{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T22:06:42Z","timestamp":1757455602015,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030954833"},{"type":"electronic","value":"9783030954840"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-95484-0_18","type":"book-chapter","created":{"date-parts":[[2022,2,7]],"date-time":"2022-02-07T10:05:46Z","timestamp":1644228346000},"page":"296-316","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Security- and\u00a0Privacy-Aware IoT Application Placement and\u00a0User Assignment"],"prefix":"10.1007","author":[{"given":"Zolt\u00e1n \u00c1d\u00e1m","family":"Mann","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,8]]},"reference":[{"key":"18_CR1","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1016\/j.future.2019.05.005","volume":"100","author":"A Agarwal","year":"2019","unstructured":"Agarwal, A., Duong, T.N.B.: Secure virtual machine placement in cloud data centers. Fut. Gene. Comput. Syst. 100, 210\u2013222 (2019)","journal-title":"Fut. Gene. Comput. Syst."},{"issue":"2","key":"18_CR2","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MIC.2017.37","volume":"21","author":"A Alrawais","year":"2017","unstructured":"Alrawais, A., Alhothaily, A., Hu, C., Cheng, X.: Fog computing for the Internet of Things: security and privacy issues. IEEE Internet Comput. 21(2), 34\u201342 (2017)","journal-title":"IEEE Internet Comput."},{"key":"18_CR3","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/978-3-030-71906-7_17","volume-title":"Advances in Service-Oriented and Cloud Computing","author":"D Ayed","year":"2021","unstructured":"Ayed, D., Jaho, E., Lachner, C., Mann, Z.\u00c1., Seidl, R., Surridge, M.: FogProtect: protecting sensitive data in the computing continuum. In: Zirpins, C., et al. (eds.) ESOCC 2020. CCIS, vol. 1360, pp. 179\u2013184. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-71906-7_17"},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Baresi, L., Mendon\u00e7a, D.F., Garriga, M., Guinea, S., Quattrocchi, G.: A unified model for the mobile-edge-cloud continuum. ACM Trans. Internet Technol. 19(2), 29 (2019)","DOI":"10.1145\/3226644"},{"key":"18_CR5","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1016\/j.future.2020.01.036","volume":"107","author":"J Bellendorf","year":"2020","unstructured":"Bellendorf, J., Mann, Z.\u00c1.: Classification of optimization problems in fog computing. Fut. Gene. Comput. Syst. 107, 158\u2013176 (2020)","journal-title":"Fut. Gene. Comput. Syst."},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Brogi, A., Forti, S., Guerrero, C., Lera, I.: How to place your apps in the fog: state of the art and open challenges. Softw. Pract. Exp. 50(5), 719\u2013740 (2020)","DOI":"10.1002\/spe.2766"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Brogi, A., Forti, S., Ibrahim, A.: Predictive analysis to support fog application deployment. In: Fog and Edge Computing: Principles and Paradigms, pp. 191\u2013222 (2019)","DOI":"10.1002\/9781119525080.ch9"},{"issue":"1","key":"18_CR8","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1109\/TCNS.2020.3024483","volume":"8","author":"M Chamanbaz","year":"2021","unstructured":"Chamanbaz, M., Notarstefano, G., Sasso, F., Bouffanais, R.: Randomized constraints consensus for distributed robust mixed-integer programming. IEEE Transa. Control Netw. Syst. 8(1), 295\u2013306 (2021)","journal-title":"IEEE Transa. Control Netw. Syst."},{"issue":"5","key":"18_CR9","doi-asserted-by":"publisher","first-page":"2795","DOI":"10.1109\/TNET.2015.2487344","volume":"24","author":"X Chen","year":"2015","unstructured":"Chen, X., Jiao, L., Li, W., Fu, X.: Efficient multi-user computation offloading for mobile-edge cloud computing. IEEE\/ACM Trans. Netw. 24(5), 2795\u20132808 (2015)","journal-title":"IEEE\/ACM Trans. Netw."},{"issue":"6","key":"18_CR10","first-page":"1171","volume":"3","author":"R Deng","year":"2016","unstructured":"Deng, R., Lu, R., Lai, C., Luan, T.H., Liang, H.: Optimal workload allocation in fog-cloud computing toward balanced delay and power consumption. IEEE Internet of Things J. 3(6), 1171\u20131181 (2016)","journal-title":"IEEE Internet of Things J."