Secure Cloud-Edge Deployments, with Trust
Assessing the security level of IoT applications to be deployed to heterogeneous Cloud-Edge infrastructures operated by different providers is a non-trivial task. In this article, we present a methodology that permits to express security requirements for IoT applications, as well as infrastructure s...
Gespeichert in:
| Veröffentlicht in: | Future generation computer systems Jg. 102; S. 775 - 788 |
|---|---|
| Hauptverfasser: | , , |
| Format: | Journal Article |
| Sprache: | Englisch |
| Veröffentlicht: |
Elsevier B.V
01.01.2020
|
| Schlagworte: | |
| ISSN: | 0167-739X, 1872-7115 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | Assessing the security level of IoT applications to be deployed to heterogeneous Cloud-Edge infrastructures operated by different providers is a non-trivial task. In this article, we present a methodology that permits to express security requirements for IoT applications, as well as infrastructure security capabilities, in a simple and declarative manner, and to automatically obtain an explainable assessment of the security level of the possible application deployments. The methodology also considers the impact of trust relations among different stakeholders using or managing Cloud-Edge infrastructures. A lifelike example is used to showcase the prototyped implementation of the methodology. |
|---|---|
| AbstractList | Assessing the security level of IoT applications to be deployed to heterogeneous Cloud-Edge infrastructures operated by different providers is a non-trivial task. In this article, we present a methodology that permits to express security requirements for IoT applications, as well as infrastructure security capabilities, in a simple and declarative manner, and to automatically obtain an explainable assessment of the security level of the possible application deployments. The methodology also considers the impact of trust relations among different stakeholders using or managing Cloud-Edge infrastructures. A lifelike example is used to showcase the prototyped implementation of the methodology. |
| Author | Ferrari, Gian-Luigi Brogi, Antonio Forti, Stefano |
| Author_xml | – sequence: 1 givenname: Stefano surname: Forti fullname: Forti, Stefano email: stefano.forti@di.unipi.it – sequence: 2 givenname: Gian-Luigi surname: Ferrari fullname: Ferrari, Gian-Luigi – sequence: 3 givenname: Antonio surname: Brogi fullname: Brogi, Antonio |
| BookMark | eNqFjz1PwzAURS1UJNrCP2DIikTCe3ZTOwxIqJQPqRIDRWKzEucZXLVJZTug_ntSlYkBprvcc3XPiA2atiHGzhEyBJxerTLbxc5TxgGLDFQGHI7YEJXkqUTMB2zY12QqRfF2wkYhrAAApcAhu3gh05PJbN12dTqv3ym5o-263W2oieEy-XLxI1n6LsRTdmzLdaCznxyz1_v5cvaYLp4fnma3i9SInMdUEXArrapIyQlYCznnAkojBfUfaFIgGg48V5WV09qAqGQhRZXLQhmYIooxmxx2jW9D8GT11rtN6XcaQe919UofdPVeV4PSvW6PXf_CjItldG0TfenW_8E3B5h6sU9HXgfjqDFUO08m6rp1fw98A8aWdBA |
| CitedBy_id | crossref_primary_10_1007_s00607_021_01031_8 crossref_primary_10_1016_j_icte_2024_08_007 crossref_primary_10_3390_fi15070224 crossref_primary_10_3390_electronics12061332 crossref_primary_10_3390_s22228784 crossref_primary_10_1007_s12652_021_02910_w crossref_primary_10_1017_S1471068425100148 crossref_primary_10_1016_j_eswa_2022_117012 crossref_primary_10_1016_j_future_2020_03_064 crossref_primary_10_1007_s10586_021_03243_1 crossref_primary_10_1016_j_future_2021_01_026 crossref_primary_10_1016_j_jnca_2021_103078 crossref_primary_10_1109_ACCESS_2022_3183634 crossref_primary_10_1145_3736726 crossref_primary_10_1051_itmconf_20257603003 crossref_primary_10_1016_j_future_2020_08_011 crossref_primary_10_1017_S1471068421000016 crossref_primary_10_1007_s00607_021_00924_y crossref_primary_10_1016_j_simpat_2019_102021 crossref_primary_10_1109_TNSE_2021_3099953 crossref_primary_10_1002_smr_2405 crossref_primary_10_1007_s10723_021_09582_y crossref_primary_10_1016_j_jnca_2022_103402 crossref_primary_10_1007_s13369_021_05607_6 crossref_primary_10_7717_peerj_cs_779 crossref_primary_10_1093_logcom_exab083 |
| Cites_doi | 10.1007/s10994-015-5494-z 10.1109/TKDE.2003.1185844 10.1016/j.jnca.2017.01.012 10.1109/TC.2015.2435781 10.1016/j.jides.2015.02.005 10.1016/j.dss.2016.09.001 10.1109/ACCESS.2017.2749422 10.1109/ICFEC.2017.8 10.1109/TCC.2015.2469659 10.1109/SDS.2019.8768602 10.1016/j.future.2016.01.009 10.1007/s00450-019-00403-y 10.1109/ICC.2016.7511465 10.1016/j.jnca.2011.08.008 10.1109/TC.2016.2536019 10.1002/spe.2509 10.1109/JSAC.2005.861390 10.23919/FRUCT.2017.8250193 10.1007/s10796-005-4807-3 10.1145/2831347.2831354 10.1109/ICFEC.2017.20 10.1109/TETC.2015.2508382 10.1109/ICFEC.2017.12 10.1109/JSAC.2016.2621398 10.1109/APNOMS.2016.7737202 10.1109/TSC.2015.2413111 10.1109/ACCESS.2017.2665971 10.1002/sec.252 10.1609/aaai.v25i1.7852 10.1109/TSC.2016.2543719 10.1016/j.jss.2015.01.040 10.1109/JIOT.2017.2701408 10.1109/MIC.2017.36 10.23919/INM.2017.7987464 |
| ContentType | Journal Article |
| Copyright | 2019 Elsevier B.V. |
| Copyright_xml | – notice: 2019 Elsevier B.V. |
| DBID | AAYXX CITATION |
| DOI | 10.1016/j.future.2019.08.020 |
| DatabaseName | CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1872-7115 |
| EndPage | 788 |
| ExternalDocumentID | 10_1016_j_future_2019_08_020 S0167739X19301268 |
