Délai moyen global pour un service IaaS sans NaaS dans l'architecture, p.88 ,
Réelle révolution ou simple évolution ?,» En ligne, 2015. ,
A break in the clouds, ACM SIGCOMM Computer Communication Review, vol.39, issue.1, pp.50-55, 2009. ,
DOI : 10.1145/1496091.1496100
Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility, Future Generation Computer Systems, vol.25, issue.6, pp.599-616, 2009. ,
DOI : 10.1016/j.future.2008.12.001
A survey on security issues in service delivery models of cloud computing, Journal of Network and Computer Applications, vol.34, issue.1, pp.1-11, 2010. ,
DOI : 10.1016/j.jnca.2010.07.006
«Standardization Activities for Cloud Computing,» Global Standardization Activities, NTT Information Sharing Platform Laboratories Musashino-shi, 2011. ,
«CloudSim : a toolkit for modelsing and simulation of cloud computing environments and evaluation of resource provisioning algorithms,» Software : Practice and Experience, pp.23-50, 2011. ,
Designing and implementing MapReduce computing model on CloudSim, ICTC 2012 International Conference on ICT Convergence, pp.504-509, 2012. ,
DOI : 10.1109/ictc.2012.6387186
«GroudSim : an event-based simulation framework for computational grids and clouds,» Core- GRID/ERCIM Workshop on Grids and Clouds «DCSim : a data centre simulation tool for evaluating dynamic virtualized resource management, The 6th International DMTF Academic Alliance Workshop on Systems and Virtualization Management : Standard and the Cloud, pp.305-313, 2010. ,
GreenCloud: A Packet-Level Simulator of Energy-Aware Cloud Computing Data Centers, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, pp.1-5, 2010. ,
DOI : 10.1109/GLOCOM.2010.5683561
Castane et al, «iCanCloud : a flexible and scalable cloud infrastructure simulator, Journal of Grid Computing, vol.1, issue.1, pp.185-209, 2012. ,
En ligne : www.sap.com/sme/solutions/business management/businessbydesign/index.epx [accédé en 10, 2015. ,
En ligne : www.microsoft.com/azure accédé en 10, 2015. ,
Web Hosting by RackspaceHosting " » En ligne : http ://www.rackspace.com [accédé en 10, 2015. ,
» Parts 1 to 7, 2012. [51] «OpenStack : NaaS,» En ligne : https ://wiki.openstack.org/wiki, 2015. ,
NetworkCloudSim: Modelling Parallel Applications in Cloud Simulations, 2011 Fourth IEEE International Conference on Utility and Cloud Computing, pp.105-113, 2011. ,
DOI : 10.1109/UCC.2011.24
CloudNaaS, Proceedings of the 2nd ACM Symposium on Cloud Computing, SOCC '11, pp.1-13, 2011. ,
DOI : 10.1145/2038916.2038924
«Intercloud : Utility-oriented federation of cloud computing environments for scaling of application services,» Algorithms and Architectures for Parallel Processing, pp.13-31, 2010. ,
«Time-Critical Event Dissemination in Geographically Distributed Clouds, IEEE INFOCOM Workshop on Cloud Computing, pp.654-659, 2011. ,
A Dynamic Data-Driven Simulation Approach for Preventing Service Level Agreement Violations in Cloud Federation, International Conference on Computational Science, ICCS 2012, Procedia Computer Science 9, pp.1167-1176, 2012. ,
DOI : 10.1016/j.procs.2012.04.126
Failure as a service (faas) : A cloud service for large-scale, online failure drills, 2011. ,
Identifying the security risks associated with governmental use of cloud computing, Government Information Quarterly, vol.27, issue.3, pp.245-253, 2010. ,
DOI : 10.1016/j.giq.2010.01.002
«Energy and QoS-aware workload management in clouds,» The final proposal of the focus group, 2011. ,
Resource-Level QoS Metric for CPU-Based Guarantees in Cloud Providers, LNCS, vol.6296, pp.34-47, 2010. ,
DOI : 10.1007/978-3-642-15681-6_3
URL : http://capinfo.e.ac.upc.edu/PDFs/dir18/file003788.pdf
Service Level Agreement-Based Joint Application Environment Assignment and Resource Allocation in Cloud Computing Systems, 2013 IEEE Green Technologies Conference (GreenTech), pp.167-174, 2013. ,
