P. Demestichas and A. Georgakopoulos, 5G on the Horizon: Key Challenges for the Radio-Access Network, IEEE Vehicular Technology Magazine, vol.8, issue.3, pp.47-53, 2013.
DOI : 10.1109/MVT.2013.2269187

J. G. Andrews, Seven ways that HetNets are a cellular paradigm shift, IEEE Communications Magazine, vol.51, issue.3, pp.136-144, 2013.
DOI : 10.1109/MCOM.2013.6476878

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.269.6705

B. A. Nunes, M. Mendonça, X. Ngyen, K. Obraczka, and T. Turletti, A Survey of Software-Defined Networking: Past, Present, and Future of Programmable Networks, IEEE Communications Surveys & Tutorials, vol.16, issue.3, pp.1-18, 2014.
DOI : 10.1109/SURV.2014.012214.00180

N. M. Mosharaf, K. Chowdhury, and R. Boutaba, A Survey of Network Virtualization, Computer Networks, vol.54, issue.5, pp.862-876, 2010.

E. Haleplidis, J. H. Salim, and S. Denazis, Towards a Network Abstraction Model for SDN, Journal of Network and Systems Management, vol.18, issue.3, pp.309-327, 2015.
DOI : 10.1145/354871.354874

R. Shrivastava, S. Constanzo, K. Samdanis, D. Xenakis, D. Grace et al., An SDN-based framework for elastic resource sharing in integrated FDD/TDD LTE-A HetNets, 2014 IEEE 3rd International Conference on Cloud Networking (CloudNet), pp.126-131, 2014.
DOI : 10.1109/CloudNet.2014.6968980

L. M. Vaquero and L. Rodero-merino, Finding your Way in the Fog, ACM SIGCOMM Computer Communication Review, vol.44, issue.5, pp.27-32, 2014.
DOI : 10.1145/2677046.2677052

G. P. Fetweiss, The Tactile Internet: Applications and Challenges, IEEE Vehicular Technology Magazine, vol.9, issue.1, pp.64-70, 2014.
DOI : 10.1109/MVT.2013.2295069

K. Lee, D. Kim, D. Ha, U. Rajput, and H. Oh, On security and privacy issues of fog computing supported Internet of Things environment, 2015 6th International Conference on the Network of the Future (NOF), pp.1-3, 2015.
DOI : 10.1109/NOF.2015.7333287

I. Stojmenovic, S. Wen, X. Huang, and H. Luan, An overview of Fog computing and its security issues, Concurrency and Computation: Practice and Experience, 2015.
DOI : 10.1109/TDSC.2013.2297110

Y. Wang, T. Uehara, and R. Sasaki, Fog Computing: Issues and Challenges, Proceedings of the 39 th IEEE Annual COMPSAC Conference, pp.53-59, 2015.

S. J. Stolfo, M. B. Salem, and A. D. Keromytis, Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud, 2012 IEEE Symposium on Security and Privacy Workshops, pp.125-128, 2012.
DOI : 10.1109/SPW.2012.19

P. G. Lopez, A. Montresor, and . Epema, Edge-centric Computing, ACM SIGCOMM Computer Communication Review, vol.45, issue.5, pp.37-42, 2015.
DOI : 10.1109/P2P.2010.5570003

H. Mouratidis and P. Giorgini, SECURE TROPOS: A SECURITY-ORIENTED EXTENSION OF THE TROPOS METHODOLOGY, International Journal of Software Engineering and Knowledge Engineering, vol.1957, issue.02, pp.285-309, 2007.
DOI : 10.1007/3-540-44564-1_1

S. Skorobogatov, Physical Attacks and Tamper Resistance, pp.143-173, 2011.
DOI : 10.1007/978-1-4419-8080-9_7

R. Buetnner, Towards a New Personal Information Technology Acceptance Model: Conceptualization and Empirical Evidence from a Bring Your Own Device Datataset, Proceedings of the 21 st AMCIS. AIS, 2015.

. Cloud-security-alliance, CSA): Security Guidance for Critical Areas of Focus in Cloud Computing v2, CSA, vol.1, 2009.

H. Mouratidis, S. Islam, C. Kalloniatis, and S. Gritzalis, A framework to support selection of cloud providers based on security and privacy requirements, Journal of Systems and Software, vol.86, issue.9, pp.2276-2293, 2013.
DOI : 10.1016/j.jss.2013.03.011