Securing Authentication and Authorization in Computing Continuum | Publicación