{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T22:17:44Z","timestamp":1776464264203,"version":"3.51.2"},"reference-count":116,"publisher":"Sociedade Brasileira de Computacao - SB","issue":"1","license":[{"start":{"date-parts":[[2018,7,18]],"date-time":"2018-07-18T00:00:00Z","timestamp":1531872000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"FCT - Foundation for Science and Technology","award":["SFRH\/BD\/117538\/2016"],"award-info":[{"award-number":["SFRH\/BD\/117538\/2016"]}]},{"name":"FCT - Foundation for Science and Technology","award":["SFRH\/BD\/119392\/2016"],"award-info":[{"award-number":["SFRH\/BD\/119392\/2016"]}]},{"name":"COMPETE 2020, Operational Program for Competitiveness and Internationalization","award":["P2020 SAICTPAC\/0011\/2015"],"award-info":[{"award-number":["P2020 SAICTPAC\/0011\/2015"]}]},{"name":"CAPES - Coorden\u00e7\u00e3o de Aperfei\u00e7oamento de Pessoal de N\u00edvel Superior","award":["CAPES-FCT\/8572\/14-3"],"award-info":[{"award-number":["CAPES-FCT\/8572\/14-3"]}]},{"name":"FCT - Foundation for Science and Technology","award":["FCT\/13263\/4\/8\/2015\/S"],"award-info":[{"award-number":["FCT\/13263\/4\/8\/2015\/S"]}]},{"name":"CNPq - CAPES - FAPESP","award":["CNPq 465446\/2014-0, CAPES 88887.136422\/2017-00 and FAPESP 2014\/50937-1"],"award-info":[{"award-number":["CNPq 465446\/2014-0, CAPES 88887.136422\/2017-00 and FAPESP 2014\/50937-1"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Internet Serv Appl"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1186\/s13174-018-0086-3","type":"journal-article","created":{"date-parts":[[2018,6,13]],"date-time":"2018-06-13T02:24:09Z","timestamp":1528856649000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":71,"title":["Fog orchestration for the Internet of Everything: state-of-the-art and research challenges"],"prefix":"10.5753","volume":"9","author":[{"given":"Karima","family":"Velasquez","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0167-511X","authenticated-orcid":false,"given":"David Perez","family":"Abreu","sequence":"additional","affiliation":[]},{"given":"Marcio R. M.","family":"Assis","sequence":"additional","affiliation":[]},{"given":"Carlos","family":"Senna","sequence":"additional","affiliation":[]},{"given":"Diego F.","family":"Aranha","sequence":"additional","affiliation":[]},{"given":"Luiz F.","family":"Bittencourt","sequence":"additional","affiliation":[]},{"given":"Nuno","family":"Laranjeiro","sequence":"additional","affiliation":[]},{"given":"Marilia","family":"Curado","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Vieira","sequence":"additional","affiliation":[]},{"given":"Edmundo","family":"Monteiro","sequence":"additional","affiliation":[]},{"given":"Edmundo","family":"Madeira","sequence":"additional","affiliation":[]}],"member":"3742","published-online":{"date-parts":[[2018,7,18]]},"reference":[{"key":"86_CR1","unstructured":"EU Commision. Communication from the Commision to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions. Towards a Thriving Data-Driven Economy. 2014. \n                    http:\/\/bit.ly\/2wIVbVj\n                    \n                  . Accessed 21 Feb 2017."},{"key":"86_CR2","volume-title":"Proceedings of the XXIX Brazilian Symposium on Computer Networks and Distributed Systems (SBRC 2011) - II Workshop de Pesquisa Experimental da Internet do Futuro (WPEIF 2011)","author":"C Senna","year":"2011","unstructured":"Senna C, Batista DM, Soares Junior MA, Madeira ERM, Fonseca NLS. Experiments with a self-management system for virtual networks. In: Proceedings of the XXIX Brazilian Symposium on Computer Networks and Distributed Systems (SBRC 2011) - II Workshop de Pesquisa Experimental da Internet do Futuro (WPEIF 2011). Campo Grande: Brazilian Computer Society (SBC): 2011. p. 7\u201310."},{"issue":"8","key":"86_CR3","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1109\/MC.2016.245","volume":"49","author":"AV Dastjerdi","year":"2016","unstructured":"Dastjerdi AV, Buyya R. Fog computing: Helping the internet of things realize its potential. Computer. 2016; 49(8):112\u20136. \n                    https:\/\/doi.org\/10.1109\/MC.2016.245\n                    \n                  .","journal-title":"Computer"},{"key":"86_CR4","volume-title":"Interoperability and Open-Source Solutions for the Internet of Things","author":"A Kazmi","year":"2017","unstructured":"Kazmi A, Jan Z, Zappa A, Serrano M. Overcoming the heterogeneity in the internet of things for smart cities In: Podnar \u017earko I, Broering A, Soursos S, Serrano M, editors. Interoperability and Open-Source Solutions for the Internet of Things. Cham: Springer: 2017. p. 20\u201335."},{"issue":"November","key":"86_CR5","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1145\/2822875","volume":"2015","author":"CC Byers","year":"2015","unstructured":"Byers CC, Wetterwald P. Fog computing distributing data and intelligence for resiliency and scale necessary for iot: The internet of things (ubiquity symposium). Ubiquity. 2015; 2015(November):4\u20131412. \n                    https:\/\/doi.org\/10.1145\/2822875\n                    \n                  .","journal-title":"Ubiquity"},{"issue":"7","key":"86_CR6","doi-asserted-by":"publisher","first-page":"1645","DOI":"10.1016\/j.future.2013.01.010","volume":"29","author":"J Gubbi","year":"2013","unstructured":"Gubbi J, Buyya R, Marusic S, Palaniswami M. Internet of things (iot): A vision, architectural elements, and future directions. Future Gener Comput Syst. 2013; 29(7):1645\u20131660. \n                    https:\/\/doi.org\/10.1016\/j.future.2013.01.010\n                    \n                  .","journal-title":"Future Gener Comput Syst"},{"key":"86_CR7","unstructured":"ITU-T. Overview ot the Internet of Things: ITU; 2012. \n                    http:\/\/www.itu.int\/rec\/T-REC-Y.2060-201206-I\n                    \n                  . Accessed 29 May 2017."},{"key":"86_CR8","unstructured":"Minerva R, Biru A, Rotondi D. Towards a definition of the internet of things (iot): IEEE; 2015. \n                    http:\/\/bit.ly\/2rMn5uS\n                    \n                  . Accessed 26 Jan 2017."},{"issue":"2","key":"86_CR9","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/S1005-8885(16)60021-3","volume":"23","author":"K Kai","year":"2016","unstructured":"Kai K, Cong W, Tao L. Fog computing for vehicular ad-hoc networks: paradigms, scenarios, and issues. J China Univ Posts Telecommun. 