Secure Cloud-Edge Deployments, with Trust

Assessing the security level of IoT applications to be deployed to heterogeneous Cloud-Edge infrastructures operated by different providers is a non-trivial task. In this article, we present a methodology that permits to express security requirements for IoT applications, as well as infrastructure s...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:Future generation computer systems Ročník 102; s. 775 - 788
Hlavní autoři: Forti, Stefano, Ferrari, Gian-Luigi, Brogi, Antonio
Médium: Journal Article
Jazyk:angličtina
Vydáno: Elsevier B.V 01.01.2020
Témata:
ISSN:0167-739X, 1872-7115
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract Assessing the security level of IoT applications to be deployed to heterogeneous Cloud-Edge infrastructures operated by different providers is a non-trivial task. In this article, we present a methodology that permits to express security requirements for IoT applications, as well as infrastructure security capabilities, in a simple and declarative manner, and to automatically obtain an explainable assessment of the security level of the possible application deployments. The methodology also considers the impact of trust relations among different stakeholders using or managing Cloud-Edge infrastructures. A lifelike example is used to showcase the prototyped implementation of the methodology.
AbstractList Assessing the security level of IoT applications to be deployed to heterogeneous Cloud-Edge infrastructures operated by different providers is a non-trivial task. In this article, we present a methodology that permits to express security requirements for IoT applications, as well as infrastructure security capabilities, in a simple and declarative manner, and to automatically obtain an explainable assessment of the security level of the possible application deployments. The methodology also considers the impact of trust relations among different stakeholders using or managing Cloud-Edge infrastructures. A lifelike example is used to showcase the prototyped implementation of the methodology.
Author Ferrari, Gian-Luigi
Brogi, Antonio
Forti, Stefano
Author_xml – sequence: 1
  givenname: Stefano
  surname: Forti
  fullname: Forti, Stefano
  email: stefano.forti@di.unipi.it
– sequence: 2
  givenname: Gian-Luigi
  surname: Ferrari
  fullname: Ferrari, Gian-Luigi
– sequence: 3
  givenname: Antonio
  surname: Brogi
  fullname: Brogi, Antonio
BookMark eNqFjz1PwzAURS1UJNrCP2DIikTCe3ZTOwxIqJQPqRIDRWKzEucZXLVJZTug_ntSlYkBprvcc3XPiA2atiHGzhEyBJxerTLbxc5TxgGLDFQGHI7YEJXkqUTMB2zY12QqRfF2wkYhrAAApcAhu3gh05PJbN12dTqv3ym5o-263W2oieEy-XLxI1n6LsRTdmzLdaCznxyz1_v5cvaYLp4fnma3i9SInMdUEXArrapIyQlYCznnAkojBfUfaFIgGg48V5WV09qAqGQhRZXLQhmYIooxmxx2jW9D8GT11rtN6XcaQe919UofdPVeV4PSvW6PXf_CjItldG0TfenW_8E3B5h6sU9HXgfjqDFUO08m6rp1fw98A8aWdBA
CitedBy_id crossref_primary_10_1007_s00607_021_01031_8
crossref_primary_10_1016_j_icte_2024_08_007
crossref_primary_10_3390_fi15070224
crossref_primary_10_3390_electronics12061332
crossref_primary_10_3390_s22228784
crossref_primary_10_1007_s12652_021_02910_w
crossref_primary_10_1017_S1471068425100148
crossref_primary_10_1016_j_eswa_2022_117012
crossref_primary_10_1016_j_future_2020_03_064
crossref_primary_10_1007_s10586_021_03243_1
crossref_primary_10_1016_j_future_2021_01_026
crossref_primary_10_1016_j_jnca_2021_103078
crossref_primary_10_1109_ACCESS_2022_3183634
crossref_primary_10_1145_3736726
crossref_primary_10_1051_itmconf_20257603003
crossref_primary_10_1016_j_future_2020_08_011
crossref_primary_10_1017_S1471068421000016
crossref_primary_10_1007_s00607_021_00924_y
crossref_primary_10_1016_j_simpat_2019_102021
crossref_primary_10_1109_TNSE_2021_3099953
crossref_primary_10_1002_smr_2405
crossref_primary_10_1007_s10723_021_09582_y
crossref_primary_10_1016_j_jnca_2022_103402
crossref_primary_10_1007_s13369_021_05607_6
crossref_primary_10_7717_peerj_cs_779
crossref_primary_10_1093_logcom_exab083
Cites_doi 10.1007/s10994-015-5494-z
10.1109/TKDE.2003.1185844
10.1016/j.jnca.2017.01.012
10.1109/TC.2015.2435781
10.1016/j.jides.2015.02.005
10.1016/j.dss.2016.09.001
10.1109/ACCESS.2017.2749422
10.1109/ICFEC.2017.8
10.1109/TCC.2015.2469659
10.1109/SDS.2019.8768602
10.1016/j.future.2016.01.009
10.1007/s00450-019-00403-y
10.1109/ICC.2016.7511465
10.1016/j.jnca.2011.08.008
10.1109/TC.2016.2536019
10.1002/spe.2509
10.1109/JSAC.2005.861390
10.23919/FRUCT.2017.8250193
10.1007/s10796-005-4807-3
10.1145/2831347.2831354
10.1109/ICFEC.2017.20
10.1109/TETC.2015.2508382
10.1109/ICFEC.2017.12
10.1109/JSAC.2016.2621398
10.1109/APNOMS.2016.7737202
10.1109/TSC.2015.2413111
10.1109/ACCESS.2017.2665971
10.1002/sec.252
10.1609/aaai.v25i1.7852
10.1109/TSC.2016.2543719
10.1016/j.jss.2015.01.040
10.1109/JIOT.2017.2701408
10.1109/MIC.2017.36
10.23919/INM.2017.7987464
ContentType Journal Article
Copyright 2019 Elsevier B.V.
Copyright_xml – notice: 2019 Elsevier B.V.
DBID AAYXX
CITATION
DOI 10.1016/j.future.2019.08.020
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1872-7115
EndPage 788
ExternalDocumentID 10_1016_j_future_2019_08_020
S0167739X19301268
GroupedDBID --K
--M
-~X
.DC
.~1
0R~
1B1
1~.
1~5
29H
4.4
457
4G.
