. Google-app-engine, Platform as a service, 2015.

. Opennebula, The cloud data center management solution, 2015.

. Openshift, The open hybrid cloud application platform by red hat, 2015.

. Openstack, The open source cloud computing software, 2015.

E. K. Achampong and C. Dzidonu, Managing access to electronic health records in a cloud computing environment, Journal of Information Sciences and Computing Technologies, vol.3, issue.2, pp.191-195, 2015.

M. Ali, S. U. Khan, and A. V. Vasilakos, Security in cloud computing: Opportunities and challenges, Information Sciences, vol.305, pp.357-383, 2015.
DOI : 10.1016/j.ins.2015.01.025

M. Almorsy, J. Grundy, and A. S. Ibrahim, Collaboration-Based Cloud Computing Security Management Framework, 2011 IEEE 4th International Conference on Cloud Computing, pp.364-371, 2011.
DOI : 10.1109/CLOUD.2011.9

S. Alshehri, Toward Effective Access Control Using Attributes and Pseudoroles, 2014.

J. Anderson and J. P. , Computer security threat monitoring and surveillance, 1980.

A. Andrieux, K. Czajkowski, A. Dan, K. Keahey, H. Ludwig et al., Web services agreement specification (wsagreement ) In Open Grid Forum, p.216, 2007.

J. Arshad, P. Townend, and J. Xu, An abstract model for integrated intrusion detection and severity analysis for clouds, Cloud Computing Advancements in Design, Implementation, and Technologies, 2012.

R. Ausanka-crues, Methods for access control: advances and limitations, 2001.

E. Badidi, A Framework for SOFTWARE-AS-A-SERVICE Selection and Provisioning, International journal of Computer Networks & Communications, vol.5, issue.3, 2013.
DOI : 10.5121/ijcnc.2013.5314

K. Bernsmed, M. G. Jaatun, P. H. Meland, and A. Undheim, Security SLAs for Federated Cloud Services, 2011 Sixth International Conference on Availability, Reliability and Security, pp.202-209, 2011.
DOI : 10.1109/ARES.2011.34

E. Bertino, B. Catania, M. L. Damiani, and P. Perlasca, GEO-RBAC, Proceedings of the tenth ACM symposium on Access control models and technologies , SACMAT '05, pp.29-37, 2005.
DOI : 10.1145/1063979.1063985

J. Bethencourt, A. Sahai, and B. Waters, Ciphertext-Policy Attribute-Based Encryption, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.321-334
DOI : 10.1109/SP.2007.11

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.69.3744

S. Biedermann and S. Katzenbeisser, Detecting Computer Worms in the Cloud, Open Problems in Network Security, pp.43-54, 2012.
DOI : 10.1007/978-3-642-27585-2_4

URL : https://hal.archives-ouvertes.fr/hal-01481505

K. Z. Bijon, R. Krishman, and R. Sandhu, Constraints specification in attribute based access control, Science, vol.2, issue.3, pp.131-144, 2013.

K. Z. Bijon, R. Krishnan, and R. Sandhu, A framework for risk-aware role based access control, 2013 IEEE Conference on Communications and Network Security (CNS), pp.462-469, 2013.
DOI : 10.1109/CNS.2013.6682761

K. Z. Bijon, R. Krishnan, and R. Sandhu, Towards an Attribute Based Constraints Specification Language, 2013 International Conference on Social Computing, pp.108-113, 2013.
DOI : 10.1109/SocialCom.2013.23

K. Z. Bijon, R. Krishnan, and R. Sandhu, A Formal Model for Isolation Management in Cloud Infrastructure-as-a-Service, Network and System Security, pp.41-53, 2014.
DOI : 10.1007/978-3-319-11698-3_4

S. Bleikertz, T. Groß, S. Bleikertz, T. Groß, and S. Mödersheim, A virtualization assurance language for isolation and deployment Automated verification of virtualized infrastructures, Policies for Distributed Systems and Networks (POLICY), 2011 IEEE International Symposium on Proceedings of the 3rd ACM workshop on Cloud computing security workshop, pp.33-40, 2011.

