{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T10:29:37Z","timestamp":1768904977597,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T00:00:00Z","timestamp":1743379200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Agence Nationale de la Recherche Technologique (ANRT)","award":["CIFRE 2021\/0037"],"award-info":[{"award-number":["CIFRE 2021\/0037"]}]},{"name":"Agence Nationale de la Recherche (ANR)","award":["ANR-20-CE25- 0017 (SeMaFoR project)"],"award-info":[{"award-number":["ANR-20-CE25- 0017 (SeMaFoR project)"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,3,31]]},"DOI":"10.1145\/3672608.3707854","type":"proceedings-article","created":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T18:26:21Z","timestamp":1747247181000},"page":"1674-1691","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["VeriFogOps: Automated Deployment Tool Selection and CI\/CD Pipeline Generation for Verifying Fog Systems at Deployment Time"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-3271-298X","authenticated-orcid":false,"given":"Hiba","family":"Awad","sequence":"first","affiliation":[{"name":"IMT Atlantique, LS2N (CNRS), Inria Rennes, Smile, Asni\u00e8res-sur-Seine and Nantes, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6136-6757","authenticated-orcid":false,"given":"Thomas","family":"Ledoux","sequence":"additional","affiliation":[{"name":"IMT Atlantique, LS2N (CNRS), Inria Rennes, Nantes, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5987-2175","authenticated-orcid":false,"given":"Hugo","family":"Bruneliere","sequence":"additional","affiliation":[{"name":"IMT Atlantique, LS2N (CNRS), Nantes, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3779-556X","authenticated-orcid":false,"given":"Jonathan","family":"Rivalan","sequence":"additional","affiliation":[{"name":"Smile, Asni\u00e8res-sur-Seine, France"}]}],"member":"320","published-online":{"date-parts":[[2025,5,14]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2022.08.010"},{"key":"e_1_3_2_1_2_1","volume-title":"Continuous Integration and Continuous Delivery Pipeline Automation for Agile Software Project Management. In 2018 Moratuwa Engineering Research Conference (MERCon). IEEE","author":"Arachchi SAIBS","year":"2018","unstructured":"SAIBS Arachchi and Indika Perera. 2018. Continuous Integration and Continuous Delivery Pipeline Automation for Agile Software Project Management. In 2018 Moratuwa Engineering Research Conference (MERCon). IEEE, Piscataway, New Jersey, United States, 156\u2013161."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2015.01.040"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1721654.1721672"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3605098.3635973"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3699839.3699841"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2950950"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3154448.3154453"},{"key":"e_1_3_2_1_9_1","volume-title":"CloudCAMP: Automating the Deployment and Management of Cloud Services. In 2018 IEEE International Conference on Services Computing (SCC). IEEE","author":"Bhattacharjee Anirban","year":"2018","unstructured":"Anirban Bhattacharjee, Yogesh Barve, Aniruddha Gokhale, and Takayuki Kuroda. 2018. CloudCAMP: Automating the Deployment and Management of Cloud Services. In 2018 IEEE International Conference on Services Computing (SCC). IEEE, Piscataway, New Jersey, United States, 237\u2013240."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2701408"},{"key":"e_1_3_2_1_11_1","volume-title":"Pre-deployment Security Assessment for Cloud Services Through Semantic Reasoning","author":"Cauli Claudia","unstructured":"Claudia Cauli, Meng Li, Nir Piterman, and Oksana Tkachuk. 2021. Pre-deployment Security Assessment for Cloud Services Through Semantic Reasoning. In Computer Aided Verification, Alexandra Silva and K. Rustan M. Leino (Eds.). Springer International Publishing, Cham, 767\u2013780."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2016.68"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2509"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2019.01.003"},{"key":"e_1_3_2_1_15_1","volume-title":"Li Da Xu, and Shanshan Zhao","author":"Li Shancang","year":"2015","unstructured":"Shancang Li, Li Da Xu, and Shanshan Zhao. 2015. The Internet of Things: a Survey. Information systems frontiers 17 (2015), 243\u2013259."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2771153"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2019.102033"},{"key":"e_1_3_2_1_18_1","volume-title":"Challenges and Solutions when Adopting DevSecOps: A Systematic Review. Information and software technology 141","author":"Rajapakse Roshan N","year":"2022","unstructured":"Roshan N Rajapakse, Mansooreh Zahedi, M Ali Babar, and Haifeng Shen. 2022. Challenges and Solutions when Adopting DevSecOps: A Systematic Review. Information and software technology 141 (2022), 106700."},{"key":"e_1_3_2_1_19_1","volume-title":"Frank Fransen, and Fatih Turkmen.","author":"Rangnau Thorsten","year":"2020","unstructured":"Thorsten Rangnau, Remco v. Buijtenen, Frank Fransen, and Fatih Turkmen. 