5GY
5VS
7-5
71M
8P~
9JN
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AAXUO
AAYFN
ABBOA
ABFNM
ABJNI
ABMAC
ABXDB
ABYKQ
ACDAQ
ACGFS
ACNNM
ACRLP
ACZNC
ADBBV
ADEZE
ADJOM
ADMUD
AEBSH
AEKER
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHHHB
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
ASPBG
AVWKF
AXJTR
AZFZN
BKOJK
BLXMC
CS3
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
F5P
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-Q
G8K
GBLVA
GBOLZ
HLZ
HVGLF
HZ~
IHE
J1W
KOM
LG9
M41
MO0
MS~
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
PC.
Q38
R2-
RIG
ROL
RPZ
SBC
SDF
SDG
SES
SEW
SPC
SPCBC
SSV
SSZ
T5K
UHS
WUQ
XPP
ZMT
~G-
9DU
AATTM
AAXKI
AAYWO
AAYXX
ABDPE
ABWVN
ACLOT
ACRPL
ADNMO
AEIPS
AFJKZ
AGQPQ
AIIUN
ANKPU
APXCP
CITATION
EFKBS
~HD
ID FETCH-LOGICAL-c352t-8e02f7f8be8740ff052230ac73e016e4911c20258bf76dc03b7973b5798c06113
ISICitedReferencesCount 43
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000501936300064&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0167-739X
IngestDate Sat Nov 29 07:22:46 EST 2025
Tue Nov 18 21:10:31 EST 2025
Fri Feb 23 02:48:27 EST 2024
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Keywords Declarative programming
Probabilistic reasoning
Secure application deployment
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c352t-8e02f7f8be8740ff052230ac73e016e4911c20258bf76dc03b7973b5798c06113
OpenAccessLink http://hdl.handle.net/11568/1031746
PageCount 14
ParticipantIDs crossref_primary_10_1016_j_future_2019_08_020
crossref_citationtrail_10_1016_j_future_2019_08_020
elsevier_sciencedirect_doi_10_1016_j_future_2019_08_020
PublicationCentury 2000
PublicationDate January 2020
2020-01-00
PublicationDateYYYYMMDD 2020-01-01
PublicationDate_xml – month: 01
  year: 2020
  text: January 2020
PublicationDecade 2020
PublicationTitle Future generation computer systems
PublicationYear 2020
Publisher Elsevier B.V
Publisher_xml – name: Elsevier B.V
References V.B.C. Souza, W. Ramrez, X. Masip-Bruin, E. Marn-Tordera, G. Ren, G. Tashakor, Handling service allocation in combined Fog-cloud scenarios, in: 2016 IEEE International Conference on Communications, ICC, 2016, pp. 1–5.
Mukherjee, Matam, Shu, Maglaras, Ferrag, Choudhury, Kumar (b23) 2017; 5
Kaur, Singh, Singh (b34) 2017
Gao, Miao, Baras, Golbeck (b32) 2016
Mezni, Sellami, Kouki (b22) 2018
Cardellini, Grassi, Lo Presti, Nardelli (b56) 2016
Tsankov (b70) 2018
Omar, Challal, Bouabdallah (b64) 2012; 35
Zeng, Gu, Guo, Cheng, Yu (b50) 2016; 65
Gupta, Vahid Dastjerdi, Ghosh, Buyya (b5) 2017; 47
Venticinque, Amato (b55) 2018
Theodorakopoulos, Baras (b25) 2006; 24
Ni, Zhang, Lin, Shen (b13) 2017
Li, Mitchell, Winsborough (b61) 2002
A. Brogi, S. Forti, A. Ibrahim, How to best deploy your Fog applications, probably, in: O. Rana and R. Buyya and A. Anjum (Eds.), Proceedings of 1st IEEE Int. Conference on Fog and Edge Computing, 2017.
Mahmud, Ramamohanarao, Buyya (b42) 2018
Brogi, Forti, Ibrahim (b44) 2018
Wen, Yang, Garraghan, Lin, Xu, Rovatsos (b41) 2017; 21
Twigg, Dimmock (b63) 2003
Yang, Cao, Liang, Han (b48) 2016; 65
Anisetti, Ardagna, Damiani, Gaudenzi (b66) 2017
P. Varshney, Y. Simmhan, Demystifying fog computing: Characterizing architectures, applications and abstractions, in: 2017 IEEE 1st International Conference on Fog and Edge Computing, ICFEC, 2017, pp. 115–124.
(b21) 2014
S. De Capitani Di Vimercati, S. Foresti, G. Livraga, V. Piuri, P. Samarati, IEEE Transactions on Services Computing, Supporting User Requirements and Preferences in Cloud Plan Selection, In press.
L. De Raedt, A. Kimmig, H. Toivonen, ProbLog: A probabilistic prolog and its application in link discovery, in: Proceedings of the 20th International Joint Conference on Artifical Intelligence, 2007, pp. 2468–2473.
Bistarelli, Martinelli, Santini (b30) 2008
Luna, Taha, Trapero, Suri (b39) 2017; 5
Barcelo, Correa, Llorca, Tulino, Vicario, Morell (b52) 2016; 34
Mahmud, Srirama, Ramamohanarao, Buyya (b54) 2018
N. Torkzaban, C. Papagianni, J.S. Baras, Trust-aware service chain embedding, in: Proceedings of the 6th International Conference on Software Defined Systems, SDS, 2019.
Brogi, Forti, Ibrahim (b3) 2019
Qu, Wang, Orgun, Liu, Liu, Bouguettaya (b68) 2015; 8
O. Skarlat, M. Nardelli, S. Schulte, S. Dustdar, Towards QoS-aware fog service placement, in: 2017 IEEE 1st International Conference on Fog and Edge Computing, ICFEC, 2017, pp. 89–96.
Bistarelli, Foley, O’Sullivan, Santini (b31) 2010; 3
Viganò, Magazzeni (b12) 2018
Tang, Dai, Liu, Chen (b26) 2017; 74
Ardagna, Damiani, De Capitani di Vimercati, Foresti, Samarati (b60) 2007
Gu, Zeng, Guo, Barnawi, Xiang (b49) 2017; 5
Brogi, Forti, Guerrero, Lera (b58) 2019
Yan (b29) 2007
Brogi, Forti, Ibrahim (b27) 2019; 1073
(b20) 2019
Huang, Lin, Yu, Hsu (b53) 2014; 1
Brogi, Forti, Guerrero, Lera (b11) 2019
Familiar (b2) 2015
Arcangeli, Boujbel, Leriche (b19) 2015; 103
Tang, Zhou, Zhang, Jia, Zhao (b59) 2018
Newman (b28) 2015
Ding, Wang, Wu, Olson (b67) 2017; 93
Fajjari, Tobagi, Takahashi (b1) 2018
Forti, Ibrahim, Brogi (b10) 2019; 34
D. Rahbari, M. Nickray, Scheduling of fog networks with optimized knapsack by symbiotic organisms search, in: 2017 21st Conference of Open Innovations Association, FRUCT, 2017, pp. 278–283.