| GroupedDBID | --K --M -~X .DC .~1 0R~ 1B1 1~. 1~5 29H 4.4 457 4G. 5GY 5VS 7-5 71M 8P~ 9JN AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AAXUO AAYFN ABBOA ABFNM ABJNI ABMAC ABXDB ABYKQ ACDAQ ACGFS ACNNM ACRLP ACZNC ADBBV ADEZE ADJOM ADMUD AEBSH AEKER AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHZHX AIALX AIEXJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD ASPBG AVWKF AXJTR AZFZN BKOJK BLXMC CS3 EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 F5P FDB FEDTE FGOYB FIRID FNPLU FYGXN G-Q G8K GBLVA GBOLZ HLZ HVGLF HZ~ IHE J1W KOM LG9 M41 MO0 MS~ N9A O-L O9- OAUVE OZT P-8 P-9 PC. Q38 R2- RIG ROL RPZ SBC SDF SDG SES SEW SPC SPCBC SSV SSZ T5K UHS WUQ XPP ZMT ~G- 9DU AATTM AAXKI AAYWO AAYXX ABDPE ABWVN ACLOT ACRPL ADNMO AEIPS AFJKZ AGQPQ AIIUN ANKPU APXCP CITATION EFKBS ~HD |
| ID | FETCH-LOGICAL-c352t-8e02f7f8be8740ff052230ac73e016e4911c20258bf76dc03b7973b5798c06113 |
| ISICitedReferencesCount | 43 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000501936300064&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0167-739X |
| IngestDate | Sat Nov 29 07:22:46 EST 2025 Tue Nov 18 21:10:31 EST 2025 Fri Feb 23 02:48:27 EST 2024 |
| IsDoiOpenAccess | false |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Keywords | Declarative programming Probabilistic reasoning Secure application deployment |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c352t-8e02f7f8be8740ff052230ac73e016e4911c20258bf76dc03b7973b5798c06113 |
| OpenAccessLink | http://hdl.handle.net/11568/1031746 |
| PageCount | 14 |
| ParticipantIDs | crossref_primary_10_1016_j_future_2019_08_020 crossref_citationtrail_10_1016_j_future_2019_08_020 elsevier_sciencedirect_doi_10_1016_j_future_2019_08_020 |
| PublicationCentury | 2000 |
| PublicationDate | January 2020 2020-01-00 |
| PublicationDateYYYYMMDD | 2020-01-01 |
| PublicationDate_xml | – month: 01 year: 2020 text: January 2020 |
| PublicationDecade | 2020 |
| PublicationTitle | Future generation computer systems |
| PublicationYear | 2020 |
| Publisher | Elsevier B.V |
| Publisher_xml | – name: Elsevier B.V |
| References | V.B.C. Souza, W. Ramrez, X. Masip-Bruin, E. Marn-Tordera, G. Ren, G. Tashakor, Handling service allocation in combined Fog-cloud scenarios, in: 2016 IEEE International Conference on Communications, ICC, 2016, pp. 1–5. Mukherjee, Matam, Shu, Maglaras, Ferrag, Choudhury, Kumar (b23) 2017; 5 Kaur, Singh, Singh (b34) 2017 Gao, Miao, Baras, Golbeck (b32) 2016 Mezni, Sellami, Kouki (b22) 2018 Cardellini, Grassi, Lo Presti, Nardelli (b56) 2016 Tsankov (b70) 2018 Omar, Challal, Bouabdallah (b64) 2012; 35 Zeng, Gu, Guo, Cheng, Yu (b50) 2016; 65 Gupta, Vahid Dastjerdi, Ghosh, Buyya (b5) 2017; 47 Venticinque, Amato (b55) 2018 Theodorakopoulos, Baras (b25) 2006; 24 Ni, Zhang, Lin, Shen (b13) 2017 Li, Mitchell, Winsborough (b61) 2002 A. Brogi, S. Forti, A. Ibrahim, How to best deploy your Fog applications, probably, in: O. Rana and R. Buyya and A. Anjum (Eds.), Proceedings of 1st IEEE Int. Conference on Fog and Edge Computing, 2017. Mahmud, Ramamohanarao, Buyya (b42) 2018 Brogi, Forti, Ibrahim (b44) 2018 Wen, Yang, Garraghan, Lin, Xu, Rovatsos (b41) 2017; 21 Twigg, Dimmock (b63) 2003 Yang, Cao, Liang, Han (b48) 2016; 65 Anisetti, Ardagna, Damiani, Gaudenzi (b66) 2017 P. Varshney, Y. Simmhan, Demystifying fog computing: Characterizing architectures, applications and abstractions, in: 2017 IEEE 1st International Conference on Fog and Edge Computing, ICFEC, 2017, pp. 115–124. (b21) 2014 S. De Capitani Di Vimercati, S. Foresti, G. Livraga, V. Piuri, P. Samarati, IEEE Transactions on Services Computing, Supporting User Requirements and Preferences in Cloud Plan Selection, In press. L. De Raedt, A. Kimmig, H. Toivonen, ProbLog: A probabilistic prolog and its application in link discovery, in: Proceedings of the 20th International Joint Conference on Artifical Intelligence, 2007, pp. 2468–2473. Bistarelli, Martinelli, Santini (b30) 2008 Luna, Taha, Trapero, Suri (b39) 2017; 5 Barcelo, Correa, Llorca, Tulino, Vicario, Morell (b52) 2016; 34 Mahmud, Srirama, Ramamohanarao, Buyya (b54) 2018 N. Torkzaban, C. Papagianni, J.S. Baras, Trust-aware service chain embedding, in: Proceedings of the 6th International Conference on Software Defined Systems, SDS, 2019. Brogi, Forti, Ibrahim (b3) 2019 Qu, Wang, Orgun, Liu, Liu, Bouguettaya (b68) 2015; 8 O. Skarlat, M. Nardelli, S. Schulte, S. Dustdar, Towards QoS-aware fog service placement, in: 2017 IEEE 1st International Conference on Fog and Edge Computing, ICFEC, 2017, pp. 89–96. Bistarelli, Foley, O’Sullivan, Santini (b31) 2010; 3 Viganò, Magazzeni (b12) 2018 Tang, Dai, Liu, Chen (b26) 2017; 74 Ardagna, Damiani, De Capitani di Vimercati, Foresti, Samarati (b60) 2007 Gu, Zeng, Guo, Barnawi, Xiang (b49) 2017; 5 Brogi, Forti, Guerrero, Lera (b58) 2019 Yan (b29) 2007 Brogi, Forti, Ibrahim (b27) 2019; 1073 (b20) 2019 Huang, Lin, Yu, Hsu (b53) 2014; 1 Brogi, Forti, Guerrero, Lera (b11) 2019 Familiar (b2) 2015 Arcangeli, Boujbel, Leriche (b19) 2015; 103 Tang, Zhou, Zhang, Jia, Zhao (b59) 2018 Newman (b28) 2015 Ding, Wang, Wu, Olson (b67) 2017; 93 Fajjari, Tobagi, Takahashi (b1) 2018 Forti, Ibrahim, Brogi (b10) 2019; 34 D. Rahbari, M. Nickray, Scheduling of fog networks with optimized knapsack by symbiotic organisms search, in: 2017 21st Conference of Open Innovations Association, FRUCT, 2017, pp. 278–283. Ziegler, Lausen (b62) 2005; 7 