1. Security and privacy challenges in cloud computing environments;Takabi;IEEE Secur. Privacy,2010
2. T. Phan, J. Han, J. Schneider, T. Ebringer, T. Rogers, A survey of policy-based management approaches for service oriented systems, in: 19th Australian Conference on Software Engineering, ASWEC 2008, 2008, pp. 392–401.
3. OASIS, WS-SecurityPolicy 1.3, OASIS Standard, 2012. Available at: http://www.oasis-open.org/specs/. URL: http://www.oasis-open.org/specs/.
4. W3C, Web Services Policy 1.5—Framework, W3C Recommendation, September 2007. Available at: http://www.w3.org/TR/ws-policy/. URL: http://www.w3.org/TR/ws-policy/.
5. G. Di Modica, O. Tomarchio, A semantic model to support security matching in cloud environments, in: CLOSER 2013—Proceedings of the 3rd International Conference on Cloud Computing and Services Science, Aachen, Germany, 2013, pp. 427–436.