Ziegler, Lausen (b62) 2005; 7
Goettelmann, Dahman, Gateau, Dubois, Godart (b37) 2014
Rodríguez, Egenhofer (b24) 2003; 15
Ambrosin, Conti, Ibrahim, Neven, Sadeghi, Schunter (b14) 2016
De Raedt, Kimmig (b18) 2015; 100
M. Taneja, A. Davy, Resource aware placement of IoT application modules in Fog-Cloud Computing Paradigm, in: 2017 IFIP/IEEE Symposium on Integrated Network and Service Management, IM, 2017, pp. 1222–1228.
Wen, Cała, Watson, Romanovsky (b38) 2017; 10
Wang, Zafer, Leung (b43) 2017; 5
Brogi, Forti, Ibrahim, Rinaldi (b4) 2018
Nacer, Goettelmann, Youcef, Tari, Godart (b36) 2016
H.J. Hong, P.H. Tsai, C.H. Hsu, Dynamic module deployment in a fog computing platform, in: 2016 18th Asia-Pacific Network Operations and Management Symposium, APNOMS, 2016, pp. 1–6.
Garcia Lopez, Montresor, Epema, Datta, Higashino, Iamnitchi, Barcellos, Felber, Riviere (b16) 2015; 45
Schoenen, Mann, Metzger (b35) 2017
Hamid Reza Arkian, Diyanat (b47) 2017; 82
Guerrero, Lera, Juiz (b6) 2018
Anisetti, Ardagna, Damiani (b65) 2014
Brogi, Forti (b8) 2017; 4
A. Kimmig, G. Van den Broeck, L. De Raedt, An algebraic Prolog for reasoning about possible worlds, in: Twenty-Fifth AAAI Conference on Artificial Intelligence, 2011.
Ni (10.1016/j.future.2019.08.020_b13) 2017
Tang (10.1016/j.future.2019.08.020_b59) 2018
Theodorakopoulos (10.1016/j.future.2019.08.020_b25) 2006; 24
10.1016/j.future.2019.08.020_b69
Forti (10.1016/j.future.2019.08.020_b10) 2019; 34
Ding (10.1016/j.future.2019.08.020_b67) 2017; 93
Guerrero (10.1016/j.future.2019.08.020_b6) 2018
Yan (10.1016/j.future.2019.08.020_b29) 2007
Rodríguez (10.1016/j.future.2019.08.020_b24) 2003; 15
Newman (10.1016/j.future.2019.08.020_b28) 2015
Gao (10.1016/j.future.2019.08.020_b32) 2016
Omar (10.1016/j.future.2019.08.020_b64) 2012; 35
Brogi (10.1016/j.future.2019.08.020_b58) 2019
Barcelo (10.1016/j.future.2019.08.020_b52) 2016; 34
(10.1016/j.future.2019.08.020_b20) 2019
Wen (10.1016/j.future.2019.08.020_b41) 2017; 21
Schoenen (10.1016/j.future.2019.08.020_b35) 2017
Ambrosin (10.1016/j.future.2019.08.020_b14) 2016
Twigg (10.1016/j.future.2019.08.020_b63) 2003
10.1016/j.future.2019.08.020_b17
10.1016/j.future.2019.08.020_b15
Bistarelli (10.1016/j.future.2019.08.020_b30) 2008
De Raedt (10.1016/j.future.2019.08.020_b18) 2015; 100
Huang (10.1016/j.future.2019.08.020_b53) 2014; 1
10.1016/j.future.2019.08.020_b57
Ardagna (10.1016/j.future.2019.08.020_b60) 2007
Wang (10.1016/j.future.2019.08.020_b43) 2017; 5
10.1016/j.future.2019.08.020_b51
(10.1016/j.future.2019.08.020_b21) 2014
Goettelmann (10.1016/j.future.2019.08.020_b37) 2014
Mahmud (10.1016/j.future.2019.08.020_b54) 2018
Fajjari (10.1016/j.future.2019.08.020_b1) 2018
Wen (10.1016/j.future.2019.08.020_b38) 2017; 10
Brogi (10.1016/j.future.2019.08.020_b4) 2018
Kaur (10.1016/j.future.2019.08.020_b34) 2017
Brogi (10.1016/j.future.2019.08.020_b11) 2019
Mukherjee (10.1016/j.future.2019.08.020_b23) 2017; 5
Anisetti (10.1016/j.future.2019.08.020_b65) 2014
Mahmud (10.1016/j.future.2019.08.020_b42) 2018
10.1016/j.future.2019.08.020_b46
Venticinque (10.1016/j.future.2019.08.020_b55) 2018
10.1016/j.future.2019.08.020_b45
Tsankov (10.1016/j.future.2019.08.020_b70) 2018
Cardellini (10.1016/j.future.2019.08.020_b56) 2016
Tang (10.1016/j.future.2019.08.020_b26) 2017; 74
10.1016/j.future.2019.08.020_b40
10.1016/j.future.2019.08.020_b7
Ziegler (10.1016/j.future.2019.08.020_b62) 2005; 7
10.1016/j.future.2019.08.020_b9
Brogi (10.1016/j.future.2019.08.020_b8) 2017; 4
Nacer (10.1016/j.future.2019.08.020_b36) 2016
Brogi (10.1016/j.future.2019.08.020_b3) 2019
Viganò (10.1016/j.future.2019.08.020_b12) 2018
Bistarelli (10.1016/j.future.2019.08.020_b31) 2010; 3
Brogi (10.1016/j.future.2019.08.020_b44) 2018
Zeng (10.1016/j.future.2019.08.020_b50) 2016; 65
Yang (10.1016/j.future.2019.08.020_b48) 2016; 65
Anisetti (10.1016/j.future.2019.08.020_b66) 2017
Gupta (10.1016/j.future.2019.08.020_b5) 2017; 47
Arcangeli (10.1016/j.future.2019.08.020_b19) 2015; 103
Brogi (10.1016/j.future.2019.08.020_b27) 2019; 1073
10.1016/j.future.2019.08.020_b33
Li (10.1016/j.future.2019.08.020_b61) 2002
Luna (10.1016/j.future.2019.08.020_b39) 2017; 5
Qu (10.1016/j.future.2019.08.020_b68) 2015; 8
Mezni (10.1016/j.future.2019.08.020_b22) 2018
Hamid Reza Arkian (10.1016/j.future.2019.08.020_b47) 2017; 82
Gu (10.1016/j.future.2019.08.020_b49) 2017; 5
Garcia Lopez (10.1016/j.future.2019.08.020_b16) 2015; 45
Familiar (10.1016/j.future.2019.08.020_b2) 2015
References_xml – reference: H.J. Hong, P.H. Tsai, C.H. Hsu, Dynamic module deployment in a fog computing platform, in: 2016 18th Asia-Pacific Network Operations and Management Symposium, APNOMS, 2016, pp. 1–6.