2016; 23(2):56\u201396. \n                    https:\/\/doi.org\/10.1016\/S1005-8885(16)60021-3\n                    \n                  .","journal-title":"J China Univ Posts Telecommun"},{"issue":"1","key":"86_CR10","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/1496091.1496100","volume":"39","author":"LM Vaquero","year":"2008","unstructured":"Vaquero LM, Rodero-Merino L, Caceres J, Lindner M. A break in the clouds: towards a cloud definition. SIGCOMM Comput Commun Rev. 2008; 39(1):50\u20135.","journal-title":"SIGCOMM Comput Commun Rev"},{"key":"86_CR11","unstructured":"Geelan J, Klems M, Cohen R, Kaplan J, Gourlay D, Gaw P, Edwards D, de Haaff B, Kepes B, Sheynkman K, Sultan O, Hartig K, Pritzker J, Doerksen T, von Eicken T, Wallis P, Sheehan M, Dodge D, Ricadela A, Martin B, Kepes B, Berger IW. Twenty-one experts define cloud computing. Electron Mag. 2009. \n                    http:\/\/cloudcomputing.sys-con.com\/node\/612375\n                    \n                  . Accessed 05 Sept 2017."},{"key":"86_CR12","unstructured":"Mell P, Grance T. The NIST definition of cloud computing. Technical report, National Institute of Standards and Technology, Information Technology Laboratory. 2009."},{"key":"86_CR13","unstructured":"Bradley J, Loucks J, Macaulay J, Noronha A. Internet of everything (ioe) value index. Technical report, Cisco Systems Inc. 2013."},{"issue":"15","key":"86_CR14","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori L, Iera A, Morabito G. The internet of things: A survey. Comput Netw. 2010; 54(15):2787\u2013805. \n                    https:\/\/doi.org\/10.1016\/j.comnet.2010.05.010\n                    \n                  .","journal-title":"Comput Netw"},{"issue":"5","key":"86_CR15","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1145\/2677046.2677052","volume":"44","author":"LM Vaquero","year":"2014","unstructured":"Vaquero LM, Rodero-Merino L. Finding your way in the fog: Towards a comprehensive definition of fog computing. SIGCOMM Comput Commun Rev. 2014; 44(5):27\u201332. \n                    https:\/\/doi.org\/10.1145\/2677046.2677052\n                    \n                  .","journal-title":"SIGCOMM Comput Commun Rev"},{"key":"86_CR16","doi-asserted-by":"publisher","DOI":"10.1145\/2757384.2757397","volume-title":"Proceedings of the 2015 Workshop on Mobile Big Data. Mobidata \u201915","author":"S Yi","year":"2015","unstructured":"Yi S, Li C, Li Q. A survey of fog computing: Concepts, applications and issues. In: Proceedings of the 2015 Workshop on Mobile Big Data. Mobidata \u201915. New York: ACM: 2015. p. 37\u201342. \n                    https:\/\/doi.org\/10.1145\/2757384.2757397\n                    \n                  ."},{"key":"86_CR17","doi-asserted-by":"publisher","unstructured":"Yi S, Hao Z, Qin Z, Li Q. Fog computing: Platform and applications. In: 2015 Third IEEE Workshop on Hot Topics in Web Systems and Technologies (HotWeb): 2015. p. 73\u20138. \n                    https:\/\/doi.org\/10.1109\/HotWeb.2015.22\n                    \n                  .","DOI":"10.1109\/HotWeb.2015.22"},{"issue":"6","key":"86_CR18","doi-asserted-by":"publisher","first-page":"854","DOI":"10.1109\/JIOT.2016.2584538","volume":"3","author":"M Chiang","year":"2016","unstructured":"Chiang M, Zhang T. Fog and iot: An overview of research opportunities. IEEE Internet Things J. 2016; 3(6):854\u201364. \n                    https:\/\/doi.org\/10.1109\/JIOT.2016.2584538\n                    \n                  .","journal-title":"IEEE Internet Things J"},{"key":"86_CR19","doi-asserted-by":"publisher","first-page":"3019","DOI":"10.1109\/ACCESS.2015.2509638","volume":"3","author":"SC Hung","year":"2015","unstructured":"Hung SC, Hsu H, Lien SY, Chen KC. Architecture harmonization between cloud radio access networks and fog networks. IEEE Access. 2015; 3:3019\u201334. \n                    https:\/\/doi.org\/10.1109\/ACCESS.2015.2509638\n                    \n                  .","journal-title":"IEEE Access"},{"key":"86_CR20","unstructured":"Group OCAW. OpenFog Reference Architecture for Fog Computing. Technical report, OpenFog Consortium. 2017."},{"key":"86_CR21","doi-asserted-by":"publisher","unstructured":"Verbelen T, Simoens P, De Turck F, Dhoedt B. Cloudlets: Bringing the cloud to the mobile user. In: Proceedings of the Third ACM Workshop on Mobile Cloud Computing and Services. MCS \u201912: 2012. p. 29\u201336. \n                    https:\/\/doi.org\/10.1145\/2307849.2307858\n                    \n                  .","DOI":"10.1145\/2307849.2307858"},{"key":"86_CR22","doi-asserted-by":"publisher","unstructured":"Jararweh Y, Tawalbeh L, Ababneh F, Dosari F. Resource efficient mobile computing using cloudlet infrastructure. In: 2013 IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks: 2013. p. 373\u20137. \n                    https:\/\/doi.org\/10.1109\/MSN.2013.75\n                    \n                  .","DOI":"10.1109\/MSN.2013.75"},{"key":"86_CR23","unstructured":"Gao Y, Hu W, Ha K, Amos B, Pillai P, Satyanarayanan M. Are cloudlets necessary?Technical report, Carnegie Mellon University, School of Computer Science. 2015."},{"key":"86_CR24","unstructured":"Cisco. Fog Computing and the Internet of Things: Extend the Cloud to Where the Things Are. Technical report, Cisco. 2015."},{"key":"86_CR25","unstructured":"Cisco. The Zettabyte Era: Trends and Analysis. Technical report, Cisco. 2016."},{"key":"86_CR26","volume-title":"Fog Computing: A Platform for Internet of Things and Analytics","year":"2014","unstructured":"Bonomi F, Milito R, Natarajan P, Zhu J. In: Bessis N, Dobre C, (eds).Fog Computing: A Platform for Internet of Things and Analytics. Cham: Springer; 2014, pp. 169\u201386."