, De même, dans le processus proposé certains paramètres sont calculés, tant intra-journal que inter-journal, dans le but d'analyser le comportement global des partenaires extérieurs. La principale nouveauté de la démarche proposée est l'utilisation des connaissances empiriques recueillies au cours de la prestation de services afin de garantir la conformité avec les règles individuelles et l'ensemble du contrat. Contrairement aux méthodes actuelles basées sur une vérification de la politique au cours de l'exécution, nous avons ciblé une vérification a posteriori dans le cadre d'une approche de semi-confiance. Cela signifie, en raison du fait que les règles ne peuvent pasêtre vérifiées directement car les comportements du partenaire externe ne sont pas observables, que des informations plus concrètes sont nécessaires pour vérifier la conformité avec la politique. Par conséquent, on peut affirmer que les partenaires n'ont pas entièrement confiance dans les comportements des organismes externes

, Comme un travail de recherche n'est jamais complètement terminé, dans ce qui suit, nous présentons un aperçu des perspectives qui s'ouvrent dans la lignée de cette thèse, certains d'entre elles sont de simples améliorationsà l'approche proposée qui peuventêtre faitesà court terme, alors que d'autres ont une portée plus grande et leur complexité suppose une visionà long terme

, En effet, dans le chapitre 4, une analyse aété faite pour argumenter pourquoi le modèle SWRL, qui combine les ontologies et les règles, ne convient pas a notre problème. Cependant, il est possible d'envisager la création d'un langage basé sur le modèle proposé pour la définition des politiques contractuelles. Pour cela, il sera nécessaire de modifier l'analyseur et le moteur d'inférence pour maintenir la représentation proposée.À cetégard, Une première amélioration concerne le développement du modèle de règles de contrôlabilité proposé avec une représentation ontologique

, Une seconde perspective est liéeà améliorer l'expressivité des règles de contrôlabilité pour permettre de modéliser des comportements alternatifs. Il aété mentionné dans le chapitre 5 qu'une solution possible serait d'inclure un bloc "else" dans la structure de la règle. Pour cela, le processus de vérification doitégalementêtre modifié en conséquence. Dès lors, le non-respect d'une obligation n'a pas d'impact négatif pour l

, Tout au long de cette thèse, l'hypothèse d'avoir un seul fournisseur et un seul client aété faite. Cela pouréviter le processus de négociation

G. Aceto, A. Botta, W. D. Donato, and A. Pescapè, Cloud monitoring: A survey, Computer Networks, vol.57, issue.9, pp.2093-2115, 2013.

M. F. Al-jaberi and A. , Data integrity and privacy model in cloud computing, Biometrics and Security Technologies (ISBAST), 2014 International Symposium on, pp.280-284, 2014.

G. H. Alférez, V. Pelechano, R. Mazo, C. Salinesi, and D. Diaz, Dynamic adaptation of service compositions with variability models, Journal of Systems and Software, vol.91, pp.24-47, 2014.

A. Almutairi and F. Siewe, Formal specification of ca-ucon model using cca, Science and Information Conference (SAI), pp.369-375, 2013.

A. Andrieux, K. Czajkowski, A. Dan, K. Keahey, H. Ludwig et al., Grid Resource Allocation Agreement Protocol (GRAAP) WG, 2005.

M. Anisetti, C. A. Ardagna, and E. Damiani, Security certification of composite services: A test-based approach, IEEE 20th International Conference on, pp.475-482, 2013.

M. Anisetti, C. A. Ardagna, E. Damiani, P. A. Bonatti, M. Faella et al., E-auctions for multi-cloud service provisioning, IEEE International Conference on, pp.35-42, 2014.

M. Anisetti, C. A. Ardagna, M. Bezzi, E. Damiani, and A. Sabetta, Machine-readable privacy certificates for services, On the Move to Meaningful Internet Systems: OTM 2013 Conferences -Confederated International Conferences: CoopIS, DOA-Trusted Cloud, and ODBASE 2013, pp.434-450, 2013.

M. Anisetti, C. A. Ardagna, E. Damiani, and F. Saonara, A test-based security certification scheme for web services, TWEB, vol.7, issue.2, p.5, 2013.

A. Claudio, R. Ardagna, V. Jhawar, and . Piuri, Dependability certification of services: a model-based approach, Computing, vol.97, issue.1, pp.51-78, 2015.