2020. Continuous Security Testing: A Case Study on Integrating Dynamic Security Testing Tools in CI\/CD Pipelines. In 2020 IEEE 24th International Enterprise Distributed Object Computing Conference (EDOC). IEEE, Piscataway, New Jersey, United States, 145\u2013154."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICACRS58579.2023.10404436"},{"key":"e_1_3_2_1_21_1","first-page":"445","article-title":"Automating software code deployment using continuous integration and continuous delivery pipeline for business intelligence solutions","volume":"2","author":"Sethi Farhana","year":"2020","unstructured":"Farhana Sethi. 2020. Automating software code deployment using continuous integration and continuous delivery pipeline for business intelligence solutions. International Journal of Innovation Scientific Research and Review 2 (2020), 445\u2013449. Issue 10.","journal-title":"International Journal of Innovation Scientific Research and Review"},{"key":"e_1_3_2_1_22_1","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Shevrin Ilia","year":"2023","unstructured":"Ilia Shevrin and Oded Margalit. 2023. Detecting Multi-Step IAM Attacks in AWS Environments via Model Checking. In 32nd USENIX Security Symposium (USENIX Security 23). ACM, Anaheim, CA, 6025\u20136042."},{"key":"e_1_3_2_1_23_1","volume-title":"Edge Computing: Vision and challenges","author":"Shi Weisong","year":"2016","unstructured":"Weisong Shi, Jie Cao, Quan Zhang, Youhuizi Li, and Lanyu Xu. 2016. Edge Computing: Vision and challenges. IEEE internet of things journal 3, 5 (2016), 637\u2013646."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2023.3274349"},{"key":"e_1_3_2_1_25_1","first-page":"9","article-title":"Shift-Left Testing","volume":"26","author":"Smith Larry","year":"2001","unstructured":"Larry Smith. 2001. Shift-Left Testing. Dr. Dobb's Journal 26, 9 (Sept. 2001), 56, 62.","journal-title":"Dr. Dobb's Journal"},{"key":"e_1_3_2_1_26_1","volume-title":"Towards Pre-Deployment Detection of Performance Failures in Cloud Distributed Systems. In 7th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 15)","author":"Suminto Riza O.","unstructured":"Riza O. Suminto, Agung Laksono, Anang D. Satria, Thanh Do, and Haryadi S. Gunawi. 2015. Towards Pre-Deployment Detection of Performance Failures in Cloud Distributed Systems. In 7th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 15). USENIX Association, Santa Clara, CA, 8."},{"key":"e_1_3_2_1_27_1","volume-title":"14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20)","author":"Sun Xudong","year":"2020","unstructured":"Xudong Sun, Runxiang Cheng, Jianyan Chen, Elaine Ang, Owolabi Legunsen, and Tianyin Xu. 2020. Testing Configuration Changes in Context to Prevent Production Failures. In 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20). ACM, New York, New York, United States, 735\u2013751."},{"key":"e_1_3_2_1_28_1","volume-title":"Shift Left Testing Paradigm Process Implementation for Quality of Software Based on Fuzzy. Soft Computing Online","author":"Vaddadi Srinivas Aditya","year":"2023","unstructured":"Srinivas Aditya Vaddadi, Ramya Thatikonda, Adithya Padthe, and Pandu Ranga Rao Arnepalli. 2023. Shift Left Testing Paradigm Process Implementation for Quality of Software Based on Fuzzy. Soft Computing Online (2023), 1\u201313."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJFC.2020010102"},{"key":"e_1_3_2_1_30_1","volume-title":"Fogernetes: Deployment and Management of Fog Computing Applications. In NOMS 2018 - 2018 IEEE\/IFIP Network Operations and Management Symposium. IEEE","author":"W\u00f6bker Cecil","year":"2018","unstructured":"Cecil W\u00f6bker, Andreas Seitz, Harald Mueller, and Bernd Bruegge. 2018. Fogernetes: Deployment and Management of Fog Computing Applications. In NOMS 2018 - 2018 IEEE\/IFIP Network Operations and Management Symposium. IEEE, Piscataway, New Jersey, United States, 1\u20137."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2019.02.009"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME52107.2021.00048"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.07.027"}],"event":{"name":"SAC '25: 40th ACM\/SIGAPP Symposium on Applied Computing","location":"Catania International Airport Catania Italy","acronym":"SAC '25","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"]},"container-title":["Proceedings of the 40th ACM\/SIGAPP Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672608.3707854","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3672608.3707854","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:57:33Z","timestamp":1750298253000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672608.3707854"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,31]]},"references-count":33,"alternative-id":["10.1145\/3672608.3707854","10.1145\/3672608"],"URL":"https:\/\/doi.org\/10.1145\/3672608.3707854","relation":{},"subject":[],"published":{"date-parts":[[2025,3,31]]},"assertion":[{"value":"2025-05-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}