REFERENCES
Accorsi, R. (2011). Business process as a service: Chances
for remote auditing. 35th IEEE COMPSACW, pages
398–403.
Amziani, M., Melliti, T., and Tata, S. (2012). A generic
framework for service-based business process elastic-
ity in the cloud. BPM’12, pages 194–199, Berlin,
Heidelberg. Springer-Verlag.
Anstett, T., Leymann, F., Mietzner, R., and Strauch, S.
(2009). Towards bpel in the cloud: Exploiting dif-
ferent delivery models for the execution of business
processes. ICWS’09, pages 670–677. IEEE Computer
Society.
Apache Software Foundation (2013). Creating a process.
http://ode.apache.org/creating-a-process.html.
Bentounsi, M., Benbernou, S., Deme, C. S., and Atallah,
M. J. (2012). Anonyfrag: An anonymization-based
approach for privacy-preserving bpaas. Cloud-I ’12,
pages 9:1–9:8, New York, NY, USA. ACM.
Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J., Ma-
suoka, R., and Molina, J. (2009). Controlling data in
the cloud: Outsourcing computation without outsourc-
ing control. CCSW ’09, pages 85–90, New York, NY,
USA. ACM.
Doelitzscher, F., Reich, C., and Sulistio, A. (2010). De-
signing cloud services adhering to government privacy
laws. CIT ’10, pages 930–935.
Federal Ministry of Justice (1990). German Federal Data
Protection Law.
Hahn, M., S
´
aez, S. G., Andrikopoulos, V., Karastoyanova,
D., and Leymann, F. (2014). SCE
MT
: A Multi-tenant
Service Composition Engine. SOCA’14, pages 89–96.
IEEE Computer Society.
Jansen, W. (2011). Cloud hooks: Security and privacy issues
in cloud computing. HICSS ’11, pages 1–10.
Ko, S. Y., Jeon, K., and Morales, R. (2011). The hybrex
model for confidentiality and privacy in cloud com-
puting. HotCloud’11, pages 8–8, Berkeley, CA, USA.
USENIX Association.
Kunze, M., Luebbe, A., Weidlich, M., and Weske, M. (2011).
Towards understanding process modeling – the case
of the bpm academic initiative. volume 95 of BPMN
2011, pages 44–58. Springer Berlin Heidelberg.
RightScale (2014). 2014 state of the cloud report from
rightscale. http://www.rightscale.com/lp/2014-state-of-
the-cloud-report.
SAPTechnical.COM (2007). Xml anonymizer bean in
communication channel to remove namespace pre-
fix in xml payload. http://www.saptechnical.com/
Tutorials/XI/XMLPayload/Index.htm.
Sedayao, J. (2012). Enhancing cloud security using data
anonymization. Intel IT, IT@ Intel White Paper. IT
Best Practices, Cloud Computing and Information Se-
curity.
Skouradaki, M., Roller, D., Pautasso, C., and Leymann, F.
(2014). BPELanon: Anonymizing BPEL processes.
ZEUS ’14, pages 9–15.
Strauch, S., Breitenb
¨
ucher, U., Kopp, O., Leymann, F., and
Unger, T. (2012). Cloud Data Patterns for Confiden-
tiality. CLOSER ’12, pages 387–394. SciTePress.
Wang, M., Bandara, K. Y., and Pahl, C. (2010). Process
as a service. IEEE SCC ’10, pages 578–585. IEEE
Computer Society.
WinEdt (2000). WinEdt Dictionaries. http://
www.winedt.org/Dict/.
XMLanonymizer (2010). XMLanonymizer - utility
to anonymize data of an xml file. https://code.
google.com/p/xmlanonymizer/.
Zhang, X., Liu, C., Nepal, S., Yang, C., and Chen, J. (2014).
Privacy preservation over big data in cloud systems.
Security, Privacy and Trust in Cloud Systems, pages
239–257. Springer Berlin Heidelberg.
CLOSER2015-5thInternationalConferenceonCloudComputingandServicesScience
250