},{"key":"86_CR27","doi-asserted-by":"crossref","unstructured":"Bonomi F, Milito R, Zhu J, Addepalli S. Fog computing and its role in the internet of things. In: Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing. MCC \u201912: 2012. p. 13\u20136.","DOI":"10.1145\/2342509.2342513"},{"key":"86_CR28","doi-asserted-by":"publisher","first-page":"684","DOI":"10.1016\/j.future.2015.09.021","volume":"56","author":"A Botta","year":"2016","unstructured":"Botta A, de Donato W, Persico V, Pescap\u00e9 A. Integration of cloud computing and internet of things: A survey. Futur Gener Comput Syst. 2016; 56:684\u2013700. \n                    https:\/\/doi.org\/10.1016\/j.future.2015.09.021\n                    \n                  .","journal-title":"Futur Gener Comput Syst"},{"key":"86_CR29","doi-asserted-by":"publisher","DOI":"10.1109\/ICFEC.2017.20","volume-title":"2017 IEEE 1st International Conference on Fog and Edge Computing (ICFEC)","author":"P Varshney","year":"2017","unstructured":"Varshney P, Simmhan Y. Demystifying fog computing: Characterizing architectures, applications and abstractions. In: 2017 IEEE 1st International Conference on Fog and Edge Computing (ICFEC). Madrid: IEEE: 2017. p. 115\u201324. \n                    https:\/\/doi.org\/10.1109\/ICFEC.2017.20\n                    \n                  ."},{"key":"86_CR30","doi-asserted-by":"publisher","unstructured":"Jazdi N. Cyber physical systems in the context of industry 4.0. In: 2014 IEEE International Conference on Automation, Quality and Testing, Robotics: 2014. p. 1\u20134. \n                    https:\/\/doi.org\/10.1109\/AQTR.2014.6857843\n                    \n                  .","DOI":"10.1109\/AQTR.2014.6857843"},{"key":"86_CR31","doi-asserted-by":"publisher","unstructured":"Breivold HP, Sandstr\u00f6m K. Internet of things for industrial automation \u2013 challenges and technical solutions. In: 2015 IEEE International Conference on Data Science and Data Intensive Systems: 2015. p. 532\u20139. \n                    https:\/\/doi.org\/10.1109\/DSDIS.2015.11\n                    \n                  .","DOI":"10.1109\/DSDIS.2015.11"},{"key":"86_CR32","doi-asserted-by":"publisher","unstructured":"Rotsos C, Farshad A, Hart N, Aguado A, Bidkar S, Sideris K, King D, Fawcett L, Bird J, Mauthe A, Race N, Hutchison D. Baguette: Towards end-to-end service orchestration in heterogeneous networks. In: 2016 15th International Conference on Ubiquitous Computing and Communications and 2016 International Symposium on Cyberspace and Security (IUCC-CSS): 2016. p. 196\u2013203. \n                    https:\/\/doi.org\/10.1109\/IUCC-CSS.2016.035\n                    \n                  .","DOI":"10.1109\/IUCC-CSS.2016.035"},{"key":"86_CR33","unstructured":"Fitbit, Inc.Fitbit. \n                    https:\/\/www.fitbit.com\n                    \n                  . Accessed 01 Aug 2017."},{"key":"86_CR34","unstructured":"Alphabet Inc.Google Fit SDK. \n                    https:\/\/developers.google.com\/fit\n                    \n                  . Accessed 30 Aug 2017."},{"key":"86_CR35","unstructured":"Apple Technology Company. HealthKit. \n                    https:\/\/developer.apple.com\/healthkit\/\n                    \n                  . Accessed 29 Aug 2017."},{"key":"86_CR36","doi-asserted-by":"crossref","unstructured":"Farahani B, Firouzi F, Chang V, Badaroglu M, Constant N, Mankodiya K. Towards fog-driven iot ehealth: Promises and challenges of iot in medicine and healthcare. Futur Gener Comput Syst. 2017.","DOI":"10.1016\/j.future.2017.04.036"},{"key":"86_CR37","doi-asserted-by":"publisher","first-page":"9206","DOI":"10.1109\/ACCESS.2017.2704100","volume":"5","author":"FA Kraemer","year":"2017","unstructured":"Kraemer FA, Braten AE, Tamkittikhun N, Palma D. Fog computing in healthcare: A review and discussion. IEEE Access. 2017; 5:9206\u201322.","journal-title":"IEEE Access"},{"key":"86_CR38","volume-title":"2016 IEEE International Conference on Autonomic Computing (ICAC)","author":"MP Hosseini","year":"2016","unstructured":"Hosseini MP, Hajisami A, Pompili D. Real-time epileptic seizure detection from eeg signals via random subspace ensemble learning. In: 2016 IEEE International Conference on Autonomic Computing (ICAC). Wurzburg: IEEE: 2016. p. 209\u201318. \n                    https:\/\/doi.org\/10.1109\/ICAC.2016.57\n                    \n                  ."},{"key":"86_CR39","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTCOMP.2016.7501692","volume-title":"2016 IEEE International Conference on Smart Computing (SMARTCOMP)","author":"A Monteiro","year":"2016","unstructured":"Monteiro A, Dubey H, Mahler L, Yang Q, Mankodiya K. Fit: A fog computing device for speech tele-treatments. In: 2016 IEEE International Conference on Smart Computing (SMARTCOMP). St. Louis: IEEE: 2016. p. 1\u20133. \n                    https:\/\/doi.org\/10.1109\/SMARTCOMP.2016.7501692\n                    \n                  ."},{"issue":"C","key":"86_CR40","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comcom.2014.09.008","volume":"54","author":"E Borgia","year":"2014","unstructured":"Borgia E. The internet of things vision. Comput Commun. 2014; 54(C):1\u201331. \n                    https:\/\/doi.org\/10.1016\/j.comcom.2014.09.008\n                    \n                  .","journal-title":"Comput Commun"},{"issue":"9","key":"86_CR41","doi-asserted-by":"publisher","first-page":"11621","DOI":"10.1007\/s11042-015-3158-4","volume":"76","author":"M Saini","year":"2017","unstructured":"Saini M, Alam KM, Guo H, Alelaiwi A, El Saddik A. Incloud: a cloud-based middleware for vehicular infotainment systems. Multimedia Tools Appl. 2017; 76(9):11621\u201349. \n                    https:\/\/doi.org\/10.1007\/s11042-015-3158-4\n                    \n                  .","journal-title":"Multimedia Tools Appl"},{"key":"86_CR42","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1016\/j.csi.2016.12.006","volume":"54","author":"C Rotsos","year":"2017","unstructured":"Rotsos C, King D, Farshad A, Bird J, Fawcett L, Georgalas N, Gunkel M, Shiomoto K, Wang A, Mauthe A, Race N, Hutchison D. Network service orchestration standardization: A technology survey. Comput Stand Interfaces. 2017; 54:203\u201315. \n                    https:\/\/doi.org\/10.1016\/j.csi.2016.12.006\n                    \n                  . SI: Standardization SDN&NFV.","journal-title":"Comput Stand Interfaces"},{"issue":"6","key":"86_CR43","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/MCOM.2015.7120041","volume":"53","author":"M Chen","year":"2015","unstructured":"Chen M, Hao Y, Li Y, Lai C, Wu D. On the computation offloading at ad hoc cloudlet: architecture and service modes. IEEE Commun Mag. 2015; 53(6):18\u201324. \n                    https:\/\/doi.org\/10.1109\/MCOM.2015.7120041\n                    \n                  .","journal-title":"IEEE Commun Mag"},{"issue":"4","key":"86_CR44","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MPRV.2009.82","volume":"8","author":"M Satyanarayanan","year":"2009","unstructured":"Satyanarayanan M, Bahl P, Caceres R, Davies N. The case for vm-based cloudlets in mobile computing. IEEE Pervasive Comput. 