},{"issue":"3","key":"18_CR11","doi-asserted-by":"publisher","first-page":"946","DOI":"10.1109\/TNSM.2018.2846572","volume":"15","author":"S Dr\u00e4xler","year":"2018","unstructured":"Dr\u00e4xler, S., Karl, H., Mann, Z.\u00c1.: JASPER: Joint optimization of scaling, placement, and routing of virtual network services. IEEE Trans. Netw. Serv. Manag. 15(3), 946\u2013960 (2018)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"issue":"2","key":"18_CR12","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1007\/s10270-012-0262-z","volume":"13","author":"W Fdhila","year":"2014","unstructured":"Fdhila, W., Dumas, M., Godart, C., Garc\u00eda-Ba\u00f1uelos, L.: Heuristics for composite web service decentralization. Softw. Syst. Model. 13(2), 599\u2013619 (2014)","journal-title":"Softw. Syst. Model."},{"key":"18_CR13","doi-asserted-by":"publisher","first-page":"775","DOI":"10.1016\/j.future.2019.08.020","volume":"102","author":"S Forti","year":"2020","unstructured":"Forti, S., Ferrari, G.L., Brogi, A.: Secure cloud-edge deployments, with trust. Fut. Gene. Comput. Syst. 102, 775\u2013788 (2020)","journal-title":"Fut. Gene. Comput. Syst."},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"Goettelmann, E., Fdhila, W., Godart, C.: Partitioning and cloud deployment of composite web services under security constraints. In: IEEE International Conference on Cloud Engineering (IC2E), pp. 193\u2013200. IEEE (2013)","DOI":"10.1109\/IC2E.2013.22"},{"key":"18_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1007\/11535706_13","volume-title":"Data and Applications Security XIX","author":"W Jiang","year":"2005","unstructured":"Jiang, W., Clifton, C.: Privacy-preserving distributed k-anonymity. In: Jajodia, S., Wijesekera, D. (eds.) DBSec 2005. LNCS, vol. 3654, pp. 166\u2013177. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11535706_13"},{"key":"18_CR16","volume-title":"Optimization in Computer Engineering-Theory and Applications","author":"Z\u00c1 Mann","year":"2011","unstructured":"Mann, Z.\u00c1.: Optimization in Computer Engineering-Theory and Applications. Scientific Research Publishing, Inc. USA (2011)"},{"key":"18_CR17","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1016\/j.future.2020.03.064","volume":"110","author":"Z\u00c1 Mann","year":"2020","unstructured":"Mann, Z.\u00c1.: Secure software placement and configuration. Fut. Gen. Comput. Syst. 110, 243\u2013253 (2020)","journal-title":"Fut. Gen. Comput. Syst."},{"key":"18_CR18","doi-asserted-by":"crossref","unstructured":"Mann, Z.\u00c1., Metzger, A.: Optimized cloud deployment of multi-tenant software considering data protection concerns. In: 17th IEEE\/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid), pp. 609\u2013618. IEEE (2017)","DOI":"10.1109\/CCGRID.2017.10"},{"key":"18_CR19","doi-asserted-by":"publisher","unstructured":"Massonet, P., Luna, J., Pannetrat, A., Trapero, R.: Idea: Optimising multi-cloud deployments with security controls as constraints. In: International Symposium on Engineering Secure Software and Systems. pp. 102\u2013110. Springer (2015). https:\/\/doi.org\/10.1007\/978-3-319-62105-0","DOI":"10.1007\/978-3-319-62105-0"},{"key":"18_CR20","doi-asserted-by":"crossref","unstructured":"Mezni, H., Sellami, M., Kouki, J.: Security-aware SaaS placement using swarm intelligence. J. Softw. Evol. Process 30(8), e1932 (2018)","DOI":"10.1002\/smr.1932"},{"issue":"8","key":"18_CR21","doi-asserted-by":"publisher","first-page":"1753","DOI":"10.1109\/TPDS.2019.2896115","volume":"30","author":"M Nardelli","year":"2019","unstructured":"Nardelli, M., Cardellini, V., Grassi, V., Presti, F.L.: Efficient operator placement for distributed data stream processing applications. IEEE Trans. Parall. Distrib. Syst. 30(8), 1753\u20131767 (2019)","journal-title":"IEEE Trans. Parall. Distrib. Syst."