A. Bousquet, J. Briffaut, and C. Toinard, An autonomous Cloud management system for in-depth security, 2014 IEEE 3rd International Conference on Cloud Networking (CloudNet), pp.368-374, 2014.
DOI : 10.1109/CloudNet.2014.6969023

URL : https://hal.archives-ouvertes.fr/hal-01191746

J. Briffaut, Formalization and guaranty of system security properties: application to the detection of intrusions, 2007.
URL : https://hal.archives-ouvertes.fr/tel-00261613

J. Brunel, D. Chemouil, L. Rioux, M. Bakkali, and F. Vallée, A viewpoint-based approach for formal safety & security assessment of system architectures, 11th Workshop on Model-Driven Engineering, Verification and Validation, pp.39-48, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01070960

J. M. Calero, N. Edwards, J. Kirschnick, L. Wilcock, and M. Wray, Toward a Multi-Tenancy Authorization System for Cloud Services, IEEE Security & Privacy Magazine, vol.8, issue.6, pp.48-55, 2010.
DOI : 10.1109/MSP.2010.194

R. G. Cascella, Contrail, Proceedings of the 1st European Workshop on Dependable Cloud Computing, EWDCC '12, 2011.
DOI : 10.1145/2365316.2365322

URL : https://hal.archives-ouvertes.fr/hal-00762967

V. Casola, R. Preziosi, M. Rak, and L. Troiano, A reference model for security level evaluation: Policy and fuzzy techniques, 2005.
DOI : 10.1109/itcc.2004.1286747

A. Cavoukian, M. Chibba, G. Williamson, and A. Ferguson, The importance of ABAC: Attribute-based access control to big data: Privacy and context, 2015.

S. Chakraborty and I. Ray, TrustBAC, Proceedings of the eleventh ACM symposium on Access control models and technologies , SACMAT '06, pp.49-58, 2006.
DOI : 10.1145/1133058.1133067

S. Chari, L. Koved, M. E. Zurko, and M. Westford, Using recommenders for Discretionary Access Control, Proceedings of the Web, 2009.

L. Chen and J. Crampton, Risk-Aware Role-Based Access Control, Security and Trust Management, pp.140-156, 2012.
DOI : 10.1007/978-3-642-29963-6_11

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.220.8754

A. Cimatti, E. Clarke, E. Giunchiglia, F. Giunchiglia, M. Pistore et al., NuSMV 2: An OpenSource Tool for Symbolic Model Checking, Computer Aided Verification, pp.359-364, 2002.
DOI : 10.1007/3-540-45657-0_29

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.107.8023

. Cloud-security-alliance, CSA Security, Trust & Assurance Registry (STAR). https://cloudsecurityalliance, 2016.

. Cloud-security-alliance, Consensus Assessments Initiative Questionnaire, 2011.

. Cloud-security-alliance, Security guidance for critical areas of focus in cloud computing v3.0, 2011.

. Vey-report, https://cloudsecurityalliance.org/download/ cloud-adoption-practices-priorities-survey-report, 2015.

E. Coyne and T. R. Weil, ABAC and RBAC: Scalable, Flexible, and Auditable Access Management, IT Professional, vol.15, issue.3, pp.14-16, 2013.
DOI : 10.1109/MITP.2013.37

A. V. Dastjerdi, K. A. Bakar, and S. G. Tabatabaei, Distributed Intrusion Detection in Clouds Using Mobile Agents, 2009 Third International Conference on Advanced Engineering Computing and Applications in Sciences, pp.175-180, 2009.
DOI : 10.1109/ADVCOMP.2009.34

S. A. De-chaves, C. B. Westphall, and F. R. Lamin, SLA Perspective in Security Management for Cloud Computing, 2010 Sixth International Conference on Networking and Services, pp.212-217, 2010.
DOI : 10.1109/ICNS.2010.36

M. Dekker and G. Hogben, Survey and analysis of security parameters in cloud SLAs across the European public sector, 2011.

A. A. Kalam, R. Baida, P. Balbiani, S. Benferhat, F. Cuppens et al., Or-BAC: un modele de contrôle d'acces basé sur les organisations. Cahiers francophones de la recherche en sécurité de l'information, pp.30-43, 2003.

