Fig. 2From: Fog computing network security based on resources managementProposed access control approachBack to article page