Research Article

Fuzzy Theory Based Security Service Chaining for Sustainable Mobile-Edge Computing

Table 7

Matching relation between services and VMS.

ā€‰VM1VM2VM3VM4

Function 10
Function 20
Function 30
Function 40