D. A. Fernandes, L. F. Soares, J. V. Gomes, M. M. Freire, and P. R. Inácio, Security issues in cloud environments: a survey, International Journal of Information Security, vol.28, issue.3, pp.113-170, 2014.
DOI : 10.1007/s10207-013-0208-7

D. F. Ferraiolo and D. R. Kuhn, Role-Based Access Control, 15th National Computer Security Conference, 1992.

D. F. Ferraiolo, R. Sandhu, S. Gavrila, D. R. Kuhn, and R. Chandramouli, Proposed NIST standard for role-based access control, ACM Transactions on Information and System Security, vol.4, issue.3, pp.224-274, 2001.
DOI : 10.1145/501978.501980

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.15.4562

A. J. Ferrer, F. Hernández, J. Tordsson, E. Elmroth, A. Ali-eldin et al., OPTIMIS: A holistic approach to cloud service provisioning, Future Generation Computer Systems, vol.28, issue.1, pp.66-77, 2012.
DOI : 10.1016/j.future.2011.05.022

URL : http://dspace.lib.ntua.gr/handle/123456789/33200

M. Frappier, B. Fraikin, R. Chossart, R. Chane-yack-fa, M. Ouenzar et al., Comparison of model checking tools for information systems CloudSurfer-a cloud broker application for security concerns, Formal Methods and Software Engineering CLOSER, pp.581-596, 2010.

J. L. Garcia, T. Vateva-gurova, N. Suri, M. Rak, and L. Liccardo, Negotiating and brokering cloud resources based on security level agreements, CLOSER, pp.533-541, 2013.

T. Garfinkel and M. Rosenblum, A virtual machine introspection based architecture for intrusion detection, NDSS, pp.191-206, 2003.

S. K. Garg, S. Versteeg, and R. Buyya, SMICloud: A Framework for Comparing and Ranking Cloud Services, 2011 Fourth IEEE International Conference on Utility and Cloud Computing, pp.210-218, 2011.
DOI : 10.1109/UCC.2011.36

V. D. Gligor, S. I. Gavrila, and D. Ferraiolo, On the formal definition of separation-of-duty policies and their composition, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186), pp.172-183, 1998.
DOI : 10.1109/SECPRI.1998.674833

E. Goettelmann, K. Dahman, B. Gateau, E. Dubois, and C. Godart, A Security Risk Assessment Model for Business Process Deployment in the Cloud, 2014 IEEE International Conference on Services Computing, pp.307-314
DOI : 10.1109/SCC.2014.48

URL : https://hal.archives-ouvertes.fr/hal-01095874

A. Gouglidis, I. Mavridis, and V. C. Hu, Verification of Secure Inter-operation Properties in Multi-domain RBAC Systems, 2013 IEEE Seventh International Conference on Software Security and Reliability Companion, pp.35-44, 2013.
DOI : 10.1109/SERE-C.2013.25

A. Gouglidis, I. Mavridis, and V. C. Hu, Security policy verification for multi-domains in cloud systems, International Journal of Information Security, vol.8, issue.6, pp.97-111, 2014.
DOI : 10.1007/s10207-013-0205-x

V. Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute-based encryption for fine-grained access control of encrypted data, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.89-98, 2006.
DOI : 10.1145/1180405.1180418

T. T. Group, The notorious nine: cloud computing top threats in 2013, 2013.

A. Guesmi and P. Clemente, Access Control and Security Properties Requirements Specification for Clouds' SecLAs, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science, pp.723-729, 2013.
DOI : 10.1109/CloudCom.2013.133

URL : https://hal.archives-ouvertes.fr/hal-00920768

A. Guesmi, P. Clemente, F. Loulergue, and P. Berthomé, Cloud Resources Placement based on Functional and Non-functional Requirements, Proceedings of the 12th International Conference on Security and Cryptography, pp.20-22, 2015.
DOI : 10.5220/0005552503350342

URL : https://hal.archives-ouvertes.fr/hal-01158134

S. M. Habib, S. Ries, M. Mühlhäuser, and P. Varikkattu, Towards a trust management system for cloud computing marketplaces: using CAIQ as a trust information source, Security and Communication Networks, vol.29, issue.1, pp.2185-2200, 2014.
DOI : 10.1002/sec.748

H. Hamad and M. , Managing Intrusion Detection as a Service in Cloud Networks, International Journal of Computer Applications, vol.41, issue.1, pp.35-40, 2012.
DOI : 10.5120/5508-7533

M. A. Harrison, W. L. Ruzzo, and J. D. Ullman, Protection in operating systems, Communications of the ACM, vol.19, issue.8, pp.461-471, 1976.
DOI : 10.1145/360303.360333

G. Hogben and A. Pannetrat, Mutant Apples: A Critical Examination of Cloud SLA Availability Definitions, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science, pp.379-386, 2013.
DOI : 10.1109/CloudCom.2013.56

G. J. Holzmann, The model checker SPIN, IEEE Transactions on Software Engineering, vol.23, issue.5, 2004.
DOI : 10.1109/32.588521

V. C. Hu, D. Ferraiolo, R. Kuhn, A. Schnitzer, K. Sandlin et al., Guide to attribute based access control (ABAC) definition and considerations, p.162, 2014.
DOI : 10.6028/NIST.SP.800-162

F. K. Hussain and O. K. Hussain, Towards multi-criteria cloud service selection, Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2011.