DOI : 10.1109/GreenTech.2013.33
«CSLA : a Language for improving Cloud SLA Management, International Conference on Cloud Computing and Services Science, CLOSER 2012, 2012. ,
SLA-Based Resource Allocation for Software as a Service Provider (SaaS) in Cloud Computing Environments, 2011 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, pp.23-26, 2011. ,
DOI : 10.1109/CCGrid.2011.51
Jeong, «The QoS-based MCDM system for SaaS ERP applications with Social Network ,
«A Novel P2P and Cloud Computing Hybrid Architecture for Multimedia Streaming with QoS Cost Functions,» MM'10, 2010. ,
Q-clouds, Proceedings of the 5th European conference on Computer systems, EuroSys '10, 2010. ,
DOI : 10.1145/1755913.1755938
QoS-Enabled Distributed Mutual Exclusion in Public Clouds, OTM'11 Proceedings of the 2011th Confederated international conference on On the move to meaningful internet systems, pp.542-559, 2011. ,
DOI : 10.1007/978-3-642-25106-1_9
Negotiating and Enforcing QoS and SLAs in Grid and Cloud Computing, Proc. of the 4th International Conference on Advances in Grid and Pervasive Computing (GPC), pp.25-35, 2009. ,
DOI : 10.1007/978-3-642-01671-4_3
Anandasivam et R. Buyya, «Environment-conscious scheduling of HPC applications on distributed cloud-oriented data centers, Journal of Parallel and Distributed Computing, 2011. ,
An End-to-End QoS Mapping Approach for Cloud Service Selection, 2013 IEEE Ninth World Congress on Services, pp.341-348, 2013. ,
DOI : 10.1109/SERVICES.2013.71
A Game Theoretic Framework of SLA-based Resource Allocation for Competitive Cloud Service Providers, Sixth Annual IEEE Green Technologies Conference, pp.37-43, 2014. ,
Framework and user migration strategy of cloud-based video conference multi-gateway system, 2012 19th International Conference on High Performance Computing, pp.1-8, 2012. ,
DOI : 10.1109/HiPC.2012.6507521
vSkyConf, Proceedings of the second ACM SIGCOMM workshop on Mobile cloud computing, MCC '13, 2013. ,
DOI : 10.1145/2491266.2491273
Airlift: Video conferencing as a cloud service using inter-datacenter networks, 2012 20th IEEE International Conference on Network Protocols (ICNP), 2012. ,
DOI : 10.1109/ICNP.2012.6459966
A Cost-Effective Methodology Applied to Videoconference Services over Hybrid Clouds, Mobile Networks and Applications, vol.13, issue.5, pp.103-109, 2013. ,
DOI : 10.1007/s11036-012-0380-4
Videoconference Capacity Leasing on Hybrid Clouds, 2011 IEEE 4th International Conference on Cloud Computing, pp.340-347, 2011. ,
DOI : 10.1109/CLOUD.2011.51
Security Infrastructure for On-demand Provisioned Cloud Infrastructure Services, 2011 IEEE Third International Conference on Cloud Computing Technology and Science, pp.255-263, 2011. ,
DOI : 10.1109/CloudCom.2011.42
Addressing cloud computing security issues, Future Generation Computer Systems, vol.28, issue.3, pp.583-592, 2012. ,
DOI : 10.1016/j.future.2010.12.006
Network security essentials : applications and standards, 2005. ,
Applying security policies and service level agreement to IaaS service model to enhance security and transition". computers & security 31, pp.315-326, 2012. ,
Survey of security problems in cloud computing virtual machines. Computer and Electronics Security Applications, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00761206
Cloud Computing Security: A Survey, Computers, vol.3, issue.1, pp.11-35, 2014. ,
DOI : 10.3390/computers3010001
Service Level Agreement-Based Joint Application Environment Assignment and Resource Allocation in Cloud Computing Systems, 2013 IEEE Green Technologies Conference (GreenTech), pp.167-174, 2013. ,
DOI : 10.1109/GreenTech.2013.33
