I. Introduction
During the last decades, the world has seen an IT revolution. Every second, thousands of data are shared, websites are visited and the information is disclosed. This diversity of activities in the IT world can produce serious results in terms of security; sensitive and personal data may be shared in the open systems and therefore may be reused in malicious activities. It is in this context that the security of data in particular, and the information systems in general, becomes paramount, especially, when we establish the collaborative systems [1] containing several organizations within Critical Infrastructure (CI) [2].