A. S. Ibrahim, J. Hamlyn-harris, J. Grundy, and M. Almorsy, CloudSec: A security monitoring appliance for Virtual Machines in the IaaS cloud model, 2011 5th International Conference on Network and System Security, pp.113-120, 2011.
DOI : 10.1109/ICNSS.2011.6059967

D. Jackson, Automating first-order relational logic, ACM SIGSOFT Software Engineering Notes, vol.25, issue.6, pp.130-139, 2000.
DOI : 10.1145/357474.355063

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.35.8507

D. Jackson, Alloy: a lightweight object modelling notation, ACM Transactions on Software Engineering and Methodology, vol.11, issue.2, pp.256-290, 2002.
DOI : 10.1145/505145.505149

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.4127

D. Jackson, Software Abstractions: logic, language, and analysis, 2012.

P. Jamkhedkar, J. Szefer, D. Perez-botero, T. Zhang, G. Triolo et al., A Framework for Realizing Security on Demand in Cloud Computing, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science, pp.371-378, 2013.
DOI : 10.1109/CloudCom.2013.55

X. Jin, R. Krishnan, R. S. Sandhu, D. Mac, and R. Dbsec, A Unified Attribute-Based Access Control Model Covering Detecting past and present intrusions through vulnerability-specific predicates, In ACM SIGOPS Operating Systems Review, vol.12, issue.39, pp.41-55, 2005.

E. Kamateri, N. Loutas, D. Zeginis, J. Ahtes, F. D-'andria et al., Cloud4SOA: A Semantic-Interoperability PaaS Solution for Multi-cloud Platform Management and Portability, Service-Oriented and Cloud Computing, pp.64-78, 2013.
DOI : 10.1007/978-3-642-40651-5_6

H. Kamoda, M. Yamaoka, S. Matsuda, K. Broda, and M. Sloman, Policy conflict analysis using free variable tableaux for access control in web services environments, Proceedings of the Policy Management for the Web Workshop at the 14th International World Wide Web Conference (WWW), pp.121-126, 2005.

E. Keller, J. Szefer, J. Rexford, and R. B. Lee, NoHype, ACM SIGARCH Computer Architecture News, vol.38, issue.3, pp.350-361, 2010.
DOI : 10.1145/1816038.1816010

B. Keltoum, B. Mohamed, and B. Mohamed, A Novel Access Control Model for Securing Cloud API. on Networking and Advanced Systems, p.67, 2015.

D. R. Kuhn, E. J. Coyne, and T. R. Weil, Adding Attributes to Role-Based Access Control, Computer, vol.43, issue.6, pp.79-81, 2010.
DOI : 10.1109/MC.2010.155

H. Kwon, T. Kim, S. J. Yu, and H. K. Kim, Self-similarity Based Lightweight Intrusion Detection Method for Cloud Computing, Intelligent Information and Database Systems, pp.353-362, 2011.
DOI : 10.1109/3468.935051

B. W. Lampson, Dynamic protection structures, Proceedings of the November 18-20, 1969, fall joint computer conference on, AFIPS '69 (Fall), pp.27-38, 1969.
DOI : 10.1145/1478559.1478563

C. Langaliya and R. Aluvalu, Enhancing cloud security through access control models: A survey, International Journal of Computer Applications, vol.112, issue.7, p.2015

M. Laureano, C. Maziero, and E. Jamhour, Intrusion detection in virtual machine environments, Proceedings. 30th Euromicro Conference, 2004., pp.520-525, 2004.
DOI : 10.1109/EURMIC.2004.1333416

J. Lee, M. Park, J. Eom, and T. Chung, Multi-level intrusion detection system and log management in cloud computing, Advanced Communication Technology (ICACT) 13th International Conference on, pp.552-555, 2011.

