{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T16:10:08Z","timestamp":1751731808094,"version":"3.41.0"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319948447"},{"type":"electronic","value":"9783319948454"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-94845-4_15","type":"book-chapter","created":{"date-parts":[[2018,7,5]],"date-time":"2018-07-05T02:37:27Z","timestamp":1530758247000},"page":"168-180","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["A Security Framework for Fog Networks Based on Role-Based Access Control and\u00a0Trust Models"],"prefix":"10.1007","author":[{"given":"Farhoud","family":"Hosseinpour","sequence":"first","affiliation":[]},{"given":"Ali Shuja","family":"Siddiqui","sequence":"additional","affiliation":[]},{"given":"Juha","family":"Plosila","sequence":"additional","affiliation":[]},{"given":"Hannu","family":"Tenhunen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,6]]},"reference":[{"issue":"4","key":"15_CR1","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/1721654.1721672","volume":"53","author":"M Armbrust","year":"2010","unstructured":"Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M.: A view of cloud computing. Commun. ACM 53(4), 50\u201358 (2010)","journal-title":"Commun. ACM"},{"doi-asserted-by":"crossref","unstructured":"Rimal, B.P., Choi, E., Lumb, I.: A taxonomy and survey of cloud computing systems. In: 2009 Fifth International Joint Conference on INC, IMS and IDC, pp. 44\u201351. IEEE (2009)","key":"15_CR2","DOI":"10.1109\/NCM.2009.218"},{"issue":"2","key":"15_CR3","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/MCOM.2017.1600435CM","volume":"55","author":"P Schulz","year":"2017","unstructured":"Schulz, P., Matthe, M., Klessig, H., Simsek, M., Fettweis, G., Ansari, J., Ashraf, S.A., Almeroth, B., Voigt, J., Riedel, I., Puschmann, A., Mitschele-Thiel, A., Muller, M., Elste, T., Windisch, M.: Latency critical IoT applications in 5G: perspective on the design of radio interface and network architecture. IEEE Commun. Mag. 55(2), 70\u201378 (2017)","journal-title":"IEEE Commun. Mag."},{"doi-asserted-by":"crossref","unstructured":"Bonomi, F., Milito, R., Zhu, J., Addepalli, S.: Fog computing and its role in the Internet of Things. In: Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, ser. MCC 2012, pp. 13\u201316. ACM, New York (2012)","key":"15_CR4","DOI":"10.1145\/2342509.2342513"},{"key":"15_CR5","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/978-3-319-11227-5_22","volume-title":"Intelligent Distributed Computing","author":"VK Sehgal","year":"2015","unstructured":"Sehgal, V.K., Patrick, A., Soni, A., Rajput, L.: Smart human security framework using Internet of Things, cloud and fog computing. In: Buyya, R., Thampi, S.M. (eds.) Intelligent Distributed Computing. AISC, vol. 321, pp. 251\u2013263. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-11227-5_22"},{"issue":"5","key":"15_CR6","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1109\/JIOT.2016.2579198","volume":"3","author":"W Shi","year":"2016","unstructured":"Shi, W., Zhang, Q., Li, Y., Xu, L.: Edge computing: vision and challenges. IEEE Internet Things J. 3(5), 637\u2013646 (2016)","journal-title":"IEEE Internet Things J."},{"unstructured":"Sandvine Intelligent Broadband Networks: 2016 global internet phenomena report, Latin America & North America. Sandvine - Intelligent Broadband Networks, Technical report (2016)","key":"15_CR7"},{"unstructured":"MacLean, J.: Households now use an average of seven connected devices every day. Cantech Letter, Technical report (2016)","key":"15_CR8"},{"doi-asserted-by":"crossref","unstructured":"Falaki, H., Mahajan, R., Estrin, D.: SystemSens: a tool for monitoring usage in smartphone research deployments. In: Proceedings of the Sixth International Workshop on MobiArch, ser. MobiArch 2011, pp. 25\u201330. ACM, New York (2011)","key":"15_CR9","DOI":"10.1145\/1999916.1999923"},{"key":"15_CR10","first-page":"97","volume":"22","author":"K Ashton","year":"2009","unstructured":"Ashton, K.: That \u2018Internet of Things\u2019 thing. RFiD J. 22, 97\u2013114 (2009)","journal-title":"RFiD J."