– volume: 45
  start-page: 37
  year: 2015
  end-page: 42
  ident: b16
  article-title: Edge-centric computing: Vision and challenges
  publication-title: ACM SIGCOMM Comput. Commun. Rev.
– volume: 5
  start-page: 2514
  year: 2017
  end-page: 2533
  ident: b43
  article-title: Online placement of multi-component applications in edge computing environments
  publication-title: IEEE Access
– year: 2017
  ident: b66
  article-title: A semi-automatic and trustworthy scheme for continuous cloud service certification
  publication-title: IEEE Trans. Serv. Comput.
– start-page: 296
  year: 2017
  end-page: 307
  ident: b35
  article-title: Using risk patterns to identify violations of data protection policies in cloud systems
  publication-title: International Conference on Service-Oriented Computing
– year: 2018
  ident: b55
  article-title: A methodology for deployment of IoT application in fog
  publication-title: J. Ambient Intell. Humaniz. Comput.
– volume: 35
  start-page: 268
  year: 2012
  end-page: 286
  ident: b64
  article-title: Certification-based trust models in mobile ad hoc networks: A survey and taxonomy
  publication-title: J. Netw. Comput. Appl.
– start-page: 114
  year: 2002
  end-page: 130
  ident: b61
  article-title: Design of a role-based trust-management framework
  publication-title: Security and Privacy, 2002. Proceedings. 2002 IEEE Symposium on
– year: 2018
  ident: b59
  article-title: Migration modeling and learning algorithms for containers in fog computing
  publication-title: IEEE Trans. Serv. Comput.
– year: 2017
  ident: b13
  article-title: Securing fog computing for internet of things applications: Challenges and solutions
  publication-title: IEEE Commun. Surv. Tutor.
– reference: A. Kimmig, G. Van den Broeck, L. De Raedt, An algebraic Prolog for reasoning about possible worlds, in: Twenty-Fifth AAAI Conference on Artificial Intelligence, 2011.
– start-page: 212
  year: 2014
  end-page: 219
  ident: b65
  article-title: A certification-based trust model for autonomic cloud computing systems
  publication-title: Cloud and Autonomic Computing (ICCAC), 2014 International Conference on
– reference: S. De Capitani Di Vimercati, S. Foresti, G. Livraga, V. Piuri, P. Samarati, IEEE Transactions on Services Computing, Supporting User Requirements and Preferences in Cloud Plan Selection, In press.
– year: 2018
  ident: b42
  article-title: Latency-aware application module management for fog computing environments
  publication-title: ACM Trans. Internet Technol. (TOIT)
– reference: M. Taneja, A. Davy, Resource aware placement of IoT application modules in Fog-Cloud Computing Paradigm, in: 2017 IFIP/IEEE Symposium on Integrated Network and Service Management, IM, 2017, pp. 1222–1228.
– volume: 103
  start-page: 198
  year: 2015
  end-page: 218
  ident: b19
  article-title: Automatic deployment of distributed software systems: Definitions and state of the art
  publication-title: J. Syst. Softw.
– year: 2015
  ident: b28
  article-title: Building Microservices: Designing Fine-Grained Systems
– start-page: 13
  year: 2019
  end-page: 17
  ident: b58
  article-title: Meet Genetic Algorithms in Monte Carlo: Optimised Placement of Multi-Service Applications in the Fog
  publication-title: Proceedings of the 3rd IEEE International Conference on Edge Computing (EDGE 2019)
– start-page: 307
  year: 2014
  end-page: 314
  ident: b37
  article-title: A security risk assessment model for business process deployment in the cloud
  publication-title: Services Computing (SCC), 2014 IEEE International Conference on
– volume: 5
  start-page: 19293
  year: 2017
  end-page: 19304
  ident: b23
  article-title: Security and privacy in fog computing: Challenges
  publication-title: IEEE Access
– volume: 8
  start-page: 369
  year: 2015
  end-page: 383
  ident: b68
  article-title: CCCloud: Context-aware and credible cloud service selection based on subjective assessment and objective assessment
  publication-title: IEEE Trans. Serv. Comput.
– volume: 15
  start-page: 442
  year: 2003
  end-page: 456
  ident: b24
  article-title: Determining semantic similarity among entity classes from different ontologies
  publication-title: IEEE Trans. Knowl. Data Eng.
– volume: 5
  start-page: 457
  year: 2017
  end-page: 471
  ident: b39
  article-title: Quantitative reasoning about cloud security using service level agreements
  publication-title: IEEE Trans. Cloud Comput.
– reference: P. Varshney, Y. Simmhan, Demystifying fog computing: Characterizing architectures, applications and abstractions, in: 2017 IEEE 1st International Conference on Fog and Edge Computing, ICFEC, 2017, pp. 115–124.
– year: 2019
  ident: b11
  article-title: How to Place Your Apps in the Fog - State of the Art and Open Challenges
– year: 2018
  ident: b1
  article-title: Cloud Edge Computing in the IoT
– volume: 100
  start-page: 5
  year: 2015
  end-page: 47
  ident: b18
  article-title: Probabilistic (logic) programming concepts
  publication-title: Mach. Learn.