2009; 8(4):14\u201323. \n                    https:\/\/doi.org\/10.1109\/MPRV.2009.82\n                    \n                  .","journal-title":"IEEE Pervasive Comput"},{"key":"86_CR45","unstructured":"Amazon, Inc.AWS Greengrass. \n                    https:\/\/aws.amazon.com\/greengrass\n                    \n                  . Accessed 07 Feb 2018."},{"key":"86_CR46","unstructured":"Microsoft. Microsoft Azure - IoT Edge. \n                    https:\/\/azure.microsoft.com\/en-us\/services\/iot-edge\n                    \n                  . Accessed 07 Feb 2018."},{"key":"86_CR47","doi-asserted-by":"publisher","DOI":"10.1109\/APNOMS.2016.7737240","volume-title":"2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS)","author":"X-Q Pham","year":"2016","unstructured":"Pham X-Q, Huh E-N. Towards task scheduling in a cloud-fog computing system. In: 2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS). Kanazawa: IEEE: 2016. p. 1\u20134. \n                    https:\/\/doi.org\/10.1109\/APNOMS.2016.7737240\n                    \n                  ."},{"issue":"5968","key":"86_CR48","doi-asserted-by":"publisher","first-page":"1018","DOI":"10.1126\/science.1177170","volume":"327","author":"C Song","year":"2010","unstructured":"Song C, Qu Z, Blumm N, Barab\u00e1si A-L. Limits of predictability in human mobility. Science. 2010; 327(5968):1018\u201321. \n                    https:\/\/doi.org\/10.1126\/science.1177170\n                    \n                  .","journal-title":"Science"},{"issue":"2","key":"86_CR49","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MCC.2017.27","volume":"4","author":"L Bittencourt","year":"2017","unstructured":"Bittencourt L, Diaz-Montes J, Buyya R, Rana OF, Parashar M. Mobility-aware application scheduling in fog computing. IEEE Cloud Comput. 2017; 4(2):26\u201335. \n                    https:\/\/doi.org\/10.1109\/MCC.2017.27\n                    \n                  .","journal-title":"IEEE Cloud Comput"},{"issue":"12","key":"86_CR50","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/MCOM.2016.1600492CM","volume":"54","author":"X Sun","year":"2016","unstructured":"Sun X, Ansari N. Edgeiot: Mobile edge computing for the internet of things. IEEE Commun Mag. 2016; 54(12):22\u20139. \n                    https:\/\/doi.org\/10.1109\/MCOM.2016.1600492CM\n                    \n                  .","journal-title":"IEEE Commun Mag"},{"key":"86_CR51","unstructured":"The Linux Foundation. Kubernetes. \n                    https:\/\/kubernetes.io\n                    \n                  . Accessed 18 Apr 2018."},{"key":"86_CR52","doi-asserted-by":"publisher","unstructured":"Ooi BY, Chan HY, Cheah Y-N. Dynamic service placement and redundancy to ensure service availability during resource failures. In: 2010 International Symposium on Information Technology, vol. 2: 2010. p. 715\u201320. \n                    https:\/\/doi.org\/10.1109\/ITSIM.2010.5561605\n                    \n                  .","DOI":"10.1109\/ITSIM.2010.5561605"},{"issue":"1","key":"86_CR53","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/MNET.2008.4435897","volume":"22","author":"MEM Campista","year":"2008","unstructured":"Campista MEM, Esposito PM, Moraes IM, k. Costa LHM, b. Duarte OCM, Passos DG, Albuquerque CVND, Saade DCM, Rubinstein MG. Routing metrics and protocols for wireless mesh networks. IEEE Netw. 2008; 22(1):6\u201312. \n                    https:\/\/doi.org\/10.1109\/MNET.2008.4435897\n                    \n                  .","journal-title":"IEEE Netw"},{"issue":"2","key":"86_CR54","doi-asserted-by":"publisher","first-page":"940","DOI":"10.1016\/j.comnet.2011.10.011","volume":"56","author":"E Alotaibi","year":"2012","unstructured":"Alotaibi E, Mukherjee B. Survey paper: A survey on routing algorithms for wireless ad-hoc and mesh networks. Comput Netw. 2012; 56(2):940\u201365. \n                    https:\/\/doi.org\/10.1016\/j.comnet.2011.10.011\n                    \n                  .","journal-title":"Comput Netw"},{"issue":"3","key":"86_CR55","doi-asserted-by":"publisher","first-page":"1003","DOI":"10.1109\/TNET.2012.2230337","volume":"21","author":"S Paris","year":"2013","unstructured":"Paris S, Nita-Rotaru C, Martignon F, Capone A. Cross-layer metrics for reliable routing in wireless mesh networks. IEEE\/ACM Trans Netw. 2013; 21(3):1003\u201316. \n                    https:\/\/doi.org\/10.1109\/TNET.2012.2230337\n                    \n                  .","journal-title":"IEEE\/ACM Trans Netw"},{"key":"86_CR56","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.comcom.2017.05.013","volume":"109","author":"E Mar\u00edn-Tordera","year":"2017","unstructured":"Mar\u00edn-Tordera E, Masip-Bruin X, Garc\u00eda-Almi\u00f1ana J, Jukan A, Ren G-J, Zhu J. Do we all really know what a fog node is? current trends towards an open definition. Comput Commun. 2017; 109:117\u201330. \n                    https:\/\/doi.org\/10.1016\/j.comcom.2017.05.013\n                    \n                  .","journal-title":"Comput Commun"},{"key":"86_CR57","unstructured":"Mar\u00edn-Tordera E, Masip-Bruin X, Almi\u00f1ana JG, Jukan A, Ren G, Zhu J, Farre J. What is a fog node A tutorial on current concepts towards a common definition. CoRR. 2016;:abs\/1611.09193. http:\/\/arxiv.org\/abs\/1611.09193."},{"issue":"5","key":"86_CR58","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1109\/MWC.2016.7721750","volume":"23","author":"X Masip-Bruin","year":"2016","unstructured":"Masip-Bruin X, Mar\u00edn-Tordera E, Tashakor G, Jukan A, Ren G-J. Foggy clouds and cloudy fogs: a real need for coordinated management of fog-to-cloud computing systems. IEEE Wireless Communications. 2016; 23(5):120\u201328. \n                    https:\/\/doi.org\/10.1109\/MWC.2016.7721750\n                    \n                  .","journal-title":"IEEE Wireless Communications"},{"key":"86_CR59","unstructured":"Mahmud R, Buyya R. Fog computing: A taxonomy, survey and future directions. CoRR. 2016;:abs\/1611.05539. http:\/\/arxiv.org\/abs\/1611.05539."