A. Li, X. Yang, S. Kandula, and M. Zhang, CloudCmp, Proceedings of the 10th annual conference on Internet measurement, IMC '10, pp.1-14, 2010.
DOI : 10.1145/1879141.1879143

J. Li, B. Li, T. Wo, C. Hu, J. Huai et al., CyberGuarder: A virtualization security assurance architecture for green cloud computing, Future Generation Computer Systems, vol.28, issue.2, pp.379-390, 2012.
DOI : 10.1016/j.future.2011.04.012

J. Li, G. Zhao, X. Chen, D. Xie, C. Rong et al., Finegrained data access control systems with user accountability in cloud computing, 2010 IEEE Second International Conference on, pp.89-96, 2010.

M. Li, S. Yu, K. Ren, and W. Lou, Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings, Security and Privacy in Communication Networks, pp.89-106, 2010.
DOI : 10.1145/501978.501980

M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou, Analysis of antennas and scatterers with nonlinear loads, IEEE Transactions on Antennas and Propagation, vol.24, issue.2, pp.131-143, 2013.
DOI : 10.1109/TAP.1976.1141328

W. Li, H. Wan, X. Ren, and S. Li, A refined RBAC model for cloud computing, Computer and Information Science (ICIS) 2012 IEEE/ACIS 11th International Conference on, pp.43-48, 2012.

Y. Li, N. Cuppens-boulahia, J. Crom, F. Cuppens, V. Frey et al., Similarity Measure for Security Policies in Service Provider Selection, Information Systems Security, pp.227-242, 2015.
DOI : 10.1007/978-3-319-26961-0_14

URL : https://hal.archives-ouvertes.fr/hal-01392794

L. Liccardo, M. Rak, G. D. Modica, and O. Tomarchio, Ontology-based Negotiation of security requirements in cloud, 2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN), pp.192-197, 2012.
DOI : 10.1109/CASoN.2012.6412401

F. Liu, J. Tong, J. Mao, R. Bohn, J. Messina et al., NIST cloud computing reference architecture, NIST special publication, vol.500, p.292, 2011.
DOI : 10.6028/NIST.SP.500-292

C. Lo, C. Huang, and J. Ku, A Cooperative Intrusion Detection System Framework for Cloud Computing Networks, 2010 39th International Conference on Parallel Processing Workshops, pp.280-284, 2010.
DOI : 10.1109/ICPPW.2010.46

F. Lombardi and R. D. Pietro, Secure virtualization for cloud computing, Journal of Network and Computer Applications, vol.34, issue.4, pp.1113-1122, 2011.
DOI : 10.1016/j.jnca.2010.06.008

A. Lounis, A. Hadjidj, A. Bouabdallah, and Y. Challal, Secure and scalable cloudbased architecture for e-health wireless sensor networks, Computer communications and networks (ICCCN), 2012 21st international conference on, pp.1-7, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00695956

A. Lounis, A. Hadjidj, A. Bouabdallah, and Y. Challal, Healing on the cloud: Secure cloud architecture for medical wireless sensor networks, Future Generation Computer Systems, vol.55, 2015.
DOI : 10.1016/j.future.2015.01.009

URL : https://hal.archives-ouvertes.fr/hal-01466815

H. Ludwig, A. Keller, A. Dan, R. P. King, and R. Franck, Web service level agreement (WSLA) language specification. IBM Corporation, pp.815-824, 2003.

J. Luna, H. Ghani, D. Germanus, N. Suri, J. Luna et al., A security metrics framework for the cloud Quantitative assessment of cloud security level agreements: a case study, Security and Cryptography (SECRYPT), 2011 Proceedings of the International Conference on Proceedings of Security and Cryptography, pp.245-250, 2011.

J. Luna, N. Suri, M. Iorga, and A. Karmel, Leveraging the Potential of Cloud Security Service-Level Agreements through Standards, IEEE Cloud Computing, vol.2, issue.3, pp.32-40, 2015.
DOI : 10.1109/MCC.2015.52

J. , L. Garcia, R. Langenberg, and N. Suri, Benchmarking cloud security level agreements using quantitative policy trees, Proceedings of the 2012 ACM Workshop on Cloud computing security workshop, pp.103-112, 2012.

