.1109/ICWS.2015.80

URL : https://hal.archives-ouvertes.fr/hal-01237681

E. Goettelmann, K. Dahman, B. Gateau, E. Dubois, and C. Godart, A Security Risk Assessment Model for Business Process Deployment in the Cloud, 2014 IEEE International Conference on Services Computing, pp.307-314, 2014.
DOI : 10.1109/SCC.2014.48

URL : https://hal.archives-ouvertes.fr/hal-01095874

A. Jallow, B. Majeed, K. Vergidis, A. Tiwari, and R. Roy, Operational risk analysis in business processes, BT Technology Journal, vol.41, issue.4, pp.168-177, 2007.
DOI : 10.1007/s10550-007-0018-4

M. Jensen, J. Schwenk, J. Bohli, N. Gruschka, and L. L. Iacono, Security Prospects through Cloud Computing by Adopting Multiple Clouds, 2011 IEEE 4th International Conference on Cloud Computing, pp.565-572, 2011.
DOI : 10.1109/CLOUD.2011.85

A. Jøsang, R. Ismail, and C. Boyd, A survey of trust and reputation systems for online service provision. Decision support systems, pp.618-644, 2007.

A. A. Nacer, E. Goettelmann, S. Youcef, A. Tari, and C. Godart, Business Process Design by Reusing Business Process Fragments from the Cloud, 2015 IEEE 8th International Conference on Service-Oriented Computing and Applications (SOCA), pp.193-200, 2015.
DOI : 10.1109/SOCA.2015.37

A. Pika, W. Van-der-aalst, M. Wynn, C. Fidge, and A. Ter-hofstede, Evaluating and predicting overall process risk using event logs, Information Sciences, vol.352, issue.353, pp.98-120, 2016.
DOI : 10.1016/j.ins.2016.03.003

A. Polyvyanyy, L. García-bañuelos, and M. Dumas, Structuring acyclic process models, Information Systems, vol.37, issue.6, pp.518-538, 2010.
DOI : 10.1016/j.is.2011.10.005

M. Rekik, K. Boukadi, and H. Ben-abdallah, A Comprehensive Framework for Business Process Outsourcing to the Cloud, 2016 IEEE International Conference on Services Computing (SCC), pp.179-186, 2016.
DOI : 10.1109/SCC.2016.30

B. Weber, M. Reichert, W. Wild, and S. Rinderle, Balancing flexibility and security in adaptive process management systems. On the Move to Meaningful Internet Systems, pp.59-76, 2005.

D. Yang, S. Kim, C. Nam, and J. Min, Developing a decision model for business process outsourcing, Computers & Operations Research, vol.34, issue.12, pp.3769-3778, 2007.
DOI : 10.1016/j.cor.2006.01.012