},{"issue":"6","key":"86_CR60","doi-asserted-by":"publisher","first-page":"1171","DOI":"10.1109\/JIOT.2016.2565516","volume":"3","author":"R Deng","year":"2016","unstructured":"Deng R, Lu R, Lai C, Luan TH, Liang H. Optimal workload allocation in fog-cloud computing toward balanced delay and power consumption. IEEE Internet Things J. 2016; 3(6):1171\u201381. \n                    https:\/\/doi.org\/10.1109\/JIOT.2016.2565516\n                    \n                  .","journal-title":"IEEE Internet Things J"},{"key":"86_CR61","volume-title":"Proceedings of the 2009 Fourth International Conference on Internet and Web Applications and Services. ICIW \u201909","author":"D Bernstein","year":"2009","unstructured":"Bernstein D, Ludvigson E, Sankar K, Diamond S, Morrow M. Blueprint for the intercloud - protocols and formats for cloud computing interoperability. In: Proceedings of the 2009 Fourth International Conference on Internet and Web Applications and Services. ICIW \u201909. Washington: IEEE Computer Society: 2009. p. 328\u201336."},{"key":"86_CR62","doi-asserted-by":"publisher","DOI":"10.1109\/UCC.2014.90","volume-title":"2014 IEEE\/ACM 7th International Conference on Utility and Cloud Computing","author":"MRM Assis","year":"2014","unstructured":"Assis MRM, Bittencourt L, Tolosana-Calasanz R. Cloud federation: characterisation and conceptual model. In: 2014 IEEE\/ACM 7th International Conference on Utility and Cloud Computing. London: IEEE: 2014. p. 585\u201390. \n                    https:\/\/doi.org\/10.1109\/UCC.2014.90\n                    \n                  ."},{"issue":"2","key":"86_CR63","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MIC.2017.36","volume":"21","author":"Z Wen","year":"2017","unstructured":"Wen Z, Yang R, Garraghan P, Lin T, Xu J, Rovatsos M. Fog orchestration for internet of things services. IEEE Internet Comput. 2017; 21(2):16\u201324. \n                    https:\/\/doi.org\/10.1109\/MIC.2017.36\n                    \n                  .","journal-title":"IEEE Internet Comput"},{"issue":"1","key":"86_CR64","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/jswis.2012010101","volume":"8","author":"P Barnaghi","year":"2012","unstructured":"Barnaghi P, Wang W, Henson C, Taylor K. Semantics for the internet of things: Early progress and back to the future. Int J Semant Web Inf Syst. 2012; 8(1):1\u201321.","journal-title":"Int J Semant Web Inf Syst"},{"key":"86_CR65","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2016.0029","volume-title":"2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom)","author":"S Shin","year":"2016","unstructured":"Shin S, Seo S, Eom S, Jung J, Lee KH. A pub\/sub-based fog computing architecture for internet-of-vehicles. In: 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom). Luxembourg City: IEEE: 2016. p. 90\u20133. \n                    https:\/\/doi.org\/10.1109\/CloudCom.2016.0029\n                    \n                  ."},{"key":"86_CR66","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2017.7983103","volume-title":"2017 14th IEEE Annual Consumer Communications Networking Conference (CCNC)","author":"D Singh","year":"2017","unstructured":"Singh D, Tripathi G, Alberti AM, Jara A. Semantic edge computing and iot architecture for military health services in battlefield. In: 2017 14th IEEE Annual Consumer Communications Networking Conference (CCNC). Las Vegas: IEEE: 2017. p. 185\u201390. \n                    https:\/\/doi.org\/10.1109\/CCNC.2017.7983103\n                    \n                  ."},{"key":"86_CR67","doi-asserted-by":"publisher","DOI":"10.1109\/ICIN.2017.7899427","volume-title":"2017 20th Conference on Innovations in Clouds, Internet and Networks (ICIN)","author":"DP Abreu","year":"2017","unstructured":"Abreu DP, Velasquez K, Pinto AM, Curado M, Monteiro E. Describing the internet of things with an ontology: The suscity project case study. In: 2017 20th Conference on Innovations in Clouds, Internet and Networks (ICIN). Paris: IEEE: 2017. p. 294\u20139. \n                    https:\/\/doi.org\/10.1109\/ICIN.2017.7899427\n                    \n                  ."},{"key":"86_CR68","unstructured":"W, 3C. OWL 2. \n                    https:\/\/www.w3.org\/TR\/owl2-primer\n                    \n                  . Accessed 25 July 2017."},{"issue":"11","key":"86_CR69","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1177\/1550147717742073","volume":"13","author":"X-Q Pham","year":"2017","unstructured":"Pham X-Q, Man ND, Tri NDT, Thai NQ, Huh E-N. A cost- and performance-effective approach for task scheduling based on collaboration between cloud and fog computing. Int J Distrib Sens Netw. 2017; 13(11):1\u201316. \n                    https:\/\/doi.org\/10.1177\/1550147717742073\n                    \n                  .","journal-title":"Int J Distrib Sens Netw"},{"key":"86_CR70","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/s12243-016-0524-9","volume":"72","author":"K Velasquez","year":"2017","unstructured":"Velasquez K, Perez Abreu D, Curado M, Monteiro E. Service placement for latency reduction in the internet of things. Ann Telecommun. 2017; 72:105\u201315. \n                    https:\/\/doi.org\/10.1007\/s12243-016-0524-9\n                    \n                  .","journal-title":"Ann Telecommun"},{"key":"86_CR71","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504751","volume-title":"Proceedings of the 2013 Conference on Internet Measurement Conference. IMC \u201913","author":"Y-C Chen","year":"2013","unstructured":"Chen Y-C, Lim Y-S, Gibbens RJ, Nahum EM, Khalili R, Towsley D. A measurement-based study of multipath tcp performance over wireless networks. In: Proceedings of the 2013 Conference on Internet Measurement Conference. IMC \u201913. New York: ACM: 2013. p. 455\u201368. \n                    https:\/\/doi.org\/10.1145\/2504730.2504751\n                    \n                  ."},{"key":"86_CR72","doi-asserted-by":"publisher","DOI":"10.1145\/2390231.2390234","volume-title":"Proceedings of the 11th ACM Workshop on Hot Topics in Networks. HotNets-XI","author":"A Vulimiri","year":"2012","unstructured":"Vulimiri A, Michel O, Godfrey PB, Shenker S. More is less: Reducing latency via redundancy. In: Proceedings of the 11th ACM Workshop on Hot Topics in Networks. HotNets-XI. New York: ACM: 2012. p. 13\u20138. \n                    https:\/\/doi.org\/10.1145\/2390231.2390234\n                    \n                  ."