Fig. 11From: TACRM: trust access control and resource management mechanism in fog computingNetwork usage vs. physical topology configurationBack to article page