Identification of IT Security and legal requirements regarding Cloud services, Sixth International Conference on Cloud Computing, GRIDs, and Virtualization, CLOUD COMPUTING 2015, pp.1-7, 2015. ,
SeDaSC: Secure Data Sharing in Clouds, IEEE Systems Journal, pp.1-10, 2015. ,
DOI : 10.1109/JSYST.2014.2379646
A novel trust management framework for multi-cloud environments based on trust service providers. Knowledge-Based Systems, pp.392-406, 2014. ,
On-demand security architecture for cloud computing, Middle-East J. Sci. Res, vol.20, issue.2, pp.241-246, 2014. ,
Time-based proxy re-encryption scheme for secure data sharing in a cloud environment, Information Sciences, vol.258, pp.355-370, 2014. ,
DOI : 10.1016/j.ins.2012.09.034
Stealthy Denial of Service Strategy in Cloud Computing, IEEE Transactions on Cloud Computing, vol.3, issue.1, 2014. ,
DOI : 10.1109/TCC.2014.2325045
Counteracting security attacks in virtual machines in the cloud using property based attestation, Journal of Network and Computer Applications, vol.40, pp.31-45, 2014. ,
DOI : 10.1016/j.jnca.2013.08.002
Securing the virtual machine images in cloud computing, Proceedings of the 6th International Conference on Security of Information and Networks, SIN '13, pp.425-428, 2013. ,
DOI : 10.1145/2523514.2523576
A Trusted Virtual Machine in an Untrusted Management Environment, IEEE Transactions on Services Computing, vol.5, issue.4, pp.472-483, 2012. ,
DOI : 10.1109/TSC.2011.30
Security and Trust Preserving VM Migrations in Public Clouds, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp.869-876, 2012. ,
DOI : 10.1109/TrustCom.2012.256
Security and privacy for storage and computation in cloud computing, Information Sciences, vol.258, pp.371-386, 2014. ,
DOI : 10.1016/j.ins.2013.04.028
DCPortalsNg : efficient isolation of tenant networks in virtualized datacenters, Thirteenth International Conference on Networks, pp.230-235, 2014. ,
Improving cloud network security using the Tree-Rule firewall, Future Generation Computer Systems, vol.30, pp.116-126, 2014. ,
DOI : 10.1016/j.future.2013.06.024
Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds, IEEE Transactions on Parallel and Distributed Systems, vol.25, issue.2, pp.384-394, 2014. ,
DOI : 10.1109/TPDS.2013.38
A security management for Cloud based applications and services with Diameter-AAA, 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT), pp.6-11, 2014. ,
DOI : 10.1109/ICICICT.2014.6781243
Building a Compliance Vocabulary to Embed Security Controls in Cloud SLAs, 2013 IEEE Ninth World Congress on Services, pp.118-125, 2013. ,
DOI : 10.1109/SERVICES.2013.27
SLA guarantees for cloud services, Future Generation Computer Systems, vol.54, 2015. ,
DOI : 10.1016/j.future.2015.03.018
URL : https://hal.archives-ouvertes.fr/hal-01162654
Risk propagation of security SLAs in the cloud, 2012 IEEE Globecom Workshops, pp.730-735, 2012. ,
DOI : 10.1109/GLOCOMW.2012.6477665
A SLA-based interface for security management in cloud and GRID integrations, 2011 7th International Conference on Information Assurance and Security (IAS), pp.378-383, 2011. ,
DOI : 10.1109/ISIAS.2011.6122783
A broker-based cooperative security-SLA evaluation methodology for personal cloud computing, Security and Communication Networks, vol.45, issue.7, 2014. ,
DOI : 10.1002/sec.1086
SLA Perspective in Security Management for Cloud Computing, Sixth International Conference on Networking and Services, 2010. ,
Review of cloud computing security , Acta Electron, Sinica, vol.41, issue.2, pp.371-381, 2013. ,
Beyond lightning: A survey on security challenges in cloud computing, Computers & Electrical Engineering, vol.39, issue.1, pp.47-54, 2013. ,
DOI : 10.1016/j.compeleceng.2012.04.015
Cloud computing security: The scientific challenge, and a survey of solutions, Security and privacy in cloud computing, pp.2263-2268, 2013. ,