A. Itil-practitioner-guidance, , 2016.

S. Ayed, Secure workflow deployment in multi-organizational environments, Sciences Sociales et de l'Information, 2009.
URL : https://hal.archives-ouvertes.fr/hal-00434369

A. Barros, M. Dumas, and A. H. Ter-hofstede, Service Interaction Patterns, pp.302-318, 2005.

A. Belapurkar, A. Chakrabarti, H. Ponnapalli, N. Varadarajan, S. Padmanabhuni et al., Distributed Systems Security -Issues, Processes and Solutions, pp.1-307, 2009.

M. Bezzi and S. Trabelsi, Data Usage Control in the Future Internet Cloud, pp.223-231, 2011.

T. Biske and . Soa-governance, , 2008.

A. Borgida and L. Serafini, Distributed Description Logics: Assimilating Information from Peer Sources, pp.153-184, 2003.

S. Boukhedouma, M. Oussalah, Z. Alimazighi, and D. Tamzalit, Adaptation patterns for service based inter-organizational workflows, IEEE 7th International Conference on Research Challenges in Information Science (RCIS), pp.1-10, 2013.
URL : https://hal.archives-ouvertes.fr/hal-01063854

E. Casalicchio and L. Silvestri, Mechanisms for sla provisioning in cloud-based service providers, Computer Networks, vol.57, issue.3, pp.795-810, 2013.

P. Ceravolo, C. Fugazza, and M. Leida, Modeling semantics of business rules, Inaugural IEEE-IES Digital EcoSystems and Technologies Conference, pp.171-176, 2007.

N. Choi, H. Song, and . Han, A survey on ontology mapping, ACM Sigmod Record, vol.35, issue.3, pp.34-41, 2006.

S. Cimato, E. Damiani, F. Zavatarelli, and R. Menicocci, Towards the certification of cloud services, IEEE Ninth World Congress on Services, pp.92-97, 2013.

V. Cisternino, A. Corallo, G. Elia, and C. Fugazza, Business rules for semantics-aware business modelling: overview and open issues, Int. J. Web Eng. Technol, vol.5, issue.1, pp.104-131, 2009.

, The World Wide Web Consortium. Xml signature syntax and processing. W3C Recommendation V 1.1, W3C, 2013.

, Improving Web Services Security: Scenarios and Implementation Guidance for WCF, vol.29, 2009.

E. Damiani, S. De-capitani-di-vimercati, C. Fugazza, and P. Samarati, Extending context descriptions in semantics-aware access control, Proceedings of the Second International Conference on Information Systems Security, ICISS'06, pp.162-176, 2006.

E. Damiani, S. De-capitani-di-vimercati, C. Fugazza, and P. Samarati, Extending Policy Languages to the Semantic Web, pp.330-343, 2004.

E. Damiani, S. De-capitani-di-vimercati, C. Fugazza, and P. Samarati, Modality conflicts in semantics aware access control, Proceedings of the 6th International Conference on Web Engineering, ICWE '06, pp.249-256, 2006.

S. De-cesare and G. L. Geerts, Toward a Perdurantist Ontology of Contracts, pp.85-96, 2012.

, Ley 19628 -ley sobre proteccion de la vida privada, 2012.

D. D. Downs, J. R. Rub, K. C. Kung, and C. S. Jordan, Issues in discretionary access control, Security and Privacy, 1985 IEEE Symposium on, pp.208-208, 1985.

C. Vincent, . Emeakaroha, A. S. Marco, R. N. Netto, I. Calheiros et al., Towards autonomic detection of sla violations in cloud infrastructures, Future Generation Computer Systems, vol.28, issue.7, pp.1017-1029, 2012.

J. Epstein, S. Matsumoto, and G. Mcgraw, Software security and soa: Danger, will robinson! IEEE Security & Privacy, vol.4, pp.80-83, 2006.

, Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, Official Journal of the European Union, vol.281, pp.31-0050, 1995.

, concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications), Official Journal of the European Union, vol.201, pp.37-0047, 2002.

, Directive 2010/87/EU on standard contractual clauses for the transfer of personal data to processors established in third countries under Directive 95/46/EC of the European Parliament and of the Council, Official Journal of the European Union, vol.318, pp.32-0035, 2010.

, Directive (EU) 2016/680 of the European Parliament and of the Council, Official Journal of the European Union, vol.119, pp.89-131, 2016.

D. Fensel, H. Lausen, A. Polleres, J. De-bruijn, M. Stollberg et al., Enabling Semantic Web Services: The Web Service Modeling Ontology, 2006.

S. Fenz and A. Ekelhart, Formalizing information security knowledge, Proceedings of the 4th international Symposium on information, Computer, and Communications Security, pp.183-194, 2009.

D. Ferraiolo, J. Cugini, and D. Kuhn, Role-based access control (rbac): Features and motivations, Proceedings of 11th annual computer security application conference, pp.241-289, 1995.