},{"key":"18_CR22","doi-asserted-by":"crossref","unstructured":"Roman, R., Lopez, J., Mambo, M.: Mobile edge computing, fog et al.: a survey and analysis of security threats and challenges. Fut. Gen. Comput. Syst. 78, 680\u2013698 (2018)","DOI":"10.1016\/j.future.2016.11.009"},{"issue":"4","key":"18_CR23","doi-asserted-by":"publisher","first-page":"3246","DOI":"10.1109\/JIOT.2018.2838022","volume":"5","author":"H Shah-Mansouri","year":"2018","unstructured":"Shah-Mansouri, H., Wong, V.W.: Hierarchical fog-cloud computing for IoT systems: a computation offloading game. IEEE Internet of Things J. 5(4), 3246\u20133257 (2018)","journal-title":"IEEE Internet of Things J."},{"issue":"05","key":"18_CR24","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncert. Fuzziness Knowl.-Based Syst. 10(05), 557\u2013570 (2002)","journal-title":"Int. J. Uncert. Fuzziness Knowl.-Based Syst."},{"key":"18_CR25","doi-asserted-by":"publisher","first-page":"1084","DOI":"10.1016\/j.future.2018.03.028","volume":"108","author":"Y Wen","year":"2020","unstructured":"Wen, Y., Liu, J., Dou, W., Xu, X., Cao, B., Chen, J.: Scheduling workflows with privacy protection constraints for big data applications on cloud. Fut. Gen. Comput. Syst. 108, 1084\u20131091 (2020)","journal-title":"Fut. Gen. Comput. Syst."},{"key":"18_CR26","doi-asserted-by":"crossref","unstructured":"Wen, Z., Cala, J., Watson, P.: A scalable method for partitioning workflows with security requirements over federated clouds. In: IEEE 6th International Conference on Cloud Computing Technology and Science (CloudCom), pp. 122\u2013129 (2014)","DOI":"10.1109\/CloudCom.2014.89"},{"issue":"6","key":"18_CR27","doi-asserted-by":"publisher","first-page":"929","DOI":"10.1109\/TSC.2016.2543719","volume":"10","author":"Z Wen","year":"2017","unstructured":"Wen, Z., Cala, J., Watson, P., Romanovsky, A.: Cost effective, reliable and secure workflow deployment over federated clouds. IEEE Trans. Serv. Comput. 10(6), 929\u2013941 (2017)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"18_CR28","doi-asserted-by":"crossref","unstructured":"Xia, Y., Etchevers, X., Letondeur, L., Coupaye, T., Desprez, F.: Combining hardware nodes and software components ordering-based heuristics for optimizing the placement of distributed IoT applications in the fog. In: Proceedings of the 33rd Annual ACM Symposium on Applied Computing (SAC), pp. 751\u2013760 (2018)","DOI":"10.1145\/3167132.3167215"},{"key":"18_CR29","doi-asserted-by":"crossref","unstructured":"Xiao, Y., Krunz, M.: QoE and power efficiency tradeoff for fog computing networks with fog node cooperation. In: INFOCOM - IEEE Conference on Computer Communications (2017)","DOI":"10.1109\/INFOCOM.2017.8057196"},{"key":"18_CR30","unstructured":"Yuchi, X., Shetty, S.: Enabling security-aware virtual machine placement in IaaS clouds. In: IEEE Military Communications Conference (MILCOM), pp. 1554\u20131559 (2015)"}],"container-title":["Lecture Notes in Computer Science","Computer Security. ESORICS 2021 International Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-95484-0_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,7]],"date-time":"2022-02-07T10:09:10Z","timestamp":1644228550000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-95484-0_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030954833","9783030954840"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-95484-0_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"8 February 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Darmstadt","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 October 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 October 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2021.athene-center.de\/index.php","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"351","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"71","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.07","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6.06","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}