S. Malik and L. Zhang, Boolean satisfiability from theoretical hardness to practical success, Communications of the ACM, vol.52, issue.8, pp.76-82, 2009.
DOI : 10.1145/1536616.1536637

S. Mankovskii, Typing for conflict detection in access control policies. E- Technologies: Innovation in an Open World, p.212, 2009.

C. Mazzariello, R. Bifulco, and R. Canonico, Integrating a network IDS into an open source Cloud Computing environment, 2010 Sixth International Conference on Information Assurance and Security, pp.265-270, 2010.
DOI : 10.1109/ISIAS.2010.5604069

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.187.6554

M. Meingast, T. Roosta, and S. Sastry, Security and Privacy Issues with Health Care Information Technology, 2006 International Conference of the IEEE Engineering in Medicine and Biology Society, 2006.
DOI : 10.1109/IEMBS.2006.260060

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.84.6807

P. H. Meland, K. Bernsmed, M. G. Jaatun, A. Undheim, and H. N. Castejón, Expressing cloud security requirements in deontic contract languages, CLOSER, pp.638-646, 2012.

P. Mell and T. Grance, The NIST definition of cloud computing, Reports on Computer Systems Technology, NIST, 2011.
DOI : 10.6028/NIST.SP.800-145

C. Modi, D. Patel, B. Borisaniya, A. Patel, and M. Rajarajan, A survey on security issues and solutions at different layers of Cloud computing, The Journal of Supercomputing, vol.34, issue.2, pp.561-592, 2013.
DOI : 10.1007/s11227-012-0831-5

C. Modi, D. Patel, B. Borisaniya, H. Patel, A. Patel et al., A survey of intrusion detection techniques in Cloud, Journal of Network and Computer Applications, vol.36, issue.1, pp.42-57, 2013.
DOI : 10.1016/j.jnca.2012.05.003

H. Moraes, R. V. Nunes, and D. Guedes, Dcportalsng: Efficient isolation of tenant networks in virtualized datacenters, Proc. 13th ICN, 2014.

J. Morris, sVirt: Hardening linux virtualization with mandatory access control

F. Moscato, R. Aversa, B. D. Martino, T. Fortis, and V. Munteanu, An analysis of mosaic ontology for cloud resources annotation, Computer Science and Information Systems (FedCSIS), 2011 Federated Conference on, pp.973-980, 2011.

F. Mostefaoui, Un cadre formel pour le développement orienté aspect: modélisation et vérification des interactions dues aux aspects, 2008.

J. Moura, Characterising access control conflicts, NMR 2012 -14th International Workshop on Non-Monotonic Reasoning, 2012.

K. Munir and S. Palaniappan, Security threats/attacks present in cloud environment, IJCSNS, vol.12, issue.12, p.107, 2012.

Y. Ou, The concept of cloud computing and the main security issues in it, 2015.

A. Patel, M. Taghavi, K. Bakhtiyari, and J. C. Júnior, An intrusion detection and prevention system in cloud computing: A systematic review, Journal of Network and Computer Applications, vol.36, issue.1, pp.25-41, 2013.
DOI : 10.1016/j.jnca.2012.08.007

D. Petcu and C. Craciun, Towards a security sla-based cloud monitoring service, 4th International Conference on Cloud Computing and Services Science (CLOSER), pp.598-603, 2014.
DOI : 10.1109/compsac.2014.50

D. Petcu, C. Craciun, and M. Rak, Towards a cross platform cloud API, 1st International Conference on Cloud Computing and Services Science, pp.166-169, 2011.

D. Power, M. Slaymaker, and A. Simpson, Automatic Conformance Checking of Role-Based Access Control Policies via Alloy, Engineering Secure Software and Systems, pp.15-28, 2011.
DOI : 10.1007/978-3-642-19125-1_2

K. Punithasurya and S. J. Priya, Analysis of different access control mechanism in cloud, International Journal of Applied Information Systems (IJAIS) Foundation of Computer Science FCS, vol.4, issue.2, p.2012

T. Rajendran, P. Balasubramanie, and R. Cherian, An Efficient WS-QoS Broker Based Architecture for Web Services Selection, International Journal of Computer Applications, vol.1, issue.9, pp.79-84, 2010.
DOI : 10.5120/194-333

URL : http://doi.org/10.5120/194-333

T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, Hey, you, get off of my cloud, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.199-212, 2009.
DOI : 10.1145/1653662.1653687