H. Foster and G. Spanoudakis, Smart: a workbench for reporting the monitorability of services from slas, Proceedings of the 3rd International Workshop on Principles of Engineering Service-Oriented Systems, pp.36-42, 2011.

V. Gaur, O. P. Dhyani, and . Rishi, A multi-objective optimization of cloud based sla-violation prediction and adaptation, International Journal of Information Technology and Computer Science, vol.8, issue.6, pp.60-65, 2016.

N. M. Gonzalez, M. A. Rojas, M. V. Silva, F. Redigolo, T. C. Carvalho et al., A framework for authentication and authorization credentials in cloud computing, 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp.509-516, 2013.

N. Grewe, A generic reification strategy for n-ary relations in dl, OBML 2010 Workshop Proceedings, 2010.

, Service-oriented architecture ontology, version 2.0. The Open Group Technical Standard Reference C144, The Open Group, The Open Group, 2014.

A. Haeberlen, A case for the accountable cloud, ACM SIGOPS Operating Systems Review, vol.44, issue.2, pp.52-57, 2010.

D. Hannah, E. Treen, L. Pitt, and P. Berthon, But you promised! managing consumers' psychological contracts, Business Horizons, vol.59, issue.4, pp.363-368, 2016.

C. Hoertnagl, J. F. Riordan, and D. Bourges-waldegg, Semantic digital signatures, p.245, 2009.

G. Hohpe and B. Woolf, Enterprise Integration Patterns: Designing, Building, and Deploying Messaging Solutions. A Martin Fowler signature book, 2004.

K. Huang, M. Xian, S. Fu, and J. Liu, Securing the cloud storage audit service: defending against frame and collude attacks of third party auditor, IET Communications, vol.8, issue.12, pp.2106-2113, 2014.

W. Hussain, F. K. Hussain, and O. K. Hussain, Comparative analysis of consumer profile-based methods to predict sla violation, 2015 IEEE International Conference on, pp.1-8, 2015.

, Web Services Standards as of Q1, 2007.

, International Working Group on Data Protection in Telecommunications. Working Paper on Cloud Computing -Privacy and data protection issues -Sopot Memorandum. 51st Meeting, pp.23-24, 2012.

. Isaca and . Cobit, A Business Framework for the Governance and Management of Enterprise IT. COBIT R 5. ISACA, vol.5, 2012.

. Iso/iec and . Iso/, Information technology -Security techniques -Code of practice for information security management, IEC, vol.27002, 2005.

. Iso/iec, ISO/IEC 27005. Information security risk management

. Iso/iec, , 2011.

. Iso/iec, Information Technology -Security Techniques -Information Security Management Systems: Overview and Vocabulary, 2016.

G. E. Jaramillo, M. Munier, and P. Aniorte, Information security in business intelligence based on cloud: A survey of key issues and the premises of a proposal, WOSIS 2013 -Proceedings of the 10th International Workshop on Security in Information Systems, In conjunction with ICEIS 2013, 2013.
URL : https://hal.archives-ouvertes.fr/hal-01082063

H. Jayasree and A. Damodaram, Anonymity and accountability in web based transactions, Advanced Computing : An International Journal, vol.3, issue.2, pp.171-182, 2012.

P. Vandana-kabilan, D. M. Johannesson, and . Rugaimukamu, Business Contract Obligation Monitoring through Use of Multi Tier Contract Ontology, pp.690-702, 2003.

A. A. Kalam, R. E. Baida, P. Balbiani, S. Benferhat, F. Cuppens et al., Organization based access control, Policies for Distributed Systems and Networks, 2003. Proceedings. POLICY 2003. IEEE 4th International Workshop on, pp.120-131, 2003.
URL : https://hal.archives-ouvertes.fr/hal-01483818

Y. Kalfoglou and M. Schorlemmer, Ontology mapping: the state of the art. The knowledge engineering review, vol.18, pp.1-31, 2003.

P. Karaenke and S. Kirn, Service level agreements: An evaluation from a business application perspective, Proceedings of eChallenges, 2007.

K. T. Kearney, F. Torelli, and C. Kotsokalis, Sla*: An abstract syntax for service level agreements, 11th IEEE/ACM International Conference on Grid Computing, pp.217-224, 2010.

K. Tong-ka, Developing web services with Apache CXF and Axis2, Lulu. com, 2010.

M. Krötzsch, OWL 2 Profiles: An introduction to lightweight ontology languages, Proceedings of the 8th Reasoning Web Summer School, vol.7487, pp.112-183, 2012.