Goettelmann, Dahman, Gateau, Dubois, Godart (b37) 2014 Rodríguez, Egenhofer (b24) 2003; 15 Ambrosin, Conti, Ibrahim, Neven, Sadeghi, Schunter (b14) 2016 De Raedt, Kimmig (b18) 2015; 100 M. Taneja, A. Davy, Resource aware placement of IoT application modules in Fog-Cloud Computing Paradigm, in: 2017 IFIP/IEEE Symposium on Integrated Network and Service Management, IM, 2017, pp. 1222–1228. Wen, Cała, Watson, Romanovsky (b38) 2017; 10 Wang, Zafer, Leung (b43) 2017; 5 Brogi, Forti, Ibrahim, Rinaldi (b4) 2018 Nacer, Goettelmann, Youcef, Tari, Godart (b36) 2016 H.J. Hong, P.H. Tsai, C.H. Hsu, Dynamic module deployment in a fog computing platform, in: 2016 18th Asia-Pacific Network Operations and Management Symposium, APNOMS, 2016, pp. 1–6. Garcia Lopez, Montresor, Epema, Datta, Higashino, Iamnitchi, Barcellos, Felber, Riviere (b16) 2015; 45 Schoenen, Mann, Metzger (b35) 2017 Hamid Reza Arkian, Diyanat (b47) 2017; 82 Guerrero, Lera, Juiz (b6) 2018 Anisetti, Ardagna, Damiani (b65) 2014 Brogi, Forti (b8) 2017; 4 A. Kimmig, G. Van den Broeck, L. De Raedt, An algebraic Prolog for reasoning about possible worlds, in: Twenty-Fifth AAAI Conference on Artificial Intelligence, 2011. Ni (10.1016/j.future.2019.08.020_b13) 2017 Tang (10.1016/j.future.2019.08.020_b59) 2018 Theodorakopoulos (10.1016/j.future.2019.08.020_b25) 2006; 24 10.1016/j.future.2019.08.020_b69 Forti (10.1016/j.future.2019.08.020_b10) 2019; 34 Ding (10.1016/j.future.2019.08.020_b67) 2017; 93 Guerrero (10.1016/j.future.2019.08.020_b6) 2018 Yan (10.1016/j.future.2019.08.020_b29) 2007 Rodríguez (10.1016/j.future.2019.08.020_b24) 2003; 15 Newman (10.1016/j.future.2019.08.020_b28) 2015 Gao (10.1016/j.future.2019.08.020_b32) 2016 Omar (10.1016/j.future.2019.08.020_b64) 2012; 35 Brogi (10.1016/j.future.2019.08.020_b58) 2019 Barcelo (10.1016/j.future.2019.08.020_b52) 2016; 34 (10.1016/j.future.2019.08.020_b20) 2019 Wen (10.1016/j.future.2019.08.020_b41) 2017; 21 Schoenen (10.1016/j.future.2019.08.020_b35) 2017 Ambrosin (10.1016/j.future.2019.08.020_b14) 2016 Twigg (10.1016/j.future.2019.08.020_b63) 2003 10.1016/j.future.2019.08.020_b17 10.1016/j.future.2019.08.020_b15 Bistarelli (10.1016/j.future.2019.08.020_b30) 2008 De Raedt (10.1016/j.future.2019.08.020_b18) 2015; 100 Huang (10.1016/j.future.2019.08.020_b53) 2014; 1 10.1016/j.future.2019.08.020_b57 Ardagna (10.1016/j.future.2019.08.020_b60) 2007 Wang (10.1016/j.future.2019.08.020_b43) 2017; 5 10.1016/j.future.2019.08.020_b51 (10.1016/j.future.2019.08.020_b21) 2014 Goettelmann (10.1016/j.future.2019.08.020_b37) 2014 Mahmud (10.1016/j.future.2019.08.020_b54) 2018 Fajjari (10.1016/j.future.2019.08.020_b1) 2018 Wen (10.1016/j.future.2019.08.020_b38) 2017; 10 Brogi (10.1016/j.future.2019.08.020_b4) 2018 Kaur (10.1016/j.future.2019.08.020_b34) 2017 Brogi (10.1016/j.future.2019.08.020_b11) 2019 Mukherjee (10.1016/j.future.2019.08.020_b23) 2017; 5 Anisetti (10.1016/j.future.2019.08.020_b65) 2014 Mahmud (10.1016/j.future.2019.08.020_b42) 2018 10.1016/j.future.2019.08.020_b46 Venticinque (10.1016/j.future.2019.08.020_b55) 2018 10.1016/j.future.2019.08.020_b45 Tsankov (10.1016/j.future.2019.08.020_b70) 2018 Cardellini (10.1016/j.future.2019.08.020_b56) 2016 Tang (10.1016/j.future.2019.08.020_b26) 2017; 74 10.1016/j.future.2019.08.020_b40 10.1016/j.future.2019.08.020_b7 Ziegler (10.1016/j.future.2019.08.020_b62) 2005; 7 10.1016/j.future.2019.08.020_b9 Brogi (10.1016/j.future.2019.08.020_b8) 2017; 4 Nacer (10.1016/j.future.2019.08.020_b36) 2016 Brogi (10.1016/j.future.2019.08.020_b3) 2019 Viganò (10.1016/j.future.2019.08.020_b12) 2018 Bistarelli (10.1016/j.future.2019.08.020_b31) 2010; 3 Brogi (10.1016/j.future.2019.08.020_b44) 2018 Zeng (10.1016/j.future.2019.08.020_b50) 2016; 65 Yang (10.1016/j.future.2019.08.020_b48) 2016; 65 Anisetti (10.1016/j.future.2019.08.020_b66) 2017 Gupta (10.1016/j.future.2019.08.020_b5) 2017; 47 Arcangeli (10.1016/j.future.2019.08.020_b19) 2015; 103 Brogi (10.1016/j.future.2019.08.020_b27) 2019; 1073 10.1016/j.future.2019.08.020_b33 Li (10.1016/j.future.2019.08.020_b61) 2002 Luna (10.1016/j.future.2019.08.020_b39) 2017; 5 Qu (10.1016/j.future.2019.08.020_b68) 2015; 8 Mezni (10.1016/j.future.2019.08.020_b22) 2018 Hamid Reza Arkian (10.1016/j.future.2019.08.020_b47) 2017; 82 Gu (10.1016/j.future.2019.08.020_b49) 2017; 5 Garcia Lopez (10.1016/j.future.2019.08.020_b16) 2015; 45 Familiar (10.1016/j.future.2019.08.020_b2) 2015 |
| References_xml | – reference: H.J. Hong, P.H. Tsai, C.H. Hsu, Dynamic module deployment in a fog computing platform, in: 2016 18th Asia-Pacific Network Operations and Management Symposium, APNOMS, 2016, pp. 1–6. – volume: 45 start-page: 37 year: 2015 end-page: 42 ident: b16 article-title: Edge-centric computing: Vision and challenges publication-title: ACM SIGCOMM Comput. Commun. Rev. – volume: 5 start-page: 2514 year: 2017 end-page: 2533 ident: b43 article-title: Online placement of multi-component applications in edge computing environments publication-title: IEEE Access – year: 2017 ident: b66 article-title: A semi-automatic and trustworthy scheme for continuous cloud service certification publication-title: IEEE Trans. Serv. Comput. – start-page: 296 year: 2017 end-page: 307 ident: b35 article-title: Using risk patterns to identify violations of data protection policies in cloud systems publication-title: International Conference on Service-Oriented Computing – year: 2018 ident: b55 article-title: A methodology for deployment of IoT application in fog publication-title: J. Ambient Intell. Humaniz. Comput. – volume: 35 start-page: 268 year: 2012 end-page: 286 ident: b64 article-title: Certification-based trust models in mobile ad hoc networks: A survey and taxonomy publication-title: J. Netw. Comput. Appl. – start-page: 114 year: 2002 end-page: 130 ident: b61 article-title: Design of a role-based trust-management framework publication-title: Security and Privacy, 2002. Proceedings. 