},{"key":"86_CR73","doi-asserted-by":"publisher","DOI":"10.1145\/2535372.2535392","volume-title":"Proceedings of the Ninth ACM Conference on Emerging Networking Experiments and Technologies. CoNEXT \u201913","author":"A Vulimiri","year":"2013","unstructured":"Vulimiri A, Godfrey PB, Mittal R, Sherry J, Ratnasamy S, Shenker S. Low latency via redundancy. In: Proceedings of the Ninth ACM Conference on Emerging Networking Experiments and Technologies. CoNEXT \u201913. New York: ACM: 2013. p. 283\u201394. \n                    https:\/\/doi.org\/10.1145\/2535372.2535392\n                    \n                  ."},{"key":"86_CR74","doi-asserted-by":"publisher","unstructured":"Moens H, Hanssens B, Dhoedt B, Turck FD. Hierarchical network-aware placement of service oriented applications in clouds. In: 2014 IEEE Network Operations and Management Symposium (NOMS): 2014. p. 1\u20138. \n                    https:\/\/doi.org\/10.1109\/NOMS.2014.6838230\n                    \n                  .","DOI":"10.1109\/NOMS.2014.6838230"},{"issue":"7","key":"86_CR75","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1631\/FITEE.1500494","volume":"17","author":"G Xiong","year":"2016","unstructured":"Xiong G, Hu Y-X, Tian L, Lan J-L, Li J-F, Zhou Q. A virtual service placement approach based on improved quantum genetic algorithm. Front Inf Technol Electron Eng. 2016; 17(7):661\u201371. \n                    https:\/\/doi.org\/10.1631\/FITEE.1500494\n                    \n                  .","journal-title":"Front Inf Technol Electron Eng"},{"key":"86_CR76","doi-asserted-by":"publisher","DOI":"10.1145\/2342356.2342366","volume-title":"Proceedings of the ACM SIGCOMM 2012 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication. SIGCOMM \u201912","author":"M Steiner","year":"2012","unstructured":"Steiner M, Gaglianello BG, Gurbani V, Hilt V, Roome WD, Scharf M, Voith T. Network-aware service placement in a distributed cloud environment. In: Proceedings of the ACM SIGCOMM 2012 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication. SIGCOMM \u201912. New York: ACM: 2012. p. 73\u201374. \n                    https:\/\/doi.org\/10.1145\/2342356.2342366\n                    \n                  ."},{"issue":"12","key":"86_CR77","doi-asserted-by":"publisher","first-page":"762","DOI":"10.1109\/JSAC.2013.SUP2.1213008","volume":"31","author":"Q Zhang","year":"2013","unstructured":"Zhang Q, Zhu Q, Zhani MF, Boutaba R, Hellerstein JL. Dynamic service placement in geographically distributed clouds. IEEE J Sel Areas Commun. 2013; 31(12):762\u201372.","journal-title":"IEEE J Sel Areas Commun"},{"key":"86_CR78","doi-asserted-by":"publisher","unstructured":"Wang S, Urgaonkar R, Chan K, He T, Zafer M, Leung KK. Dynamic service placement for mobile micro-clouds with predicted future costs. In: 2015 IEEE International Conference on Communications (ICC): 2015. p. 5504\u201310. \n                    https:\/\/doi.org\/10.1109\/ICC.2015.7249199\n                    \n                  .","DOI":"10.1109\/ICC.2015.7249199"},{"key":"86_CR79","doi-asserted-by":"publisher","unstructured":"Dolui K, Datta SK. Comparison of edge computing implementations: Fog computing, cloudlet and mobile edge computing. In: 2017 Global Internet of Things Summit (GIoTS): 2017. p. 1\u20136. \n                    https:\/\/doi.org\/10.1109\/GIOTS.2017.8016213\n                    \n                  .","DOI":"10.1109\/GIOTS.2017.8016213"},{"key":"86_CR80","doi-asserted-by":"publisher","first-page":"8284","DOI":"10.1109\/ACCESS.2017.2692960","volume":"5","author":"O Osanaiye","year":"2017","unstructured":"Osanaiye O, Chen S, Yan Z, Lu R, Choo KKR, Dlodlo M. From cloud to fog computing: A review and a conceptual live vm migration framework. IEEE Access. 2017; 5:8284\u2013300. \n                    https:\/\/doi.org\/10.1109\/ACCESS.2017.2692960\n                    \n                  .","journal-title":"IEEE Access"},{"key":"86_CR81","doi-asserted-by":"publisher","unstructured":"Fajjari I, Aitsaadi N, Pujolle G. Cloud networking: An overview of virtual network embedding strategies. In: Global Information Infrastructure Symposium - GIIS 2013: 2013. p. 1\u20137. \n                    https:\/\/doi.org\/10.1109\/GIIS.2013.6684379\n                    \n                  .","DOI":"10.1109\/GIIS.2013.6684379"},{"issue":"5","key":"86_CR82","doi-asserted-by":"publisher","first-page":"1489","DOI":"10.1109\/TNET.2013.2281276","volume":"22","author":"J Xiao","year":"2014","unstructured":"Xiao J, Boutaba R. Reconciling the overlay and underlay tussle. IEEE\/ACM Trans Netw. 2014; 22(5):1489\u2013502. \n                    https:\/\/doi.org\/10.1109\/TNET.2013.2281276\n                    \n                  .","journal-title":"IEEE\/ACM Trans Netw"},{"issue":"2","key":"86_CR83","doi-asserted-by":"publisher","first-page":"705","DOI":"10.1007\/s11235-011-9573-6","volume":"52","author":"JPG Sterbenz","year":"2013","unstructured":"Sterbenz JPG, \u00c7etinkaya EK, Hameed MA, Jabbar A, Qian S, Rohrer JP. Evaluation of network resilience, survivability, and disruption tolerance: analysis, topology generation, simulation, and experimentation. Telecommun Syst. 2013; 52(2):705\u201336. \n                    https:\/\/doi.org\/10.1007\/s11235-011-9573-6\n                    \n                  .","journal-title":"Telecommun Syst"},{"key":"86_CR84","doi-asserted-by":"publisher","unstructured":"Pahl C, Lee B. Containers and clusters for edge cloud architectures \u2013 a technology review. In: 2015 3rd International Conference on Future Internet of Things and Cloud: 2015. p. 379\u201386. \n                    https:\/\/doi.org\/10.1109\/FiCloud.2015.35\n                    \n                  .","DOI":"10.1109\/FiCloud.2015.35"},{"issue":"4","key":"86_CR85","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1109\/MCOM.2015.7081093","volume":"53","author":"J Matias","year":"2015","unstructured":"Matias J, Garay J, Toledo N, Unzilla J, Jacob E. Toward an sdn-enabled nfv architecture. IEEE Commun Mag. 2015; 53(4):187\u2013193. \n                    https:\/\/doi.org\/10.1109\/MCOM.2015.7081093\n                    \n                  .","journal-title":"IEEE Commun Mag"},{"key":"86_CR86","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/s12243-016-0530-y","volume":"72","author":"D Perez Abreu","year":"2017","unstructured":"Perez Abreu D, Velasquez K, Curado M, Monteiro E. A resilient internet of things architecture for smart cities. Ann Telecommun. 