DOI : 10.1016/j.jss.2012.12.025
Security and Privacy in Cloud Computing, IEEE Cloud Computing, vol.1, issue.1, pp.54-57, 2014. ,
DOI : 10.1109/MCC.2014.20
Cloud security : state of the art, in : Security, Privacy and Trust in Cloud Systems, pp.3-44, 2014. ,
A survey on security issues and solutions at different layers of Cloud computing, The Journal of Supercomputing, vol.34, issue.2, pp.561-592, 2013. ,
DOI : 10.1007/s11227-012-0831-5
Cloud Computing Risk Assessment: A Systematic Literature Review, Future Information Technology, pp.285-295, 2014. ,
DOI : 10.1007/978-3-642-40861-8_42
Security issues in cloud environments: a survey, International Journal of Information Security, vol.28, issue.3, pp.113-170, 2014. ,
DOI : 10.1007/s10207-013-0208-7
Cryptographic key management issues and challenges in cloud services, Secure Cloud Computing, pp.1-30, 2014. ,
DOI : 10.6028/nist.ir.7956
Security in cloud computing: Opportunities and challenges, Information Sciences, vol.305, pp.357-383, 2015. ,
DOI : 10.1016/j.ins.2015.01.025
«BtrScript : A Safe Management System for Virtualized Data Center,» ICAS 2012, The Eighth International Conference on Autonomic and Autonomous Systems, pp.49-56, 2012. ,
Cluster-wide context switch of virtualized jobs, Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing, HPDC '10, pp.658-666, 2010. ,
DOI : 10.1145/1851476.1851574
URL : https://hal.archives-ouvertes.fr/inria-00476790
André et O. Barais, «Adaptation multi-niveaux : l'infrastructure au service des applications,» RenPar'20 / SympA'14, 2011. ,
Gokhale, «Adapting distributed realtime and embedded publish/subscribe middleware for cloud-computing environments, Proc. of ACMII- FlPIUSENlX Middleware, 2010. ,
DOI : 10.1007/978-3-642-16955-7_2
SLA-driven capacity planning for Cloud applications, 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012. ,
DOI : 10.1109/CloudCom.2012.6427519
URL : https://hal.archives-ouvertes.fr/hal-00734417
A Dynamic Data-Driven Simulation Approach for Preventing Service Level Agreement Violations in Cloud Federation, International Conference on Computational Science, ICCS 2012, Procedia Computer Science 9, pp.1167-1176, 2012. ,
DOI : 10.1016/j.procs.2012.04.126
SLA based resource allocation policies in autonomic environments, Journal of Parallel and Distributed Computing, vol.67, issue.3, pp.259-270, 2007. ,
DOI : 10.1016/j.jpdc.2006.10.006
SLA-Aware Virtual Resource Management for Cloud Infrastructures, 2009 Ninth IEEE International Conference on Computer and Information Technology, pp.357-362, 2009. ,
DOI : 10.1109/CIT.2009.109
URL : https://hal.archives-ouvertes.fr/hal-00474722
ServBGP: BGP-inspired autonomic service routing for multi-provider collaborative architectures in the cloud, Future Generation Computer Systems (Impact Factor : 2.365), in press, 2012. ,
DOI : 10.1016/j.future.2012.05.013
SECURITY METHOD: CLOUD COMPUTING APPROACH BASED ON MOBILE AGENTS, International Journal of New Computer Architectures and their Applications, vol.4, issue.4, pp.17-29, 2014. ,
DOI : 10.17781/P002
URL : https://doaj.org/article/9803e1cf7f1b44d4872b296928c0f2c4
A survey of autonomic computing???degrees, models, and applications, ACM Computing Surveys, vol.40, issue.3, pp.1-28, 2008. ,
DOI : 10.1145/1380584.1380585
«What's New About Cloud Computing Security ?, pp.1-8, 2010. ,
«Étude de l'impact des attaques distribuées et multi-chemins sur les solutions de sécurité réseaux ,» 9ème Conférence Internationale Jeunes Chercheurs, pp.1-8 ,
RFC 3711 : The Secure Real-time Transport Protocol (SRTP), Request for Comments, IETF, 2004. ,
RFC 4347 : Datagram Transport Layer Security (DTLS), Request for Comments, IETF, 2006. ,
Cryptographic Algorithm Implementation Requirements for Encapsulating Security Payload and Authentication Header, 2005. ,