},{"unstructured":"Manyika, J., Chui, M., Brown, B., Bughin, J., Dobbs, R., Roxburgh, C., Byers, A.: Big data: the next frontier for innovation, competition, and productivity. McKinsey Global Institute (2011)","key":"15_CR11"},{"issue":"5","key":"15_CR12","first-page":"48","volume":"8","author":"F Hosseinpour","year":"2016","unstructured":"Hosseinpour, F., Meng, Y., Westerlund, T., Plosila, J., Liu, R., Tenhunen, H.: A review on fog computing systems. Int. J. Adv. Comput. Technol. (IJACT) 8(5), 48\u201361 (2016)","journal-title":"Int. J. Adv. Comput. Technol. (IJACT)"},{"doi-asserted-by":"crossref","unstructured":"Bellavista, P., Zanni, A.: Feasibility of fog computing deployment based on Docker containerization over RaspberryPi. In: Proceedings of the 18th International Conference on Distributed Computing and Networking, ser. ICDCN 2017, pp. 16:1\u201316:10. ACM, New York (2017)","key":"15_CR13","DOI":"10.1145\/3007748.3007777"},{"doi-asserted-by":"crossref","unstructured":"Oueis, J., Strinati, E.C., Barbarossa, S.: The fog balancing: load distribution for small cell cloud computing. In: 2015 IEEE 81st Vehicular Technology Conference (VTC Spring), pp. 1\u20136 (2015)","key":"15_CR14","DOI":"10.1109\/VTCSpring.2015.7146129"},{"key":"15_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1007\/978-3-319-21837-3_67","volume-title":"Wireless Algorithms, Systems, and Applications","author":"S Yi","year":"2015","unstructured":"Yi, S., Qin, Z., Li, Q.: Security and privacy issues of fog computing: a survey. In: Xu, K., Zhu, H. (eds.) WASA 2015. LNCS, vol. 9204, pp. 685\u2013695. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-21837-3_67"},{"issue":"3","key":"15_CR16","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1016\/j.comcom.2010.02.013","volume":"34","author":"S Misra","year":"2011","unstructured":"Misra, S., Vaish, A.: Reputation-based role assignment for role-based access control in wireless sensor networks. Comput. Commun. 34(3), 281\u2013294 (2011)","journal-title":"Comput. Commun."},{"key":"15_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/978-3-319-33331-1_2","volume-title":"Critical Information Infrastructures Security","author":"S Salonikias","year":"2016","unstructured":"Salonikias, S., Mavridis, I., Gritzalis, D.: Access control issues in utilizing fog computing for transport infrastructure. In: Rome, E., Theocharidou, M., Wolthusen, S. (eds.) CRITIS 2015. LNCS, vol. 9578, pp. 15\u201326. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-33331-1_2"},{"doi-asserted-by":"crossref","unstructured":"House, T.: Mobile secure role based access control (MS-Ro-BAC) device. In: Proceedings of the SoutheastCon, pp. 542\u2013546. IEEE, April 2005","key":"15_CR18","DOI":"10.1109\/SECON.2005.1423302"},{"issue":"1","key":"15_CR19","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/s10479-013-1380-x","volume":"233","author":"P Manuel","year":"2015","unstructured":"Manuel, P.: A trust model of cloud computing based on quality of service. Ann. Oper. Res. 233(1), 281\u2013292 (2015)","journal-title":"Ann. Oper. Res."}],"container-title":["Lecture Notes in Business Information Processing","Research and Practical Issues of Enterprise Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-94845-4_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T15:34:01Z","timestamp":1751729641000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-94845-4_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319948447","9783319948454"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-94845-4_15","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"6 July 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CONFENIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Research and Practical Issues of Enterprise Information Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shanghai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 October 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"confenis2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}