2017; 72:19\u201330. \n                    https:\/\/doi.org\/10.1007\/s12243-016-0530-y\n                    \n                  .","journal-title":"Ann Telecommun"},{"issue":"5","key":"86_CR87","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MNET.2013.6616110","volume":"27","author":"T Taleb","year":"2013","unstructured":"Taleb T, Ksentini A. Follow me cloud: interworking federated clouds and distributed mobile networks. IEEE Netw. 2013; 27(5):12\u20139. \n                    https:\/\/doi.org\/10.1109\/MNET.2013.6616110\n                    \n                  .","journal-title":"IEEE Netw"},{"key":"86_CR88","doi-asserted-by":"publisher","unstructured":"Nadembega A, Hafid AS, Brisebois R. Mobility prediction model-based service migration procedure for follow me cloud to support qos and qoe. In: 2016 IEEE International Conference on Communications (ICC): 2016. p. 1\u20136. \n                    https:\/\/doi.org\/10.1109\/ICC.2016.7511148\n                    \n                  .","DOI":"10.1109\/ICC.2016.7511148"},{"key":"86_CR89","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1155\/2016\/3061674","volume":"2016","author":"M Patel","year":"2016","unstructured":"Patel M, Chaudhary S, Garg S. Machine learning based statistical prediction model for improving performance of live virtual machine migration. J Eng. 2016; 2016:9. \n                    https:\/\/doi.org\/10.1155\/2016\/3061674\n                    \n                  .","journal-title":"J Eng"},{"key":"86_CR90","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1016\/j.future.2016.06.035","volume":"67","author":"F Amato","year":"2017","unstructured":"Amato F, Moscato F. Exploiting cloud and workflow patterns for the analysis of composite cloud services. Futur Gener Comput Syst. 2017; 67:255\u201365. \n                    https:\/\/doi.org\/10.1016\/j.future.2016.06.035\n                    \n                  .","journal-title":"Futur Gener Comput Syst"},{"issue":"6","key":"86_CR91","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MWC.2014.7000967","volume":"21","author":"J Liu","year":"2014","unstructured":"Liu J, Zhao T, Zhou S, Cheng Y, Niu Z. Concert: a cloud-based architecture for next-generation cellular systems. IEEE Wirel Commun. 2014; 21(6):14\u201322.","journal-title":"IEEE Wirel Commun"},{"issue":"10","key":"86_CR92","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/2659899","volume":"57","author":"S Goldberg","year":"2014","unstructured":"Goldberg S. Why is it taking so long to secure internet routing?Commun ACM. 2014; 57(10):56\u201363. \n                    https:\/\/doi.org\/10.1145\/2659899\n                    \n                  .","journal-title":"Commun ACM"},{"issue":"1","key":"86_CR93","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1109\/JPROC.2009.2034031","volume":"98","author":"KRB Butler","year":"2010","unstructured":"Butler KRB, Farley TR, McDaniel P, Rexford J. A survey of BGP security issues and solutions. Proc IEEE. 2010; 98(1):100\u201322. \n                    https:\/\/doi.org\/10.1109\/JPROC.2009.2034031\n                    \n                  .","journal-title":"Proc IEEE"},{"key":"86_CR94","volume-title":"Proceedings of the 17th USENIX Security Symposium","author":"J Oberheide","year":"2008","unstructured":"Oberheide J, Cooke E, Jahanian F. Cloudav: N-version antivirus in the network cloud In: van Oorschot PC, editor. Proceedings of the 17th USENIX Security Symposium. Berkeley: USENIX Association: 2008. p. 91\u2013106."},{"key":"86_CR95","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2013.6575364","volume-title":"43rd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN)","author":"S Krishnan","year":"2013","unstructured":"Krishnan S, Taylor T, Monrose F, McHugh J. Crossing the threshold: Detecting network malfeasance via sequential hypothesis testing. In: 43rd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN). Budapest: IEEE: 2013. p. 1\u201312. \n                    https:\/\/doi.org\/10.1109\/DSN.2013.6575364\n                    \n                  ."},{"key":"86_CR96","volume-title":"Proceedings of the 21st European Symposium on Research in Computer Security. Lecture Notes in Computer Science. vol 9879","author":"DJ Wu","year":"2016","unstructured":"Wu DJ, Taly A, Shankar A, Boneh D. Privacy, discovery, and authentication for the internet of things In: Askoxylakis IG, Ioannidis S, Katsikas SK, Meadows CA, editors. Proceedings of the 21st European Symposium on Research in Computer Security. Lecture Notes in Computer Science. vol 9879. Cham: Springer International Publishing: 2016. p. 301\u201319."},{"key":"86_CR97","volume-title":"Proceedings of the 5th International Conference on Theory and Applications of Models of Computation TAMC. Lecture Notes in Computer Science, vol. 4978","author":"C Dwork","year":"2008","unstructured":"Dwork C. Differential privacy: A survey of results In: Agrawal M, Du D, Duan Z, Li A, editors. Proceedings of the 5th International Conference on Theory and Applications of Models of Computation TAMC. Lecture Notes in Computer Science, vol. 4978. Berlin: Springer Berlin Heidelberg: 2008. p. 1\u201319."},{"key":"86_CR98","doi-asserted-by":"publisher","DOI":"10.1109\/FMEC.2017.7946419","volume-title":"2017 Second International Conference on Fog and Mobile Edge Computing (FMEC)","author":"MS de Brito","year":"2017","unstructured":"de Brito MS, Hoque S, Magedanz T, Steinke R, Willner A, Nehls D, Keils O, Schreiner F. A service orchestration architecture for fog-enabled infrastructures. In: 2017 Second International Conference on Fog and Mobile Edge Computing (FMEC). Valencia: IEEE: 2017. p. 127\u201332. \n                    https:\/\/doi.org\/10.1109\/FMEC.2017.7946419\n                    \n                  ."},{"issue":"10","key":"86_CR99","doi-asserted-by":"publisher","first-page":"2991","DOI":"10.1002\/cpe.3485","volume":"28","author":"I Stojmenovic","year":"2016","unstructured":"Stojmenovic I, Wen S, Huang X, Luan H. An overview of fog computing and its security issues. Concurrency Comput Pract Experience. 2016; 28(10):2991\u20133005.","journal-title":"Concurrency Comput Pract Experience"},{"issue":"3","key":"86_CR100","doi-asserted-by":"publisher","first-page":"2027","DOI":"10.1109\/COMST.2016.2548426","volume":"18","author":"M Conti","year":"2016","unstructured":"Conti M, Dragoni N, Lesyk V. A survey of man in the middle attacks. IEEE Commun Surv Tutorials. 