– volume: 1073
  start-page: 168
  year: 2019
  end-page: 189
  ident: b27
  article-title: Optimising QoS-assurance, Resource Usage and Cost of Fog Application Deployments
  publication-title: Cloud Computing and Services Science (CLOSER 2018) Revised Selected Papers
– year: 2018
  ident: b22
  article-title: Security-aware SaaS placement using swarm intelligence
  publication-title: J. Softw.: Evol. Process
– volume: 82
  start-page: 152
  year: 2017
  end-page: 165
  ident: b47
  article-title: MIST: Fog-based data analytics scheme with cost-efficient resource provisioning for IoT crowdsensing applications
  publication-title: J. Netw. Comput. Appl.
– start-page: 133
  year: 2015
  end-page: 163
  ident: b2
  article-title: IoT and microservices
  publication-title: Microservices, IoT, and Azure
– volume: 34
  start-page: 151
  year: 2019
  end-page: 161
  ident: b10
  article-title: Mimicking FogDirector Application Management
  publication-title: Software-Intensive Cyber-Physical Systems
– year: 2018
  ident: b12
  article-title: Explainable security
– reference: N. Torkzaban, C. Papagianni, J.S. Baras, Trust-aware service chain embedding, in: Proceedings of the 6th International Conference on Software Defined Systems, SDS, 2019.
– start-page: 1128
  year: 2008
  end-page: 1134
  ident: b30
  article-title: Weighted datalog and levels of trust
  publication-title: Availability, Reliability and Security, 2008. ARES 08. Third International Conference on
– reference: L. De Raedt, A. Kimmig, H. Toivonen, ProbLog: A probabilistic prolog and its application in link discovery, in: Proceedings of the 20th International Joint Conference on Artifical Intelligence, 2007, pp. 2468–2473.
– start-page: 2054
  year: 2017
  end-page: 2058
  ident: b34
  article-title: A taxonomy, survey on placement of virtual machines in cloud
  publication-title: 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS)
– volume: 7
  start-page: 337
  year: 2005
  end-page: 358
  ident: b62
  article-title: Propagation models for trust and distrust in social networks
  publication-title: Inf. Syst. Front.
– volume: 21
  start-page: 16
  year: 2017
  end-page: 24
  ident: b41
  article-title: Fog orchestration for internet of things services
  publication-title: IEEE Internet Comput.
– volume: 10
  start-page: 929
  year: 2017
  end-page: 941
  ident: b38
  article-title: Cost effective, reliable and secure workflow deployment over federated clouds
  publication-title: IEEE Trans. Serv. Comput.
– reference: D. Rahbari, M. Nickray, Scheduling of fog networks with optimized knapsack by symbiotic organisms search, in: 2017 21st Conference of Open Innovations Association, FRUCT, 2017, pp. 278–283.
– volume: 74
  start-page: 302
  year: 2017
  end-page: 312
  ident: b26
  article-title: Towards a trust evaluation middleware for cloud service selection
  publication-title: Future Gener. Comput. Syst.
– start-page: 316
  year: 2018
  end-page: 322
  ident: b70
  article-title: Security analysis of smart contracts in datalog
  publication-title: International Symposium on Leveraging Applications of Formal Methods
– volume: 3
  start-page: 595
  year: 2010
  end-page: 610
  ident: b31
  article-title: Semiring-based frameworks for trust propagation in small-world networks and coalition formation criteria
  publication-title: Secur. Commun. Netw.
– volume: 1
  start-page: 47
  year: 2014
  end-page: 57
  ident: b53
  article-title: Co-locating services in IoT systems to minimize the communication energy cost
  publication-title: J. Innov. Digit. Ecosyst.
– year: 2018
  ident: b6
  article-title: A lightweight decentralized service placement policy for performance optimization in fog computing
  publication-title: J. Ambient Intell. Humaniz. Comput.
– start-page: 68
  year: 2018
  end-page: 77
  ident: b44
  article-title: Deploying Fog Applications: How Much Does It Cost, By the Way?
  publication-title: Proceedings of the 8th International Conference on Cloud Computing and Services Science
– reference: V.B.C. Souza, W. Ramrez, X. Masip-Bruin, E. Marn-Tordera, G. Ren, G. Tashakor, Handling service allocation in combined Fog-cloud scenarios, in: 2016 IEEE International Conference on Communications, ICC, 2016, pp. 1–5.
– volume: 93
  start-page: 1
  year: 2017
  end-page: 10
  ident: b67
  article-title: Utilizing customer satisfaction in ranking prediction for personalized cloud service selection
  publication-title: Decis. Support Syst.
– volume: 34
  start-page: 4077
  year: 2016
  end-page: 4090
  ident: b52
  article-title: IoT-cloud service optimization in next generation smart environments
  publication-title: IEEE J. Sel. Areas Commun.
– start-page: 731
  year: 2016
  end-page: 742
  ident: b14
  article-title: SANA: secure and scalable aggregate network attestation
  publication-title: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security
– year: 2014
  ident: b21
  article-title: EU cloud SLA standardisation guidelines
– start-page: 79
  year: 2018
  end-page: 86
  ident: b4
  article-title: Bonsai in the Fog: An Active Learning Lab with Fog Computing
  publication-title: Fog and Mobile Edge Computing (FMEC), 2018 Third International Conference on
– start-page: 301
  year: 2016
  end-page: 308
  ident: b32
  article-title: Star: Semiring trust inference for trust-aware social recommenders
  publication-title: Proceedings of the 10th ACM Conference on Recommender Systems
– volume: 65
  start-page: 1440
  year: 2016
  end-page: 1452
  ident: b48
  article-title: Cost aware service placement and load dispatching in mobile cloud systems
  publication-title: IEEE Trans. Comput.
– year: 2007
  ident: b29
  article-title: Trust Management for Mobile Computing Platforms
– volume: 5
  start-page: 108
  year: 2017
  end-page: 119
  ident: b49
  article-title: Cost efficient resource management in fog computing supported medical cyber-physical system
  publication-title: IEEE Trans. Emerg. Top. Comput.
– start-page: 275
  year: 2003
  end-page: 280
  ident: b63
  article-title: Attack-resistance of computational trust models
  publication-title: Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003. WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on
– volume: 4
  start-page: 1185
  year: 2017
  end-page: 1192
  ident: b8
  article-title: QoS-Aware Deployment of IoT Applications Through the Fog
  publication-title: IEEE Internet Things J.
– year: 2018
  ident: b54
  article-title: Quality of experience (QoE)-aware placement of applications in Fog computing environments
  publication-title: J. Parallel Distrib. Comput.