2002 IEEE Symposium on – year: 2018 ident: b59 article-title: Migration modeling and learning algorithms for containers in fog computing publication-title: IEEE Trans. Serv. Comput. – year: 2017 ident: b13 article-title: Securing fog computing for internet of things applications: Challenges and solutions publication-title: IEEE Commun. Surv. Tutor. – reference: A. Kimmig, G. Van den Broeck, L. De Raedt, An algebraic Prolog for reasoning about possible worlds, in: Twenty-Fifth AAAI Conference on Artificial Intelligence, 2011. – start-page: 212 year: 2014 end-page: 219 ident: b65 article-title: A certification-based trust model for autonomic cloud computing systems publication-title: Cloud and Autonomic Computing (ICCAC), 2014 International Conference on – reference: S. De Capitani Di Vimercati, S. Foresti, G. Livraga, V. Piuri, P. Samarati, IEEE Transactions on Services Computing, Supporting User Requirements and Preferences in Cloud Plan Selection, In press. – year: 2018 ident: b42 article-title: Latency-aware application module management for fog computing environments publication-title: ACM Trans. Internet Technol. (TOIT) – reference: M. Taneja, A. Davy, Resource aware placement of IoT application modules in Fog-Cloud Computing Paradigm, in: 2017 IFIP/IEEE Symposium on Integrated Network and Service Management, IM, 2017, pp. 1222–1228. – volume: 103 start-page: 198 year: 2015 end-page: 218 ident: b19 article-title: Automatic deployment of distributed software systems: Definitions and state of the art publication-title: J. Syst. Softw. – year: 2015 ident: b28 article-title: Building Microservices: Designing Fine-Grained Systems – start-page: 13 year: 2019 end-page: 17 ident: b58 article-title: Meet Genetic Algorithms in Monte Carlo: Optimised Placement of Multi-Service Applications in the Fog publication-title: Proceedings of the 3rd IEEE International Conference on Edge Computing (EDGE 2019) – start-page: 307 year: 2014 end-page: 314 ident: b37 article-title: A security risk assessment model for business process deployment in the cloud publication-title: Services Computing (SCC), 2014 IEEE International Conference on – volume: 5 start-page: 19293 year: 2017 end-page: 19304 ident: b23 article-title: Security and privacy in fog computing: Challenges publication-title: IEEE Access – volume: 8 start-page: 369 year: 2015 end-page: 383 ident: b68 article-title: CCCloud: Context-aware and credible cloud service selection based on subjective assessment and objective assessment publication-title: IEEE Trans. Serv. Comput. – volume: 15 start-page: 442 year: 2003 end-page: 456 ident: b24 article-title: Determining semantic similarity among entity classes from different ontologies publication-title: IEEE Trans. Knowl. Data Eng. – volume: 5 start-page: 457 year: 2017 end-page: 471 ident: b39 article-title: Quantitative reasoning about cloud security using service level agreements publication-title: IEEE Trans. Cloud Comput. – reference: P. Varshney, Y. Simmhan, Demystifying fog computing: Characterizing architectures, applications and abstractions, in: 2017 IEEE 1st International Conference on Fog and Edge Computing, ICFEC, 2017, pp. 115–124. – year: 2019 ident: b11 article-title: How to Place Your Apps in the Fog - State of the Art and Open Challenges – year: 2018 ident: b1 article-title: Cloud Edge Computing in the IoT – volume: 100 start-page: 5 year: 2015 end-page: 47 ident: b18 article-title: Probabilistic (logic) programming concepts publication-title: Mach. Learn. – volume: 1073 start-page: 168 year: 2019 end-page: 189 ident: b27 article-title: Optimising QoS-assurance, Resource Usage and Cost of Fog Application Deployments publication-title: Cloud Computing and Services Science (CLOSER 2018) Revised Selected Papers – year: 2018 ident: b22 article-title: Security-aware SaaS placement using swarm intelligence publication-title: J. Softw.: Evol. Process – volume: 82 start-page: 152 year: 2017 end-page: 165 ident: b47 article-title: MIST: Fog-based data analytics scheme with cost-efficient resource provisioning for IoT crowdsensing applications publication-title: J. Netw. Comput. Appl. – start-page: 133 year: 2015 end-page: 163 ident: b2 article-title: IoT and microservices publication-title: Microservices, IoT, and Azure – volume: 34 start-page: 151 year: 2019 end-page: 161 ident: b10 article-title: Mimicking FogDirector Application Management publication-title: Software-Intensive Cyber-Physical Systems – year: 2018 ident: b12 article-title: Explainable security – reference: N. Torkzaban, C. Papagianni, J.S. Baras, Trust-aware service chain embedding, in: Proceedings of the 6th International Conference