5. Lacey, D.: Inventing the future - the vision of the jericho forum. Inf. Secur. Tech. Rep. 10
(2005) 186–188
6. States, U.: Uniting and Strengthening America by Providing Appropriate Tools Required
to Intercept and Obstruct Terrorism (USA PATRIOT ACT) Act of 2001. U.S. Government
Printing Office (2001)
7. Morrow, S.: Data Security in the Cloud. John Wiley & Sons, Inc. (2011)
8. Leimbach, Timo; Friedewald, Michael; Nentwich, Michael; Strauß, Stefan; Weber, Arnd;
Koenig, Rene; Hennen, Leonhard ;Skødt, Jakob Nielsen: Cloud computing – european
perspectives on impacts and potentials of cloud computing and social network sites (interim
report – phase i). Deliverable No.1; im Auftrag von: Science and Technology Options
Assessment (STOA), European Parliament (2012)
9. Timmermans, J., Ikonen, V., Stahl, B., Bozdag, E.: The ethics of cloud computing: A
conceptual review. In: Cloud Computing Technology and Science (CloudCom), 2010 IEEE
Second International Conference on. (2010) 614–620
10. Esteves, R., Rong, C.: Social impact of privacy in cloud computing. In: Cloud Comput-
ing Technology and Science (CloudCom), 2010 IEEE Second International Conference on.
(2010) 593–596
11. Lopes Cardoso, Henrique; Leitão, P., Oliveira, E.: An approach to inter-organizational work-
flow management in an electronic institution. In: Proceedings of the 11th IFAC Symposium
on Information Control Problems in Manufacturing. (2006)
12. Leitão, P., Mendes, J.a.: Agent-based inter-organizational workflow management system.
In: Proceedings of the 3rd international conference on Industrial Applications of Holonic
and Multi-Agent Systems: Holonic and Multi-Agent Systems for Manufacturing. HoloMAS
’07, Berlin, Heidelberg, Springer-Verlag (2007) 71–80
13. Pulier, E., Taylor, H.: Understanding enterprise SOA. Manning Pubs Co Series. Manning
(2006)
14. Van Der Aalst, W.M.P.: Inheritance of interorganizational workflows: How to agree to
disagree without loosing control? Inf. Technol. and Management 4 (2003) 345–389
15. Eder, J., Kerschbaumer, N., Köpke, J., Pichler, H., Tahamtan, A.: View-based interorga-
nizational workflows. In: Proceedings of the 12th International Conference on Computer
Systems and Technologies. CompSysTech ’11, New York, NY, USA, ACM (2011) 1–10
16. ISO: ISO/IEC 27010:2012: Information technology - Security techniques - Information
security management for inter-sector and inter-organizational communications. Published,
International Organization for Standardization (ISO), Geneva, Switzerland (2012)
17. Bose, S., Pasala, A., Ramanujam A, D., Murthy, S., Malaiyandisamy, G. In: SLA Man-
agement in Cloud Computing: A Service Provider’s Perspective. John Wiley & Sons, Inc.
(2011) 413–436
18. Cardoso, J., Sheth, A., Miller, J.: Workflow quality of service (2002)
19. Van Dijk, A.: Contracting workflows and protocol patterns. In: Proceedings of the 2003
international conference on Business process management. BPM’03, Berlin, Heidelberg,
Springer-Verlag (2003) 152–167
20. Guidara, I., Chaari, T., Fakhfakh, K., Jmaiel, M.: A comprehensive survey on intra and
inter organizational agreements. In: Proceedings of the 2012 IEEE 21st International Work-
shop on Enabling Technologies: Infrastructure for Collaborative Enterprises. WETICE ’12,
Washington, DC, USA, IEEE Computer Society (2012) 411–416
21. Haeberlen, A.: A case for the accountable cloud. SIGOPS Oper. Syst. Rev. 44 (2010) 52–57
22. Yao, J., Chen, S., Wang, C., Levy, D., Zic, J.: Accountability as a service for the cloud. In:
Services Computing (SCC), 2010 IEEE International Conference on. (2010) 81–88
23. Ringelstein, C., Staab, S.: Logging in distributed workflows. In: PEAS. (2007)
98