– reference: A. Brogi, S. Forti, A. Ibrahim, How to best deploy your Fog applications, probably, in: O. Rana and R. Buyya and A. Anjum (Eds.), Proceedings of 1st IEEE Int. Conference on Fog and Edge Computing, 2017.
– volume: 47
  start-page: 1275
  year: 2017
  end-page: 1296
  ident: b5
  article-title: iFogSim: A toolkit for modeling and simulation of resource management techniques in the Internet of Things, Edge and Fog computing environments
  publication-title: Softw. - Pract. Exp.
– start-page: 69
  year: 2016
  end-page: 80
  ident: b56
  article-title: Optimal operator placement for distributed stream processing applications
  publication-title: Proceedings of the 10th ACM International Conference on Distributed and Event-Based Systems
– volume: 24
  start-page: 318
  year: 2006
  end-page: 328
  ident: b25
  article-title: On trust models and trust evaluation metrics for ad-hoc networks
  publication-title: IEEE J. Sel. Areas Commun.
– start-page: 191
  year: 2019
  end-page: 222
  ident: b3
  article-title: Predictive Analysis to Support Fog Application Deployment
  publication-title: Fog and Edge Computing: Principles and Paradigms
– volume: 65
  start-page: 3702
  year: 2016
  end-page: 3712
  ident: b50
  article-title: Joint optimization of task scheduling and image placement in fog computing supported software-defined embedded system
  publication-title: IEEE Trans. Comput.
– reference: O. Skarlat, M. Nardelli, S. Schulte, S. Dustdar, Towards QoS-aware fog service placement, in: 2017 IEEE 1st International Conference on Fog and Edge Computing, ICFEC, 2017, pp. 89–96.
– year: 2019
  ident: b20
  article-title: OpenFog consortium
– start-page: 18
  year: 2016
  end-page: 25
  ident: b36
  article-title: Obfuscating a business process by splitting its logic with fake fragments for securing a multi-cloud deployment
  publication-title: Services (SERVICES), 2016 IEEE World Congress on
– start-page: 103
  year: 2007
  end-page: 117
  ident: b60
  article-title: Trust management
  publication-title: Security, Privacy, and Trust in Modern Data Management
– start-page: 114
  year: 2002
  ident: 10.1016/j.future.2019.08.020_b61
  article-title: Design of a role-based trust-management framework
– year: 2018
  ident: 10.1016/j.future.2019.08.020_b6
  article-title: A lightweight decentralized service placement policy for performance optimization in fog computing
  publication-title: J. Ambient Intell. Humaniz. Comput.
– volume: 100
  start-page: 5
  issue: 1
  year: 2015
  ident: 10.1016/j.future.2019.08.020_b18
  article-title: Probabilistic (logic) programming concepts
  publication-title: Mach. Learn.
  doi: 10.1007/s10994-015-5494-z
– volume: 15
  start-page: 442
  issue: 2
  year: 2003
  ident: 10.1016/j.future.2019.08.020_b24
  article-title: Determining semantic similarity among entity classes from different ontologies
  publication-title: IEEE Trans. Knowl. Data Eng.
  doi: 10.1109/TKDE.2003.1185844
– year: 2017
  ident: 10.1016/j.future.2019.08.020_b13
  article-title: Securing fog computing for internet of things applications: Challenges and solutions
  publication-title: IEEE Commun. Surv. Tutor.
– year: 2018
  ident: 10.1016/j.future.2019.08.020_b55
  article-title: A methodology for deployment of IoT application in fog
  publication-title: J. Ambient Intell. Humaniz. Comput.
– start-page: 275
  year: 2003
  ident: 10.1016/j.future.2019.08.020_b63
  article-title: Attack-resistance of computational trust models
– start-page: 316
  year: 2018
  ident: 10.1016/j.future.2019.08.020_b70
  article-title: Security analysis of smart contracts in datalog
– year: 2019
  ident: 10.1016/j.future.2019.08.020_b20
– volume: 82
  start-page: 152
  year: 2017
  ident: 10.1016/j.future.2019.08.020_b47
  article-title: MIST: Fog-based data analytics scheme with cost-efficient resource provisioning for IoT crowdsensing applications
  publication-title: J. Netw. Comput. Appl.
  doi: 10.1016/j.jnca.2017.01.012
– volume: 65
  start-page: 1440
  issue: 5
  year: 2016
  ident: 10.1016/j.future.2019.08.020_b48
  article-title: Cost aware service placement and load dispatching in mobile cloud systems
  publication-title: IEEE Trans. Comput.
  doi: 10.1109/TC.2015.2435781
– volume: 1
  start-page: 47
  issue: 1–2
  year: 2014
  ident: 10.1016/j.future.2019.08.020_b53
  article-title: Co-locating services in IoT systems to minimize the communication energy cost
  publication-title: J. Innov. Digit. Ecosyst.
  doi: 10.1016/j.jides.2015.02.005
– start-page: 307
  year: 2014
  ident: 10.1016/j.future.2019.08.020_b37
  article-title: A security risk assessment model for business process deployment in the cloud
– year: 2019
  ident: 10.1016/j.future.2019.08.020_b11
– volume: 93
  start-page: 1
  year: 2017
  ident: 10.1016/j.future.2019.08.020_b67
  article-title: Utilizing customer satisfaction in ranking prediction for personalized cloud service selection
  publication-title: Decis. Support Syst.
  doi: 10.1016/j.dss.2016.09.001
– year: 2018
  ident: 10.1016/j.future.2019.08.020_b54
  article-title: Quality of experience (QoE)-aware placement of applications in Fog computing environments
  publication-title: J. Parallel Distrib. Comput.