V. Lalanne, M. Munier, and A. Gabillon, Information security risk management in a world of services, Social Computing (SocialCom), 2013 International Conference on, pp.586-593, 2013.
URL : https://hal.archives-ouvertes.fr/hal-01020244

V. Lalanne, Gestion des risques dans les architectures orientées services, 2013.

D. D. Lamanna, J. Skene, and W. Emmerich, Slang: A language for defining service level agreements, Distributed Computing Systems, 2003. FTDCS 2003. Proceedings. The Ninth IEEE Workshop on Future Trends of, pp.100-106, 2003.

F. Layouni and Y. Pollet, Fi-orbac: a model of access control for federated identity platform, IADIS International Conference Information Systems, 2009.
URL : https://hal.archives-ouvertes.fr/hal-01125878

D. S. Linthicum, Cloud Computing and SOA Convergence in Your Enterprise: A Step-by-Step Guide, 2009.

D. S. Linthicum, How the cloud has modernized SOA, vol.29, 2016.

P. Lopes-cardoso, ;. Henrique, E. Leitão, and . Oliveira, An approach to inter-organizational workflow management in an electronic institution, Proceedings of the 11th IFAC Symposium on Information Control Problems in Manufacturing, 2006.

L. Lowis and R. Accorsi, On a classification approach for soa vulnerabilities, Computer Software and Applications Conference, vol.2, pp.439-444, 2009.

H. Ludwig, A. Keller, A. Dan, R. P. King, and R. Franck, Web Service Level Agreement (WSLA) Language Specification, 2003.

X. Luo, L. Li, and W. Luo, A contextual usage control model. Tehnicki vjesnik/Technical Gazette, vol.21, 2014.

A. Mellat and N. Nematbakhsh, Ahmad Farahi, and Farhad Mardukhi. Suitability of uml state machines for modeling choreography of services, International Journal of Web & Semantic Technology, vol.2, issue.4, pp.33-53, 2011.

C. Müller, M. Oriol, X. Franch, J. Marco, M. Resinas et al., Comprehensive explanation of sla violations at runtime, IEEE Transactions on Services Computing, vol.7, issue.2, pp.168-183, 2014.

M. Munier, V. Lalanne, and M. Ricarde, Self-protecting documents for cloud storage security, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp.1231-1238, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00736133

M. Munier, V. Lalanne, P. Ardoy, and M. Ricarde, Legal Issues About Metadata Data Privacy vs Information Security, pp.162-177, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01082056

M. Munier, V. Lalanne, P. Ardoy, and M. Ricarde, Métadonnées et Aspects Juridiques: Vie Privée vs Sécurité de l'Information, 9ème Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information (SARSSI'2014), pp.65-76, 2014.

S. Nepal, J. Zic, and S. Chen, Wsla+: Web service level agreement language for collaborations, Services Computing, 2008. SCC '08. IEEE International Conference on, vol.2, pp.485-488, 2008.

N. I. Zijian and . Lili, Using relation triangle for guiding reification of n-ary relations in owl, Journal of Network & Information Security, vol.4, issue.3, pp.199-206, 2013.

D. Nuñez, C. Fernandez-gago, S. Pearson, and M. Felici, A metamodel for measuring accountability attributes in the cloud, Cloud Computing Technology and Science (CloudCom), 2013 IEEE 5th International Conference on, vol.1, pp.355-362, 2013.

, Office of the Privacy Commissioner for Personal Data of Hong Kong. An overview of the major provisions of the personal data-privacy and amendment, 2012.

, ICO Information Commissioners's Office. Actions we've taken -Enforcement, 2016.

L. Paliulioniene, On description of contracts and agreements in the context of soa, Computational Science and Techniques, vol.1, issue.2, pp.171-183, 2013.

A. Paschke, Rbsla -a declarative rule-based service level agreement language based on ruleml, International Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce (CIMCA-IAWTIC'06), vol.2, pp.308-314, 2005.

S. Pearson, V. Tountopoulos, D. Catteddu, M. Südholt, R. Molva et al., Accountability for cloud and other future internet services, Cloud Computing Technology and Science (CloudCom), pp.629-632, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00778369

A. Pretschner, F. Schutz, C. Schaefer, and T. Walter, Policy evolution in distributed usage control, Electronic Notes in Theoretical Computer Science, vol.244, pp.109-123, 2009.

E. Pulier and H. Taylor, Understanding Enterprise SOA, 2005.

M. R. Sumalatha, S. Hemalathaa, R. Monika, and C. Ahila, Towards secure audit services for outsourced data in cloud, Recent Trends in Information Technology (ICRTIT), 2014 International Conference on, pp.1-6, 2014.

