I am planning to write about fog computing security and privacy and looking for tool/s to simulate fog computing security (authentication, authorization, and access) and privacy. Is there any specific tool/s to simulate above requirement?

More Abdul Rahman Hamidy's questions See All
Similar questions and discussions