– volume: 5
  start-page: 19293
  year: 2017
  ident: 10.1016/j.future.2019.08.020_b23
  article-title: Security and privacy in fog computing: Challenges
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2017.2749422
– ident: 10.1016/j.future.2019.08.020_b9
  doi: 10.1109/ICFEC.2017.8
– year: 2014
  ident: 10.1016/j.future.2019.08.020_b21
– volume: 5
  start-page: 457
  issue: 3
  year: 2017
  ident: 10.1016/j.future.2019.08.020_b39
  article-title: Quantitative reasoning about cloud security using service level agreements
  publication-title: IEEE Trans. Cloud Comput.
  doi: 10.1109/TCC.2015.2469659
– start-page: 212
  year: 2014
  ident: 10.1016/j.future.2019.08.020_b65
  article-title: A certification-based trust model for autonomic cloud computing systems
– ident: 10.1016/j.future.2019.08.020_b15
  doi: 10.1109/SDS.2019.8768602
– volume: 74
  start-page: 302
  year: 2017
  ident: 10.1016/j.future.2019.08.020_b26
  article-title: Towards a trust evaluation middleware for cloud service selection
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2016.01.009
– year: 2018
  ident: 10.1016/j.future.2019.08.020_b59
  article-title: Migration modeling and learning algorithms for containers in fog computing
  publication-title: IEEE Trans. Serv. Comput.
– volume: 34
  start-page: 151
  issue: 2–3
  year: 2019
  ident: 10.1016/j.future.2019.08.020_b10
  article-title: Mimicking FogDirector Application Management
  publication-title: Software-Intensive Cyber-Physical Systems
  doi: 10.1007/s00450-019-00403-y
– ident: 10.1016/j.future.2019.08.020_b51
  doi: 10.1109/ICC.2016.7511465
– volume: 35
  start-page: 268
  issue: 1
  year: 2012
  ident: 10.1016/j.future.2019.08.020_b64
  article-title: Certification-based trust models in mobile ad hoc networks: A survey and taxonomy
  publication-title: J. Netw. Comput. Appl.
  doi: 10.1016/j.jnca.2011.08.008
– volume: 65
  start-page: 3702
  issue: 12
  year: 2016
  ident: 10.1016/j.future.2019.08.020_b50
  article-title: Joint optimization of task scheduling and image placement in fog computing supported software-defined embedded system
  publication-title: IEEE Trans. Comput.
  doi: 10.1109/TC.2016.2536019
– volume: 47
  start-page: 1275
  issue: 9
  year: 2017
  ident: 10.1016/j.future.2019.08.020_b5
  article-title: iFogSim: A toolkit for modeling and simulation of resource management techniques in the Internet of Things, Edge and Fog computing environments
  publication-title: Softw. - Pract. Exp.
  doi: 10.1002/spe.2509
– start-page: 79
  year: 2018
  ident: 10.1016/j.future.2019.08.020_b4
  article-title: Bonsai in the Fog: An Active Learning Lab with Fog Computing
– volume: 24
  start-page: 318
  issue: LCA-ARTICLE-2007-016
  year: 2006
  ident: 10.1016/j.future.2019.08.020_b25
  article-title: On trust models and trust evaluation metrics for ad-hoc networks
  publication-title: IEEE J. Sel. Areas Commun.
  doi: 10.1109/JSAC.2005.861390
– ident: 10.1016/j.future.2019.08.020_b57
  doi: 10.23919/FRUCT.2017.8250193
– start-page: 731
  year: 2016
  ident: 10.1016/j.future.2019.08.020_b14
  article-title: SANA: secure and scalable aggregate network attestation
– volume: 7
  start-page: 337
  issue: 4–5
  year: 2005
  ident: 10.1016/j.future.2019.08.020_b62
  article-title: Propagation models for trust and distrust in social networks
  publication-title: Inf. Syst. Front.
  doi: 10.1007/s10796-005-4807-3
– start-page: 133
  year: 2015
  ident: 10.1016/j.future.2019.08.020_b2
  article-title: IoT and microservices
– volume: 45
  start-page: 37
  issue: 5
  year: 2015
  ident: 10.1016/j.future.2019.08.020_b16
  article-title: Edge-centric computing: Vision and challenges
  publication-title: ACM SIGCOMM Comput. Commun. Rev.
  doi: 10.1145/2831347.2831354
– start-page: 103
  year: 2007
  ident: 10.1016/j.future.2019.08.020_b60
  article-title: Trust management
– year: 2017
  ident: 10.1016/j.future.2019.08.020_b66
  article-title: A semi-automatic and trustworthy scheme for continuous cloud service certification
  publication-title: IEEE Trans. Serv. Comput.
– ident: 10.1016/j.future.2019.08.020_b40
  doi: 10.1109/ICFEC.2017.20
– volume: 5
  start-page: 108
  issue: 1
  year: 2017
  ident: 10.1016/j.future.2019.08.020_b49
  article-title: Cost efficient resource management in fog computing supported medical cyber-physical system
  publication-title: IEEE Trans. Emerg. Top. Comput.
  doi: 10.1109/TETC.2015.2508382
– ident: 10.1016/j.future.2019.08.020_b7
  doi: 10.1109/ICFEC.2017.12
– start-page: 1128
  year: 2008
  ident: 10.1016/j.future.2019.08.020_b30
  article-title: Weighted datalog and levels of trust
– year: 2018
  ident: 10.1016/j.future.2019.08.020_b12
– volume: 34
  start-page: 4077
  issue: 12
  year: 2016
  ident: 10.1016/j.future.2019.08.020_b52
  article-title: IoT-cloud service optimization in next generation smart environments
  publication-title: IEEE J. Sel. Areas Commun.
  doi: 10.1109/JSAC.2016.2621398
– year: 2018
  ident: 10.1016/j.future.2019.08.020_b1
– ident: 10.1016/j.future.2019.08.020_b45
  doi: 10.1109/APNOMS.2016.7737202
– start-page: 69
  year: 2016
  ident: 10.1016/j.future.2019.08.020_b56
  article-title: Optimal operator placement for distributed stream processing applications
– volume: 8
  start-page: 369
  issue: 3
  year: 2015
  ident: 10.1016/j.future.2019.08.020_b68
  article-title: CCCloud: Context-aware and credible cloud service selection based on subjective assessment and objective assessment
  publication-title: IEEE Trans. Serv. Comput.
