Security Constraints for Placement of Latency Sensitive 5G MEC Applications.
Rafal ArtychKrzysztof BocianiakYannick CarlinetWojciech NiewolskiNancy PerrotAleksandra PodlasekJean-Philippe WaryPublished in: FiCloud (2022)
Keyphrases
- access control
- security problems
- computer security
- response time
- intrusion detection
- low latency
- global constraints
- data sets
- security management
- functional requirements
- security requirements
- security issues
- security policies
- network security
- information security
- constraint programming
- network management
- quality of service
- information systems
- database
- information assurance