on Software Defined Systems, SDS, 2019. – start-page: 1128 year: 2008 end-page: 1134 ident: b30 article-title: Weighted datalog and levels of trust publication-title: Availability, Reliability and Security, 2008. ARES 08. Third International Conference on – reference: L. De Raedt, A. Kimmig, H. Toivonen, ProbLog: A probabilistic prolog and its application in link discovery, in: Proceedings of the 20th International Joint Conference on Artifical Intelligence, 2007, pp. 2468–2473. – start-page: 2054 year: 2017 end-page: 2058 ident: b34 article-title: A taxonomy, survey on placement of virtual machines in cloud publication-title: 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS) – volume: 7 start-page: 337 year: 2005 end-page: 358 ident: b62 article-title: Propagation models for trust and distrust in social networks publication-title: Inf. Syst. Front. – volume: 21 start-page: 16 year: 2017 end-page: 24 ident: b41 article-title: Fog orchestration for internet of things services publication-title: IEEE Internet Comput. – volume: 10 start-page: 929 year: 2017 end-page: 941 ident: b38 article-title: Cost effective, reliable and secure workflow deployment over federated clouds publication-title: IEEE Trans. Serv. Comput. – reference: D. Rahbari, M. Nickray, Scheduling of fog networks with optimized knapsack by symbiotic organisms search, in: 2017 21st Conference of Open Innovations Association, FRUCT, 2017, pp. 278–283. – volume: 74 start-page: 302 year: 2017 end-page: 312 ident: b26 article-title: Towards a trust evaluation middleware for cloud service selection publication-title: Future Gener. Comput. Syst. – start-page: 316 year: 2018 end-page: 322 ident: b70 article-title: Security analysis of smart contracts in datalog publication-title: International Symposium on Leveraging Applications of Formal Methods – volume: 3 start-page: 595 year: 2010 end-page: 610 ident: b31 article-title: Semiring-based frameworks for trust propagation in small-world networks and coalition formation criteria publication-title: Secur. Commun. Netw. – volume: 1 start-page: 47 year: 2014 end-page: 57 ident: b53 article-title: Co-locating services in IoT systems to minimize the communication energy cost publication-title: J. Innov. Digit. Ecosyst. – year: 2018 ident: b6 article-title: A lightweight decentralized service placement policy for performance optimization in fog computing publication-title: J. Ambient Intell. Humaniz. Comput. – start-page: 68 year: 2018 end-page: 77 ident: b44 article-title: Deploying Fog Applications: How Much Does It Cost, By the Way? publication-title: Proceedings of the 8th International Conference on Cloud Computing and Services Science – reference: V.B.C. Souza, W. Ramrez, X. Masip-Bruin, E. Marn-Tordera, G. Ren, G. Tashakor, Handling service allocation in combined Fog-cloud scenarios, in: 2016 IEEE International Conference on Communications, ICC, 2016, pp. 1–5. – volume: 93 start-page: 1 year: 2017 end-page: 10 ident: b67 article-title: Utilizing customer satisfaction in ranking prediction for personalized cloud service selection publication-title: Decis. Support Syst. – volume: 34 start-page: 4077 year: 2016 end-page: 4090 ident: b52 article-title: IoT-cloud service optimization in next generation smart environments publication-title: IEEE J. Sel. Areas Commun. – start-page: 731 year: 2016 end-page: 742 ident: b14 article-title: SANA: secure and scalable aggregate network attestation publication-title: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security – year: 2014 ident: b21 article-title: EU cloud SLA standardisation guidelines – start-page: 79 year: 2018 end-page: 86 ident: b4 article-title: Bonsai in the Fog: An Active Learning Lab with Fog Computing publication-title: Fog and Mobile Edge Computing (FMEC), 2018 Third International Conference on – start-page: 301 year: 2016 end-page: 308 ident: b32 article-title: Star: Semiring trust inference for trust-aware social recommenders publication-title: Proceedings of the 10th ACM Conference on Recommender Systems – volume: 65 start-page: 1440 year: 2016 end-page: 1452 ident: b48 article-title: Cost aware service placement and load dispatching in mobile cloud systems publication-title: IEEE Trans. Comput. – year: 2007 ident: b29 article-title: Trust Management for Mobile Computing Platforms – volume: 5 start-page: 108 year: 2017 end-page: 119 ident: b49 article-title: Cost efficient resource management in fog computing supported medical cyber-physical system publication-title: IEEE Trans. Emerg. Top. Comput. – start-page: 275 year: 2003 end-page: 280 ident: b63 article-title: Attack-resistance of computational trust models publication-title: Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003. WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on – volume: 4 start-page: 1185 year: 2017 end-page: 1192 ident: b8 article-title: QoS-Aware Deployment of IoT Applications Through the Fog publication-title: IEEE Internet Things J. – year: 2018 ident: b54 article-title: Quality of experience (QoE)-aware placement of applications in Fog computing environments publication-title: J. Parallel Distrib. Comput. – reference: A. Brogi, S. Forti, A. Ibrahim, How to best deploy your Fog applications, probably, in: O. Rana and R. Buyya and A. Anjum (Eds.), Proceedings of 1st IEEE Int. Conference on Fog and Edge Computing, 2017. – volume: 47 start-page: 1275 year: 2017 end-page: 1296 ident: b5 article-title: iFogSim: A toolkit for modeling and simulation of resource management techniques in the Internet of Things, Edge and Fog computing environments publication-title: Softw. - Pract. Exp. – start-page: 69 year: 2016 end-page: 80 ident: b56 article-title: Optimal operator placement for distributed stream processing applications publication-title: Proceedings of the 10th ACM International Conference on Distributed and Event-Based Systems – volume: 24 start-page: 318 year: 2006 end-page: 328 ident: b25 article-title: On trust models and trust evaluation metrics for ad-hoc networks publication-title: IEEE J. Sel. Areas Commun. – start-page: 191 year: 2019 end-page: 222 ident: b3 article-title: Predictive Analysis to Support Fog Application Deployment publication-title: Fog and Edge Computing: Principles and Paradigms – volume: 65 start-page: 3702 year: 2016 end-page: 3712 ident: b50 article-title: Joint optimization of task scheduling and image placement in fog computing supported software-defined embedded system publication-title: IEEE Trans. Comput. – reference: O. Skarlat, M. Nardelli, S. Schulte, S. Dustdar, Towards QoS-aware fog service placement, in: 2017 IEEE 1st International Conference on Fog and Edge Computing, ICFEC, 2017, pp. 89–96. – year: 2019 ident: b20 article-title: OpenFog consortium – start-page: 18 year: 2016 end-page: 25 ident: b36 article-title: Obfuscating a business process by splitting its logic with fake fragments for securing a multi-cloud deployment publication-title: Services (SERVICES), 2016 IEEE World Congress on – start-page: 103 year: 2007 end-page: 117 ident: b60 article-title: Trust management publication-title: Security, Privacy, and Trust in Modern Data Management – start-page: 114 year: 2002 ident: 10.1016/j.future.2019.08.020_b61 article-title: Design of a role-based trust-management framework – year: 2018 ident: 10.1016/j.future.2019.08.020_b6 article-title: A lightweight decentralized service placement policy for performance optimization in fog computing publication-title: J. Ambient Intell. Humaniz. Comput. – volume: 100 start-page: 5 issue: 1 year: 2015 ident: 10.1016/j.future.2019.08.020_b18 article-title: Probabilistic (logic) programming concepts publication-title: Mach. Learn. doi: 10.1007/s10994-015-5494-z – volume: 15 start-page: 442 issue: 2 year: 2003 ident: 10.1016/j.future.2019.08.020_b24 article-title: Determining semantic similarity among entity classes from different ontologies publication-title: IEEE Trans. Knowl. Data Eng. doi: 10.1109/TKDE.2003.1185844 – year: 2017 ident: 10.1016/j.future.2019.08.020_b13 article-title: Securing fog computing for internet of things applications: Challenges and solutions publication-title: IEEE Commun. Surv. Tutor. – year: 2018 ident: 10.1016/j.future.2019.08.020_b55 article-title: A methodology for deployment of IoT application in fog publication-title: J. Ambient Intell. Humaniz. Comput. – start-page: 275 year: 2003 ident: 10.1016/j.future.2019.08.020_b63 article-title: Attack-resistance of computational trust models – start-page: 316 year: 2018 ident: 10.1016/j.future.2019.08.020_b70 article-title: Security analysis of smart contracts in datalog – year: 2019 ident: 10.1016/j.future.2019.08.020_b20 – volume: 82 start-page: 152 year: 2017 ident: 10.1016/j.future.2019.08.020_b47 article-title: MIST: Fog-based data analytics scheme with cost-efficient resource provisioning for IoT crowdsensing applications publication-title: J. Netw. Comput. Appl. doi: 10.1016/j.jnca.2017.01.012 – volume: 65 start-page: 1440 issue: 5 year: 2016 ident: 10.1016/j.future.2019.08.020_b48 article-title: Cost aware service placement and load dispatching in mobile cloud systems publication-title: IEEE Trans. Comput. doi: 10.1109/TC.2015.2435781 – volume: 1 start-page: 47 issue: 1–2 year: 2014 ident: 10.1016/j.future.2019.08.020_b53 article-title: Co-locating services in IoT systems to minimize the communication energy cost publication-title: J. Innov. Digit. Ecosyst. doi: 10.1016/j.jides.2015.02.005 – start-page: 307 year: 2014 ident: 10.1016/j.future.2019.08.020_b37 article-title: A security risk assessment model for business process deployment in the cloud – year: 2019 ident: 10.1016/j.future.2019.08.020_b11 – volume: 93 start-page: 1 year: 2017 ident: 10.1016/j.future.2019.08.020_b67 article-title: Utilizing customer satisfaction in ranking prediction for personalized cloud service selection publication-title: Decis. Support Syst. doi: 10.1016/j.dss.2016.09.001 – year: 2018 ident: 10.1016/j.future.2019.08.020_b54 article-title: Quality of experience (QoE)-aware placement of applications in Fog computing environments publication-title: J. Parallel Distrib. Comput. – volume: 5 start-page: 19293 year: 2017 ident: 10.1016/j.future.2019.08.020_b23 article-title: Security and privacy in fog computing: Challenges publication-title: IEEE Access doi: 10.1109/ACCESS.2017.2749422 – ident: 10.1016/j.future.2019.08.020_b9 doi: 10.1109/ICFEC.2017.8 – year: 2014 ident: 10.1016/j.future.2019.08.020_b21 – volume: 5 start-page: 457 issue: 3 year: 2017 ident: 10.1016/j.future.2019.08.020_b39 article-title: Quantitative reasoning about cloud security using service level agreements publication-title: IEEE Trans. Cloud Comput. doi: 10.1109/TCC.2015.2469659 – start-page: 212 year: 2014 ident: 10.1016/j.future.2019.08.020_b65 article-title: A certification-based trust model for autonomic cloud computing systems – ident: 10.1016/j.future.2019.08.020_b15 doi: 10.1109/SDS.2019.8768602 – volume: 74 start-page: 302 year: 2017 ident: 10.1016/j.future.2019.08.020_b26 article-title: Towards a trust evaluation middleware for cloud service selection publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2016.01.009 – year: 2018 ident: 10.1016/j.future.2019.08.020_b59 article-title: Migration modeling and learning algorithms for containers in fog computing publication-title: IEEE Trans. Serv. Comput. – volume: 34 start-page: 151 issue: 2–3 year: 2019 ident: 10.1016/j.future.2019.08.020_b10 article-title: Mimicking FogDirector Application Management publication-title: Software-Intensive Cyber-Physical Systems doi: 10.1007/s00450-019-00403-y – ident: 10.1016/j.future.2019.08.020_b51 doi: 10.1109/ICC.2016.7511465 – volume: 35 start-page: 268 issue: 1 year: 2012 ident: 10.1016/j.future.2019.08.020_b64 article-title: Certification-based trust models in mobile ad hoc networks: A survey and taxonomy publication-title: J. Netw. Comput. Appl. doi: 10.1016/j.jnca.2011.08.008 – volume: 65 start-page: 3702 issue: 12 year: 2016 ident: 10.1016/j.future.2019.08.020_b50 article-title: Joint optimization of task scheduling and image placement in fog computing supported software-defined embedded system publication-title: IEEE Trans. Comput. doi: 10.1109/TC.2016.2536019 – volume: 47 start-page: 1275 issue: 9 year: 2017 ident: 10.1016/j.future.2019.08.020_b5 article-title: iFogSim: A toolkit for modeling and simulation of resource management techniques in the Internet of Things, Edge and Fog computing environments publication-title: Softw. - Pract. Exp. doi: 10.1002/spe.2509 – start-page: 79 year: 2018 ident: 10.1016/j.future.2019.08.020_b4 article-title: Bonsai in the Fog: An Active Learning Lab with Fog Computing – volume: 24 start-page: 318 issue: LCA-ARTICLE-2007-016 year: 2006 ident: 10.1016/j.future.2019.08.020_b25 article-title: On trust models and trust evaluation metrics for ad-hoc networks publication-title: IEEE J. Sel. Areas Commun. doi: 10.1109/JSAC.2005.861390 – ident: 10.1016/j.future.2019.08.020_b57 doi: 10.23919/FRUCT.2017.8250193 – start-page: 731 year: 2016 ident: 10.1016/j.future.2019.08.020_b14 article-title: SANA: secure and scalable aggregate network attestation – volume: 7 start-page: 337 issue: 4–5 year: 2005 ident: 10.1016/j.future.2019.08.020_b62 article-title: Propagation models for trust and distrust in social networks publication-title: Inf. Syst. Front. doi: 10.1007/s10796-005-4807-3 – start-page: 133 year: 2015 ident: 10.1016/j.future.2019.08.020_b2 article-title: IoT and microservices – volume: 45 start-page: 37 issue: 5 year: 2015 ident: 10.1016/j.future.2019.08.020_b16 article-title: Edge-centric computing: Vision and challenges publication-title: ACM SIGCOMM Comput. Commun. Rev. doi: 10.1145/2831347.2831354 – start-page: 103 year: 2007 ident: 10.1016/j.future.2019.08.020_b60 article-title: Trust management – year: 2017 ident: 10.1016/j.future.2019.08.020_b66 article-title: A semi-automatic and trustworthy scheme for continuous cloud service certification publication-title: IEEE Trans. Serv. Comput. – ident: 10.1016/j.future.2019.08.020_b40 doi: 10.1109/ICFEC.2017.20 – volume: 5 start-page: 108 issue: 1 year: 2017 ident: 10.1016/j.future.2019.08.020_b49 article-title: Cost efficient resource management in fog computing supported medical cyber-physical system publication-title: IEEE Trans. Emerg. Top. Comput. doi: 10.1109/TETC.2015.2508382 – ident: 10.1016/j.future.2019.08.020_b7 doi: 10.1109/ICFEC.2017.12 – start-page: 1128 year: 2008 ident: 10.1016/j.future.2019.08.020_b30 article-title: Weighted datalog and levels of trust – year: 2018 ident: 10.1016/j.future.2019.08.020_b12 – volume: 34 start-page: 4077 issue: 12 year: 2016 ident: 10.1016/j.future.2019.08.020_b52 article-title: IoT-cloud service optimization in next generation smart environments publication-title: IEEE J. Sel. Areas Commun. doi: 10.1109/JSAC.2016.2621398 – year: 2018 ident: 10.1016/j.future.2019.08.020_b1 – ident: 10.1016/j.future.2019.08.020_b45 doi: 10.1109/APNOMS.2016.7737202 – start-page: 69 year: 2016 ident: 10.1016/j.future.2019.08.020_b56 article-title: Optimal operator placement for distributed stream processing applications – volume: 8 start-page: 369 issue: 3 year: 2015 ident: 10.1016/j.future.2019.08.020_b68 article-title: CCCloud: Context-aware and credible cloud service selection based on subjective assessment and objective assessment publication-title: IEEE Trans. Serv. Comput. doi: 10.1109/TSC.2015.2413111 – start-page: 2054 year: 2017 ident: 10.1016/j.future.2019.08.020_b34 article-title: A taxonomy, survey on placement of virtual machines in cloud – ident: 10.1016/j.future.2019.08.020_b69 – volume: 5 start-page: 2514 year: 2017 ident: 10.1016/j.future.2019.08.020_b43 article-title: Online placement of multi-component applications in edge computing environments publication-title: IEEE Access doi: 10.1109/ACCESS.2017.2665971 – year: 2015 ident: 10.1016/j.future.2019.08.020_b28 – year: 2018 ident: 10.1016/j.future.2019.08.020_b22 article-title: Security-aware SaaS placement using swarm intelligence publication-title: J. Softw.: Evol. Process – year: 2007 ident: 10.1016/j.future.2019.08.020_b29 – start-page: 18 year: 2016 ident: 10.1016/j.future.2019.08.020_b36 article-title: Obfuscating a business process by splitting its logic with fake fragments for securing a multi-cloud deployment – year: 2018 ident: 10.1016/j.future.2019.08.020_b42 article-title: Latency-aware application module management for fog computing environments publication-title: ACM Trans. Internet Technol. (TOIT) – volume: 3 start-page: 595 issue: 6 year: 2010 ident: 10.1016/j.future.2019.08.020_b31 article-title: Semiring-based frameworks for trust propagation in small-world networks and coalition formation criteria publication-title: Secur. Commun. Netw. doi: 10.1002/sec.252 – start-page: 301 year: 2016 ident: 10.1016/j.future.2019.08.020_b32 article-title: Star: Semiring trust inference for trust-aware social recommenders – volume: 1073 start-page: 168 year: 2019 ident: 10.1016/j.future.2019.08.020_b27 article-title: Optimising QoS-assurance, Resource Usage and Cost of Fog Application Deployments – start-page: 13 year: 2019 ident: 10.1016/j.future.2019.08.020_b58 article-title: Meet Genetic Algorithms in Monte Carlo: Optimised Placement of Multi-Service Applications in the Fog – ident: 10.1016/j.future.2019.08.020_b17 – ident: 10.1016/j.future.2019.08.020_b33 doi: 10.1609/aaai.v25i1.7852 – volume: 10 start-page: 929 issue: 6 year: 2017 ident: 10.1016/j.future.2019.08.020_b38 article-title: Cost effective, reliable and secure workflow deployment over federated clouds publication-title: IEEE Trans. Serv. Comput. doi: 10.1109/TSC.2016.2543719 – volume: 103 start-page: 198 year: 2015 ident: 10.1016/j.future.2019.08.020_b19 article-title: Automatic deployment of distributed software systems: Definitions and state of the art publication-title: J. Syst. Softw. doi: 10.1016/j.jss.2015.01.040 – volume: 4 start-page: 1185 issue: 5 year: 2017 ident: 10.1016/j.future.2019.08.020_b8 article-title: QoS-Aware Deployment of IoT Applications Through the Fog publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2017.2701408 – start-page: 191 year: 2019 ident: 10.1016/j.future.2019.08.020_b3 article-title: Predictive Analysis to Support Fog Application Deployment – volume: 21 start-page: 16 issue: 2 year: 2017 ident: 10.1016/j.future.2019.08.020_b41 article-title: Fog orchestration for internet of things services publication-title: IEEE Internet Comput. doi: 10.1109/MIC.2017.36 – start-page: 296 year: 2017 ident: 10.1016/j.future.2019.08.020_b35 article-title: Using risk patterns to identify violations of data protection policies in cloud systems – ident: 10.1016/j.future.2019.08.020_b46 doi: 10.23919/INM.2017.7987464 – start-page: 68 year: 2018 ident: 10.1016/j.future.2019.08.020_b44 article-title: Deploying Fog Applications: How Much Does It Cost, By the Way? |
| SSID | ssj0001731 |
| Score | 2.4680483 |
| Snippet | Assessing the security level of IoT applications to be deployed to heterogeneous Cloud-Edge infrastructures operated by different providers is a non-trivial... |
| SourceID | crossref elsevier |
| SourceType | Enrichment Source Index Database Publisher |
| StartPage | 775 |
| SubjectTerms | Declarative programming Probabilistic reasoning Secure application deployment |
| Title | Secure Cloud-Edge Deployments, with Trust |
| URI | https://dx.doi.org/10.1016/j.future.2019.08.020 |
| Volume | 102 |
| WOSCitedRecordID | wos000501936300064&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection Journals 2021 customDbUrl: eissn: 1872-7115 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0001731 issn: 0167-739X databaseCode: AIEXJ dateStart: 19950201 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LS8QwEA6668GLb_FND15EI22z3aRHWVdUZBFcYW-lTRPpsraiXfHnO2nSB674Ai-ltE2bZoaZL8PMfAgdSi4dxjsCx5zHuCN9iUNfCAyeJFLNQERoyCboYMBGI__WpDW_FHQCNE3Z25v_9K-ihmsgbFU6-wtxVy-FC3AOQocjiB2OPxJ8EUEXx71JNo1xX1VjnQvF6vuoUyZ6OvQ6VLUWTWR6UTQXUYzKwigFN4QPpttzXSiSmRyAu1zIMM0aIWm18y4i7aB0-GaaPCSN7f5DYroVgBnJmtEG1_4QbZgtg9FRSbC2lBScuOBUtCVlFKC7o2s1K1Nruw1jSTVnivG7VNP7zZh0HV0Yn-oeKyoZzy-arrp27cKqxMI7NRU1E8Cl4Hq7bB61Xer5rIXaZ1f90XXlpR1quCrN1MuyyiL3b_Zbn8OWBhQZrqAls4ewzrTsV9GcSNfQcsnPYRlzvY6OtCpYtSpYDVU4sZQiWIUibKD7i_6wd4kNNQbmgJhzzITtSipZJBSlopQ2wGhih5wSAX8gOuDCOIjPY5Gk3ZjbJKI-JZFHfcYBwTlkE7XSLBVbyJKO9GIO96UnFToNCUBO2Q0Fk4wwxrYRKf884KZvvKIvmQRlguA40OsVqPUKFKupa28jXI160n1TvnmelosaGOynMV0AevDlyJ0_j9xFi7WK76FW_jwV-2iBv-bJy_OBUZh3F6Z-5Q |
| linkProvider | Elsevier |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Secure+Cloud-Edge+Deployments%2C+with+Trust&rft.jtitle=Future+generation+computer+systems&rft.au=Forti%2C+Stefano&rft.au=Ferrari%2C+Gian-Luigi&rft.au=Brogi%2C+Antonio&rft.date=2020-01-01&rft.pub=Elsevier+B.V&rft.issn=0167-739X&rft.eissn=1872-7115&rft.volume=102&rft.spage=775&rft.epage=788&rft_id=info:doi/10.1016%2Fj.future.2019.08.020&rft.externalDocID=S0167739X19301268 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0167-739X&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0167-739X&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0167-739X&client=summon |