Aniketos Consortium (2012). Aniketos - ensuring trust-
worthinesss and security in service composition.
http://www.aniketos.eu/.
Cranor, L. F. (2003). P3P: making privacy policies more
useful. Security & Privacy, IEEE, 1(6):50 – 55.
Cranor, L. F., Langheinrich, M., and Marchiori, M. (2002).
A P3P Preference Exchange Language 1.0 (AP-
PEL1.0). World Wide Web Consortium.
Dwivedi, V. and Padmanabhuni, S. (2008). Providing Web
Services Security SLA Guarantees: Issues and Ap-
proaches. In Khan, K. M., editor, Managing Web ser-
vice quality : measuring outcomes and effectiveness,
chapter 13, pages 286–305. IGI Global.
Egelman, S., Cranor, L. F., and Chowdhury, A. (2006).
An analysis of P3P-enabled web sites among top-20
search results. In Proceedings of the 8th int. conf. on
Electronic commerce, ICEC ’06, pages 197–207.
ENISA (2009). Cloud Computing: Benefits, risks and
recommendations for information security. European
Network and Information Security Agency.
Erlingsson, U. (2004). The inlined reference monitor ap-
proach to security policy enforcement. PhD thesis,
Cornell University.
Farrell, A. D. H., Sergot, M. J., Trastour, D., and
Christodoulou, A. (2004). Performance monitoring
of service-level agreements for utility computing us-
ing the event calculus. In Proc. First IEEE Int. WS on
Electronic Contracting, pages 17–24.
Finnegan, J., Malone, P., Maranon, A., and Guillen,
P. (2007). Contract modelling for digital business
ecosystems. In Digital EcoSystems and Technologies
Conference, 2007. DEST ’07., pages 71 –76.
Gartner (2011). Public Cloud Services, Worldwide and
Regions, Industry Sectors, 2010-2015, 2011 Update.
http://softwarestrategiesblog.com/2011/07/02/sizing-
the-public-cloud-services-market/.
Governatori, G. and Milosevic, Z. (2006). A formal analysis
of a business contract language. Int. J. Cooperative
Inf. Syst., 15(4):659–685.
Greci, P., Martinelli, F., and Matteucci, I. (2009). A frame-
work for contract-policy matching based on symbolic
simulations for securing mobile device application. In
Leveraging Applications of Formal Methods, Verifica-
tion and Validation, volume 17 of Communications in
Computer and Information Science, pages 221–236.
Springer. 10.1007/978-3-540-88479-8
16.
IBM (2009). General considerations for setting up security
for presence server. http://publib.boulder.ibm.com/
infocenter/wtelecom/ v7r0m0/ index.jsp?topic=/ com.
ibm. presence.plan.doc/generalsecurity c.html.
Leff, L. and Meyer, P. (2007). eContracts Version 1.0.
Technical report, OASIS. http://docs.oasis-open.org/
legalxml-econtracts.
Liu, F., Tong, J., Mao, J., Bohn, R., Messina, J., Badger, L.,
and Leaf, D. (2011). NIST Cloud Computing Refer-
ence Architecture. NIST Special Publication 500-292.
Nepal, S., Zic, J., and Chen, S. (2009). A contract language
for service-oriented dynamic collaborations. In Col-
laborative Computing: Networking, Applications and
Worksharing, volume 10 of LNICST, pages 545–562.
Springer. 10.1007/978-3-642-03354-4 41.
OASIS (2005). eXtensible Access Control Markup
Language (XACML) Version 2.0. OASIS Open.
http:// docs.oasis-open.org/xacml/2.0/access control-
xacml-2.0-core-spec-os.pdf.
Paschke, A. (2005). RBSLA - A declarative Rule-
based Service Level Agreement Language based on
RuleML. In Int. Conf. Comp. Intelligence for
Modelling, Control and Automation, and Intelligent
Agents, Web Tech. and Internet Commerce, volume 2,
pages 308 –314.
Pearson, S. and Charlesworth, A. (2009). Accountability as
a way forward for privacy protection in the cloud. In
Proc. 1st International Conference on Cloud Comput-
ing, CloudCom ’09, pages 131–144. Springer.
PrimeLife Consortium (2012). Primelife - privacy and
identity management in europe for life. http://
www.primelife.eu/.
Ragget, D. et al (2009). H5.3.2 - Draft 2nd Design for Pol-
icy Languages and Protocols. Technical report, The
PrimeLife project.
RuleML (2012). The Rule Markup Initiative. http://
www.ruleml.org.
Schulzrinne, H., Tschofenig, H., Morris, J., Cuellar, J.,
Polk, J., and Rosenberg, J. (2007). Common Pol-
icy: A Document Format for Expressing Privacy
Preferences. Request For Comments 4745 http://
tools.ietf.org/html/rfc4745.
Wang, X. (2010). Specifying the business collaboration
framework in the Contract Expression Language. In-
ternational Journal of Business Process Integration
and Management, 4(3):200–208.
WSLA (2003). Web Service Level Agreements (WSLA)
Project. http://www.research.ibm.com/wsla/.
Yag
¨
ue, M. I. (2006). Survey on XML-Based Policy Lan-
guages for Open Environments. Journal of Informa-
tion Assurance and Security, 1(1):11–20.
CLOSER2012-2ndInternationalConferenceonCloudComputingandServicesScience
646