2016; 18(3):2027\u201351.","journal-title":"IEEE Commun Surv Tutorials"},{"key":"86_CR101","doi-asserted-by":"crossref","unstructured":"Dastjerdi AV, Gupta H, Calheiros RN, Ghosh SK, Buyya R. Fog computing: Principles, architectures, and applications. CoRR. 2016;:abs\/1601.02752. http:\/\/arxiv.org\/abs\/1601.02752.","DOI":"10.1016\/B978-0-12-805395-9.00004-6"},{"key":"86_CR102","unstructured":"Misra P, Simmhan YL, Warrior J. Towards a practical architecture for the next generation internet of things. CoRR. 2015;:abs\/1502.00797. http:\/\/arxiv.org\/abs\/1502.00797."},{"key":"86_CR103","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.357","volume-title":"2015 IEEE Trustcom\/BigDataSE\/ISPA, vol. 1","author":"M Sabt","year":"2015","unstructured":"Sabt M, Achemlal M, Bouabdallah A. Trusted execution environment: What it is, and what it is not. In: 2015 IEEE Trustcom\/BigDataSE\/ISPA, vol. 1. Helsinki: IEEE: 2015. p. 57\u201364. \n                    https:\/\/doi.org\/10.1109\/Trustcom.2015.357\n                    \n                  ."},{"key":"86_CR104","unstructured":"Celesti A, Tusa F, Villari M, Puliafito A. Evaluating a distributed identity provider trusted network with delegated authentications for cloud federation. In: CLOUD COMPUTING 2011, The Second International Conference on Cloud Computing, GRIDs, and Virtualization: 2011. p. 79\u201385."},{"key":"86_CR105","unstructured":"ITU. X.509 : Information technology - Open Systems Interconnection. \n                    http:\/\/www.itu.int\/rec\/T-REC-X.509\n                    \n                  . Accessed 28 July 2017."},{"key":"86_CR106","unstructured":"OASIS. SAML Version 2.0. \n                    http:\/\/saml.xml.org\/saml-specifications\n                    \n                  . Accessed 29 July 2017."},{"issue":"4","key":"86_CR107","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MCOM.2017.1600863","volume":"55","author":"TX Tran","year":"2017","unstructured":"Tran TX, Hajisami A, Pandey P, Pompili D. Collaborative mobile edge computing in 5g networks: New paradigms, scenarios, and challenges. IEEE Commun Mag. 2017; 55(4):54\u201361. \n                    https:\/\/doi.org\/10.1109\/MCOM.2017.1600863\n                    \n                  .","journal-title":"IEEE Commun Mag"},{"key":"86_CR108","doi-asserted-by":"publisher","unstructured":"Ahmed A, Ahmed E. A survey on mobile edge computing. In: 2016 10th International Conference on Intelligent Systems and Control (ISCO): 2016. p. 1\u20138. \n                    https:\/\/doi.org\/10.1109\/ISCO.2016.7727082\n                    \n                  .","DOI":"10.1109\/ISCO.2016.7727082"},{"key":"86_CR109","doi-asserted-by":"publisher","unstructured":"Satyanarayanan M, Chen Z, Ha K, Hu W, Richter W, Pillai P. Cloudlets: at the leading edge of mobile-cloud convergence. In: 6th International Conference on Mobile Computing, Applications and Services: 2014. p. 1\u20139. \n                    https:\/\/doi.org\/10.4108\/icst.mobicase.2014.257757\n                    \n                  .","DOI":"10.4108\/icst.mobicase.2014.257757"},{"key":"86_CR110","doi-asserted-by":"publisher","unstructured":"Ruay-Shiung-Chang, Gao J, Gruhn V, He J, Roussos G, Tsai W-T. Mobile cloud computing research - issues, challenges and needs. In: 2013 IEEE Seventh International Symposium on Service-Oriented System Engineering: 2013. p. 442\u201353. \n                    https:\/\/doi.org\/10.1109\/SOSE.2013.96\n                    \n                  .","DOI":"10.1109\/SOSE.2013.96"},{"key":"86_CR111","unstructured":"ETSI, Vodafone, IBM, Huawei, Intel, Nokia Networks, NTT DOCOMO. Mobile-edge computing: Introductory technical white paper. Technical report, ETSI Industry Specification Group. 2014."},{"key":"86_CR112","doi-asserted-by":"publisher","unstructured":"Velasquez K, Abreu DP, Gon\u00e7alves D, Bittencourt L, Curado M, Monteiro E, Madeira E. Service orchestration in fog environments. In: 2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud): 2017. p. 329\u201336. \n                    https:\/\/doi.org\/10.1109\/FiCloud.2017.49\n                    \n                  .","DOI":"10.1109\/FiCloud.2017.49"},{"key":"86_CR113","unstructured":"Centre for Informatics and Systems - UC. FCT\/ CAPES - SORTS: Supporting the Orchestration of Resilient and Trustworthy Fog Services. \n                    https:\/\/www.cisuc.uc.pt\/projects\/show\/228\n                    \n                  . Accessed 29 Aug 2017."},{"key":"86_CR114","unstructured":"TOSCA. Topology and Orchestration Specification for Cloud Applications (TOSCA) Version 1.0. 2013. \n                    http:\/\/docs.oasis-open.org\/tosca\/TOSCA\/v1.0\/os\/TOSCA-v1.0-os.pdf\n                    \n                  . Accessed 17 Feb 2015."},{"key":"86_CR115","unstructured":"Network Functions Virtualisation (NFV) ETSI Industry Specification Group (ISG). ETSI NFV Work Group. Network Functions Virtualisation (NFV); Management and Orchestration. \n                    http:\/\/bit.ly\/2IJtqAR\n                    \n                  . Accessed 28 Apr 2017."},{"key":"86_CR116","unstructured":"ETSI. Technical report, ETSI Industry Specification Group. 2016."}],"container-title":["Journal of Internet Services and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13174-018-0086-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13174-018-0086-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13174-018-0086-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,9]],"date-time":"2022-02-09T22:15:27Z","timestamp":1644444927000},"score":1,"resource":{"primary":{"URL":"https:\/\/jisajournal.springeropen.com\/articles\/10.1186\/s13174-018-0086-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,18]]},"references-count":116,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["86"],"URL":"https:\/\/doi.org\/10.1186\/s13174-018-0086-3","relation":{},"ISSN":["1867-4828","1869-0238"],"issn-type":[{"value":"1867-4828","type":"print"},{"value":"1869-0238","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,7,18]]},"assertion":[{"value":"19 September 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 May 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 July 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Publisher\u2019s Note"}}],"article-number":"14"}}