Security Constraints for Placement of Latency Sensitive 5G MEC Applications | IEEE Conference Publication | IEEE Xplore