Research Article

An Invocation Chain Test and Evaluation Method for Fog Computing

Algorithm 2

Atomic attack set construction algorithms.
ProcedureCreateAtomicAttacks(DM, Initial)
Input: DM, Initial.
Output: AA.
1. ;
2. Queue⟵Initial;
3. Foreachin Initial Do
4.  ;
5. While()
6.  ;
7.  Foreach DMin DM Do
8.   ;
9.   Foreach ackin AckfDo
10   Ifackin AA Then.
11.    ;
12.    ForeachinDM.EffDo
13.     IfinThen
14.     ;
15.     ;
16. Foreach ackin AA Do
17.  Foreach pinack.PreDo
18.  ;
19.  Foreachinack.EffDo
20.  ;
21. Return AA.