C. Rong, S. T. Nguyen, and M. G. Jaatun, Beyond lightning: A survey on security challenges in cloud computing, Computers & Electrical Engineering, vol.39, issue.1, pp.47-54, 2013.
DOI : 10.1016/j.compeleceng.2012.04.015

S. K. Sah, S. Shakya, and H. Dhungana, A security management for Cloud based applications and services with Diameter-AAA, 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT), pp.6-11, 2014.
DOI : 10.1109/ICICICT.2014.6781243

A. Sahai, B. Waters142-]-r, E. Sailer, T. Valdez, R. Jaeger et al., Fuzzy Identity-Based Encryption, Advances in Cryptology?EUROCRYPT 2005, pp.457-473, 2005.
DOI : 10.1007/11426639_27

R. S. Sandhu, The typed access matrix model, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy, pp.122-136, 1992.
DOI : 10.1109/RISP.1992.213266

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.35.4885

A. Schaad, A framework for organisational control principles, 18th Annual Computer Security Applications Conference, 2002. Proceedings., 2003.
DOI : 10.1109/CSAC.2002.1176294

A. Schaad and J. D. Moffett, A lightweight approach to specification and analysis of role-based access control extensions, Proceedings of the seventh ACM symposium on Access control models and technologies , SACMAT '02, pp.13-22, 2002.
DOI : 10.1145/507711.507714

M. Scholl, K. Stine, K. Lin, and D. Steinberg, Draft security architecture design process for health information exchanges (HIEs), 2009.
DOI : 10.6028/nist.ir.7497

S. Sharma, A. Gupta, and S. Agrawal, A Survey of Intrusion Detection System for Denial of Service Attack in Cloud, International Journal of Computer Applications, vol.120, issue.19, p.2015
DOI : 10.5120/21332-4309

R. T. Simon and M. E. Zurko, Separation of duty in role-based environments, Proceedings 10th Computer Security Foundations Workshop, pp.183-194, 1997.
DOI : 10.1109/CSFW.1997.596811

A. Sirisha and G. G. Kumari, API access control in cloud using the Role Based Access Control Model, Trendz in Information Sciences & Computing(TISC2010), pp.135-137, 2010.
DOI : 10.1109/TISC.2010.5714624

D. Slamanig, Dynamic Accumulator Based Discretionary Access Control for Outsourced Storage with Unlinkable Access, Financial Cryptography and Data Security, pp.215-222, 2012.
DOI : 10.1007/978-3-642-32946-3_16

J. M. Spivey and J. Abrial, The Z notation, 1992.

G. Stoneburner, A. Goguen, and A. Feringa, Risk management guide for information technology systems, Reports on Computer Systems Technology, 2002.
DOI : 10.6028/NIST.SP.800-30

URL : http://www.dtic.mil/get-tr-doc/pdf?AD=ADA396553

S. Subashini and V. Kavitha, A survey on security issues in service delivery models of cloud computing, Journal of Network and Computer Applications, vol.34, issue.1, pp.1-11, 2011.
DOI : 10.1016/j.jnca.2010.07.006

J. Szefer, E. Keller, R. B. Lee, and J. Rexford, Eliminating the hypervisor attack surface for a more secure cloud, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pp.401-412, 2011.
DOI : 10.1145/2046707.2046754

A. Taha, R. Trapero, J. Luna, and N. Suri, AHP-Based Quantitative Approach for Assessing and Comparing Cloud Security, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, pp.284-291, 2014.
DOI : 10.1109/TrustCom.2014.39

B. Tang, Q. Li, and R. Sandhu, A multi-tenant RBAC model for collaborative cloud services, 2013 Eleventh Annual Conference on Privacy, Security and Trust, pp.229-238, 2013.
DOI : 10.1109/PST.2013.6596058

B. Tang, R. Sandhu, and Q. Li, Multi-tenancy authorization models for collaborative cloud services, Concurrency and Computation: Practice and Experience, 2014.
DOI : 10.1002/cpe.3446

Z. Tang, J. Wei, A. Sallam, K. Li, and R. Li, A New RBAC Based Access Control Model for Cloud Computing, Advances in Grid and Pervasive Computing, pp.279-288, 2012.
DOI : 10.1007/978-3-642-30767-6_24

M. Toahchoodee and I. Ray, On the formal analysis of a spatio-temporal rolebased access control model, Data and Applications Security XXII, pp.17-32