  doi: 10.1109/TSC.2015.2413111
– start-page: 2054
  year: 2017
  ident: 10.1016/j.future.2019.08.020_b34
  article-title: A taxonomy, survey on placement of virtual machines in cloud
– ident: 10.1016/j.future.2019.08.020_b69
– volume: 5
  start-page: 2514
  year: 2017
  ident: 10.1016/j.future.2019.08.020_b43
  article-title: Online placement of multi-component applications in edge computing environments
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2017.2665971
– year: 2015
  ident: 10.1016/j.future.2019.08.020_b28
– year: 2018
  ident: 10.1016/j.future.2019.08.020_b22
  article-title: Security-aware SaaS placement using swarm intelligence
  publication-title: J. Softw.: Evol. Process
– year: 2007
  ident: 10.1016/j.future.2019.08.020_b29
– start-page: 18
  year: 2016
  ident: 10.1016/j.future.2019.08.020_b36
  article-title: Obfuscating a business process by splitting its logic with fake fragments for securing a multi-cloud deployment
– year: 2018
  ident: 10.1016/j.future.2019.08.020_b42
  article-title: Latency-aware application module management for fog computing environments
  publication-title: ACM Trans. Internet Technol. (TOIT)
– volume: 3
  start-page: 595
  issue: 6
  year: 2010
  ident: 10.1016/j.future.2019.08.020_b31
  article-title: Semiring-based frameworks for trust propagation in small-world networks and coalition formation criteria
  publication-title: Secur. Commun. Netw.
  doi: 10.1002/sec.252
– start-page: 301
  year: 2016
  ident: 10.1016/j.future.2019.08.020_b32
  article-title: Star: Semiring trust inference for trust-aware social recommenders
– volume: 1073
  start-page: 168
  year: 2019
  ident: 10.1016/j.future.2019.08.020_b27
  article-title: Optimising QoS-assurance, Resource Usage and Cost of Fog Application Deployments
– start-page: 13
  year: 2019
  ident: 10.1016/j.future.2019.08.020_b58
  article-title: Meet Genetic Algorithms in Monte Carlo: Optimised Placement of Multi-Service Applications in the Fog
– ident: 10.1016/j.future.2019.08.020_b17
– ident: 10.1016/j.future.2019.08.020_b33
  doi: 10.1609/aaai.v25i1.7852
– volume: 10
  start-page: 929
  issue: 6
  year: 2017
  ident: 10.1016/j.future.2019.08.020_b38
  article-title: Cost effective, reliable and secure workflow deployment over federated clouds
  publication-title: IEEE Trans. Serv. Comput.
  doi: 10.1109/TSC.2016.2543719
– volume: 103
  start-page: 198
  year: 2015
  ident: 10.1016/j.future.2019.08.020_b19
  article-title: Automatic deployment of distributed software systems: Definitions and state of the art
  publication-title: J. Syst. Softw.
  doi: 10.1016/j.jss.2015.01.040
– volume: 4
  start-page: 1185
  issue: 5
  year: 2017
  ident: 10.1016/j.future.2019.08.020_b8
  article-title: QoS-Aware Deployment of IoT Applications Through the Fog
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2017.2701408
– start-page: 191
  year: 2019
  ident: 10.1016/j.future.2019.08.020_b3
  article-title: Predictive Analysis to Support Fog Application Deployment
– volume: 21
  start-page: 16
  issue: 2
  year: 2017
  ident: 10.1016/j.future.2019.08.020_b41
  article-title: Fog orchestration for internet of things services
  publication-title: IEEE Internet Comput.
  doi: 10.1109/MIC.2017.36
– start-page: 296
  year: 2017
  ident: 10.1016/j.future.2019.08.020_b35
  article-title: Using risk patterns to identify violations of data protection policies in cloud systems
– ident: 10.1016/j.future.2019.08.020_b46
  doi: 10.23919/INM.2017.7987464
– start-page: 68
  year: 2018
  ident: 10.1016/j.future.2019.08.020_b44
  article-title: Deploying Fog Applications: How Much Does It Cost, By the Way?
SSID ssj0001731
Score 2.4680483
Snippet Assessing the security level of IoT applications to be deployed to heterogeneous Cloud-Edge infrastructures operated by different providers is a non-trivial...
SourceID crossref
elsevier
SourceType Enrichment Source
Index Database
Publisher
StartPage 775
SubjectTerms Declarative programming
Probabilistic reasoning
Secure application deployment
Title Secure Cloud-Edge Deployments, with Trust
URI https://dx.doi.org/10.1016/j.future.2019.08.020
Volume 102
WOSCitedRecordID wos000501936300064&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Elsevier SD Freedom Collection Journals 2021
  customDbUrl:
  eissn: 1872-7115
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0001731
  issn: 0167-739X
  databaseCode: AIEXJ
  dateStart: 19950201
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LS8QwEA66evDiW3zTgxfRSDbpdpKjrCsqIoIr7K3spqmsaCu6K_58J026LSo-Dl5KKW3adL7OTKYz8xGyFzVNH4ERUg79lIYy0hTFHNm2lVKLMGmxyJFNwNWV7PXUtW-o8FLQCUCWybc39fSvosZjKGxbOvsHcU8GxQO4j0LHLYodt78SfBFBNwfth3yc0I6txjoxltX30aVMtF3otWtrLeqe6WnRXMQyKhsPCu0JH3y356pQJPc5ADcjk_azvBaStivvItKOoKOX4-HdsLbcvxv6bgWoRvJ6tIGzWrTBByBRsYIo6G8rDcp4TQeCo0Lx5hQca98nTe2CBvdHrnWKzbFTRS9VzirLVP6N_2CwJmmEZYbafexGie0osaXV5GyazHBoKdkgM8fnnd7FxDw3wZNU-omU9ZRF0t_np_naX6n5IN1FMu8XD8GxE_oSmTLZMlkoiTkCr6dXyL7DQFBhIKhh4DCwCAgKBKyS29NOt31GPScG1egqj6g0jKeQyoGxXIppytB_FqyvQRicgQnRdmmUW0sOUogSzcQAFIhBC5TU-Nk1xRppZHlm1kmAmpqrCBIltA45fpvKGFTRCaQqUkKoDSLKmcfaN4y3vCUP8XfvfYPQyVVPrmHKD-dD-VJj7_Q5Zy5GpHx75eYf77RF5ipEb5PG6Hlsdsisfh0NX553PUzeAd5Zdzs
linkProvider Elsevier
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Secure+Cloud-Edge+Deployments%2C+with+Trust&rft.jtitle=Future+generation+computer+systems&rft.au=Forti%2C+Stefano&rft.au=Ferrari%2C+Gian-Luigi&rft.au=Brogi%2C+Antonio&rft.date=2020-01-01&rft.issn=0167-739X&rft.volume=102&rft.spage=775&rft.epage=788&rft_id=info:doi/10.1016%2Fj.future.2019.08.020&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_future_2019_08_020
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0167-739X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0167-739X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0167-739X&client=summon