1. Alamouti, S.M., Arjomandi, F., Burger, M.: Hybrid edge cloud: a pragmatic approach for decentralized cloud computing. IEEE Commun. Magaz. 60(9), 16–29 (2022)
2. Sabt, M., Achemlal, M., Bouabdallah, A.: Trusted execution environment: what it is, and what it is not. In: 2015 IEEE Trustcom/BigDataSE/Ispa, vol. 1, pp. 57–64. IEEE (2015)
3. Pinto, S., Santos, N.: Demystifying arm trustzone: a comprehensive survey. ACM Comput. Surv. 51(6), 1–36 (2019)
4. Li, X., et al.: Design and verification of the arm confidential compute architecture. In: 16th USENIX Symposium on Operating Systems Design and Implementation (OSDI 22), Carlsbad, pp. 465–484. USENIX Association (2022)
5. Huang, Z., Xia, G., Wang, Z., Yuan, S.: Survey on edge computing security. In: 2020 International Conference on Big Data, Artificial Intelligence and Internet of Things Engineering (ICBAIE), pp. 96–105 (2020)