M. Toahchoodee and I. Ray, Using Alloy to analyse a spatio-temporal access control model supporting delegation, IET Information Security, vol.3, issue.3, pp.75-113, 2009.
DOI : 10.1049/iet-ifs.2008.0074

W. Tsai and Q. Shao, Role-Based Access-Control Using Reference Ontology in Clouds, 2011 Tenth International Symposium on Autonomous Decentralized Systems, pp.121-128, 2011.
DOI : 10.1109/ISADS.2011.21

C. Vecchiola, X. Chu, and R. Buyya, Aneka: a software platform for .NET-based cloud computing, High Speed and Large Scale Scientific Computing, pp.267-295, 2009.

S. Venticinque, R. Aversa, B. D. Martino, M. Rak, and D. Petcu, A Cloud Agency for SLA Negotiation and Management, Euro-Par 2010 Parallel Processing Workshops, pp.587-594, 2010.
DOI : 10.1007/s10723-006-9049-1

Z. Wan, J. E. Liu, and R. H. Deng, HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. Information Forensics and Security, IEEE Transactions on, vol.7, issue.2, pp.743-754, 2012.

G. Wang, Q. Liu, and J. Wu, Hierarchical attribute-based encryption for finegrained access control in cloud storage services, Proceedings of the 17th ACM conference on Computer and communications security, pp.735-737, 2010.

Q. Wang and H. Jin, Data leakage mitigation for discretionary access control in collaboration clouds, Proceedings of the 16th ACM symposium on Access control models and technologies, SACMAT '11, pp.103-112, 2011.
DOI : 10.1145/1998441.1998457

H. A. Weber, Role-Based Access Control: the nist solution, SANS Institute InfoSec Reading Room, 2003.

Y. Weinsberg, S. Tzur-david, D. Dolev, and T. Anker, High performance string matching algorithm for a network intrusion prevention system (NIPS), 2006 Workshop on High Performance Switching and Routing, p.7, 2006.
DOI : 10.1109/HPSR.2006.1709697

H. Wu, Y. Ding, C. Winer, and L. Yao, Network security for virtual machine in cloud computing Design and implementation of cloud API access control based on OAuth, Computer Sciences and Convergence Information Technology (ICCIT) 5th International Conference on TENCON Spring Conference, pp.18-21, 2010.

Y. Xia, Y. Liu, and H. Chen, Architecture support for guest-transparent vm protection from untrusted hypervisor and physical attacks, High Performance Computer Architecture (HPCA2013), 2013 IEEE 19th International Symposium on, pp.246-257, 2013.

Z. Xiao and Y. Xiao, Security and Privacy in Cloud Computing, IEEE Communications Surveys & Tutorials, vol.15, issue.2, pp.843-859, 2013.
DOI : 10.1109/SURV.2012.060912.00182

T. Xing, D. Huang, L. Xu, C. Chung, and P. Khatkar, SnortFlow: A OpenFlow-Based Intrusion Prevention System in Cloud Environment, 2013 Second GENI Research and Educational Experiment Workshop, pp.89-92, 2013.
DOI : 10.1109/GREE.2013.25

S. Yangui, I. Marshall, J. Laisne, and S. Tata, CompatibleOne: The Open Source Cloud Broker, Journal of Grid Computing, vol.3828, issue.2, pp.93-109, 2014.
DOI : 10.1007/s10723-013-9285-0

URL : https://hal.archives-ouvertes.fr/hal-01262821

E. Yuan and J. Tong, Attributed based access control (ABAC) for Web services, IEEE International Conference on Web Services (ICWS'05)
DOI : 10.1109/ICWS.2005.25

F. Zhang, J. Chen, H. Chen, and B. Zang, CloudVisor, Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, SOSP '11, pp.203-216, 2011.
DOI : 10.1145/2043556.2043576

R. Zhang and L. Liu, Security Models and Requirements for Healthcare Application Clouds, 2010 IEEE 3rd International Conference on Cloud Computing, pp.268-275, 2010.
DOI : 10.1109/CLOUD.2010.62

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.165.7184

J. Zhu and W. W. Smari, Attribute Based Access Control and Security for Collaboration Environments, 2008 IEEE National Aerospace and Electronics Conference, pp.31-35, 2008.
DOI : 10.1109/NAECON.2008.4806511