M. Gudgin, M. Hadley, N. Mendelsohn, J. J. Moreau, H. F. Nielsen et al., SOAP, version 1.2, part 1 : messaging framework, second edition, W3C Recommendation: SOAP. W3C open standards community, 2007.

R. Chinnici, J. J. Moreau, A. Ryman, and S. Weerawarana, Web Services Description Language (WSDL), version 2.0, part 1: CoreLanguage, W3C Recommendation: WSDL. W3C open standards community, 2007.

L. Clement, A. Hately, C. Von-riegen, and T. Rogers, UDDI, version 3.0.2, UDDI spec technical committee draft. OASIS open standards consortium, 2004.

T. Erl, Service-Oriented Architecture: concepts, technology, and design, chapter SOA and Service-Orientation, pp.244-313, 2005.

D. Shah and D. Patel, Dynamic and Ubiquitous Security Architecture for Global SOA, UBICOMM'08, Mobile Ubiquitous Computing, Systems, Services and Technologies, pp.482-487, 2008.

O. Boehm, J. Caumanns, M. Franke, and O. Pfaff, Federated Authentication and Authorization: A Case Study, EDOC'08, Enterprise Distributed Object Computing Conference, pp.356-362, 2008.

P. Qi-rui, W. Cheng, W. Jing, L. Jun, L. Qing et al., An authentication and authorization solution supporting SOA-based distributed systems, 2010 IEEE International Conference on Software Engineering and Service Sciences, pp.535-538, 2010.
DOI : 10.1109/ICSESS.2010.5552305

E. Bertino and L. D. Martino, A service-oriented approach to security?concepts and issues, Future Trends of Distributed Computing Systems FTDCS'07. 11th IEEE International Workshop on, pp.31-40, 2007.

C. Emig, F. Brandt, S. Kreuzer, and S. Abeck, Identity as a service-towards a serviceoriented identity management architecture, Proceedings of the 13th open European summer school and IFIP TC6. 6th conference on Dependable and adaptable networks and services, pp.1-8, 2007.

C. Emig, F. Brandt, F. Abeck, and J. Biermann, An Access Control Metamodel for Web Service-Oriented Architecture, International Conference on Software Engineering Advances (ICSEA 2007), pp.57-57, 2007.
DOI : 10.1109/ICSEA.2007.15

Z. Pervez, S. Lee, and Y. Lee, Multitenant,secure, load disseminated SaaS architecture, Advanced Communication Technology (ICACT) The 12th International Conference on, pp.214-219, 2010.

N. Chowdhury and R. Boutaba, A survey of network virtualization, Computer Networks, vol.54, issue.5, pp.862-876, 2010.
DOI : 10.1016/j.comnet.2009.10.017

H. Takabi, J. Bd-joshi, J. Ahn, and G. , Security and Privacy Challenges in Cloud Computing Environments, IEEE Security & Privacy Magazine, vol.8, issue.6, pp.24-31, 2010.
DOI : 10.1109/MSP.2010.186

A. S. Ibrahim, J. H. Hamlyn-harris, and J. Grundy, Emerging security challenges of cloud virtual infrastructure, 2010.

M. Ko, G. Ahn, and M. Shehab, Privacy-Enhanced User-Centric Identity Management, Proc. IEEE Int'l Conf. Communications, pp.998-1002, 2009.

J. Wayne and G. Timothy, NIST Guidelines on Security and Privacy in Public Cloud Computing, Draft Special Publication, pp.800-144, 2011.

J. Joshi, Access-control language for multidomain environments, IEEE Internet Computing, vol.8, issue.6, pp.40-50, 2004.
DOI : 10.1109/MIC.2004.53

M. Blaze, Dynamic Trust Management, Computer, vol.42, issue.2, pp.44-52, 2009.
DOI : 10.1109/MC.2009.51

Y. Zhang and J. Joshi, Access Control and Trust Management for Emerging Multidomain Environments Annals of Emerging Research in Information Assurance, Security and Privacy Services, pp.421-452, 2009.

D. Shin and G. Ahn, Role-Based Privilege and Trust Management, Computer Systems Science & Eng. J, vol.20, issue.6, pp.401-410, 2005.

. Iso, ISO 20000-1 IT Service management standard: specification for service Management, 2005.

V. Lloyd, ITIL Continual Service Improvement. The Stationery Office (TSO), 2011.

M. Alsaleh and C. Adams, Enhancing Consumer Privacy in the Liberty Alliance Identity Federation and Web Services Frameworks, Workshop on Privacy Enhancing Technologies, pp.59-77, 2006.
DOI : 10.1007/11957454_4

D. Recordon and D. Reed, OpenID 2.0, Proceedings of the second ACM workshop on Digital identity management , DIM '06, pp.11-16, 2006.
DOI : 10.1145/1179529.1179532

E. Sawda, S. Urien, and P. , SIP Security Attacks and Solutions: A state-of-the-art review, 2006 2nd International Conference on Information & Communication Technologies, 2006.
DOI : 10.1109/ICTTA.2006.1684926

W. Werapun, A. El-kalam, B. Paillassa, and J. Fasson, Solution analysis for SIP security threats, 2009 International Conference on Multimedia Computing and Systems, 2009.
DOI : 10.1109/MMCS.2009.5256707

J. Arkko, V. Torvinen, G. Camarillo, A. Niemi, and T. Haukka, Security Mechanism Agreement for the Session Initiation Protocol RFC 3329 IETF, 2003.

D. Geneiatakis, G. Kambourakis, T. Dagiuklas, T. Lambrinoudakis, and G. S. , «SIP Security Mechanisms: A State-of-the-art Review», the Proceedings of the Fifth 150

L. Stewart, HTTP Authentication: Basic and Digest Access Authentication, RFC, vol.2617, 1999.

A. Soulimani, H. Simoni, N. Coude, and P. , User-centric and QoS-based service session, conférence IEEE APSCC, 2011.

T. Dierks and C. Allen, The TLS Protocol Version 1.0, IETF RFC 2246, 1999.

N. Ornelas, N. Simoni, K. Chen, and A. Boutignon, VPIN: User-Session Knowledge Base for Self-Management of Ambient Networks, 2008 The Second International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, p.8, 2008.
DOI : 10.1109/UBICOMM.2008.71

N. Simoni, C. Yin, D. Chene, and G. , An intelligent user centric middleware for NGN: Infosphere and AmbientGrid, 2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE '08), pp.599-606, 2008.
DOI : 10.1109/COMSWA.2008.4554481