S. Ramanauskait?, D. Olifer, N. Goranin, and A. Cenys, Security ontology for adaptive mapping of security standards, International Journal of Computers, vol.8, issue.6, pp.813-825, 2013.

C. Rees, Who owns our data? Computer Law & Security Review, vol.30, pp.75-79, 2014.

T. Reiter, M. Wimmer, and H. Kargl, Towards a runtime model based on colored petri-nets for the execution of model transformations, 3rd Workshop on Models and Aspects@ ECOOP, vol.7, pp.19-23, 2007.

C. Ringelstein and S. Staab, Logging in distributed workflows, Proceedings of the 2007 International Conference on Privacy Enforcement and Accountability with Semantics, vol.320, pp.19-30, 2007.

D. M. Rousseau, New hire perceptions of their own and their employer's obligations: A study of psychological contracts, Journal of Organizational Behavior, vol.11, issue.5, pp.389-400, 1990.

D. M. Rousseau and S. A. Tijoriwala, Assessing psychological contracts: issues, alternatives and measures, Journal of Organizational Behavior, vol.19, issue.S1, pp.679-695, 1998.

B. Mustapha, A. Saidi, and . Marzouk, Multi-trust orbac: Access control model for multi-organizational critical systems migrated to the cloud, International Journal of Soft Computing and Engineering (IJSCE), vol.3, issue.2, 2013.

S. J. Samuel and S. J. Jenitha, Enhanced security and authentication mechanism in cloud transactions using hmac, Computational Intelligence and Computing Research (ICCIC), 2014 IEEE International Conference on, pp.1-4, 2014.

R. S. Sandhu and P. Samarati, Access control: principle and practice, IEEE Communications Magazine, vol.32, issue.9, pp.40-48, 1994.

P. Severi, J. Fiadeiro, and D. Ekserdjian, Guiding the representation of n-ary relations in ontologies through aggregation, generalisation and participation, Web Semantics: Science, Services and Agents on the World Wide Web, vol.9, issue.2, pp.83-98, 2011.

J. Malaysia and . Standard, Risk Management: Vocabulary (ISO Guide 73:2009,IDT). Malaysian standard. Department of Standards Malaysia, 2010.

, Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT ACT) Act of, U.S. Government Printing Office, 2001.

C. Sullivan, Protecting digital identity in the cloud: Regulating cross border data disclosure, Computer Law & Security Review, vol.30, issue.2, pp.137-152, 2014.

, Validation PhD Thesis. OWL Code of the Semantic Model, 2016.

V. Tosic, B. Pagurek, K. Patel, B. Esfandiari, and W. Ma, Management applications of the web service offerings language (wsol), The 15th International Conference on Advanced Information Systems Engineering (CAiSE 2003)The 15th International Conference on Advanced Information Systems Engineering, vol.30, pp.564-586, 2003.

V. Tosic, K. Patel, and B. Pagurek, WSOL -Web Service Offerings Language, pp.57-67, 2002.

. Andries-van-dijk, Contracting workflows and protocol patterns, Business Process Management, vol.2678, pp.152-167

W. Viriyasitavat, Multi-criteria selection for services selection in service workflow, Journal of Industrial Information Integration, vol.1, pp.20-25, 2016.

, W3C. Test Suite Status, 2009.

H. Wang, J. Xing, Q. Yang, P. Wang, X. Zhang et al., Optimal control based regression test selection for serviceoriented workflow applications, Journal of Systems and Software, pp.1-15, 2016.

M. Wimmer, H. Kargl, M. Seidl, M. Strommer, and T. Reiter, Integrating ontologies with car-mappings, First International Workshop on Semantic Technology Adoption in Business (STAB'07), 2007.

L. Wu and R. Buyya, Service level agreement (sla) in utility computing systems, 2012.

, El Senado y Camara de Diputados de la Nacion Argentina. Ley 25.326 sobre la Proteccion de los Datos Personales, 2000.

Y. Yan, J. Zhang, and M. Yan, Ontology modeling for contract: Using owl to express semantic relations, 10th IEEE International Enterprise Distributed Object Computing Conference (EDOC'06), pp.409-412, 2006.

J. Yao, S. Chen, C. Wang, D. Levy, and J. Zic, Accountability as a service for the cloud, Services Computing (SCC), 2010 IEEE International Conference on, pp.81-88, 2010.

V. Zamborlini and G. Guizzardi, An ontologically-founded reification approach for representing temporally changing information in owl, 11th International Symposium on Logical Formalizations of Commonsense Reasoning, 2013.

E. Zolin, Complexity of reasoning in Description Logics, 2013.