메뉴 건너뛰기




Volumn 327, Issue , 2016, Pages 288-299

Leveraging software-defined networking for security policy enforcement

Author keywords

Network update; Security; Software defined network

Indexed keywords

COMPLEX NETWORKS; HEURISTIC ALGORITHMS; NETWORK PROTOCOLS; SECURITY SYSTEMS;

EID: 84944193150     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2015.08.019     Document Type: Article
Times cited : (44)

References (45)
  • 10
    • 0037544302 scopus 로고    scopus 로고
    • On the solution of reroute sequence planning problem in MPLS networks
    • B.G. Józsa, and M. Makai On the solution of reroute sequence planning problem in MPLS networks Comput. Netw. 42 2 2003 199 210
    • (2003) Comput. Netw. , vol.42 , Issue.2 , pp. 199-210
    • Józsa, B.G.1    Makai, M.2
  • 16
    • 84944185439 scopus 로고    scopus 로고
    • Openflow@google
    • Openflow@google. http://www.opennetsummit.org/archives/apr12/hoelzle-tue-openflow.pdf.
  • 20
    • 27644451689 scopus 로고    scopus 로고
    • Conflict classification and analysis of distributed firewall policies
    • E. Al-Shaer, H. Hamed, R. Boutaba, and M. Hasan Conflict classification and analysis of distributed firewall policies IEEE J. Selected Areas Commun. 23 10 2005 2069 2084
    • (2005) IEEE J. Selected Areas Commun. , vol.23 , Issue.10 , pp. 2069-2084
    • Al-Shaer, E.1    Hamed, H.2    Boutaba, R.3    Hasan, M.4
  • 22
    • 84937973181 scopus 로고    scopus 로고
    • Enabling security functions with SDN: A feasibility study
    • C. Yoon, T. Park, S. Lee, H. Kang, S. Shin, and Z. Zhang Enabling security functions with SDN: a feasibility study Comput. Netw. 85 0 2015 19 35
    • (2015) Comput. Netw. , vol.85 , pp. 19-35
    • Yoon, C.1    Park, T.2    Lee, S.3    Kang, H.4    Shin, S.5    Zhang, Z.6
  • 23
    • 84901399118 scopus 로고    scopus 로고
    • Software defined networking for security enhancement in wireless mobile networks
    • A. Ding, J. Crowcroft, S. Tarkoma, and H. Flinck Software defined networking for security enhancement in wireless mobile networks Comput. Netw. 66 0 2014 94 101
    • (2014) Comput. Netw. , vol.66 , pp. 94-101
    • Ding, A.1    Crowcroft, J.2    Tarkoma, S.3    Flinck, H.4
  • 24
    • 80051782347 scopus 로고    scopus 로고
    • Graceful network state migrations
    • S. Raza, Y. Zhu, and C.-N. Chuah Graceful network state migrations IEEE/ACM Trans. Netw. 19 4 2011 1097 1110
    • (2011) IEEE/ACM Trans. Netw. , vol.19 , Issue.4 , pp. 1097-1110
    • Raza, S.1    Zhu, Y.2    Chuah, C.-N.3
  • 35
    • 84924368818 scopus 로고    scopus 로고
    • Security in cloud computing: Opportunities and challenges
    • M. Ali, S.U. Khan, and A.V. Vasilakos Security in cloud computing: opportunities and challenges Inf. Sci. 305 2015 357 383
    • (2015) Inf. Sci. , vol.305 , pp. 357-383
    • Ali, M.1    Khan, S.U.2    Vasilakos, A.V.3
  • 37
    • 84889087663 scopus 로고    scopus 로고
    • Security and privacy for storage and computation in cloud computing
    • L. Wei, H. Zhu, Z. Cao, X. Dong, W. Jia, Y. Chen, and A. Vasilakos Security and privacy for storage and computation in cloud computing Inf. Sci. 258 2014 371 386
    • (2014) Inf. Sci. , vol.258 , pp. 371-386
    • Wei, L.1    Zhu, H.2    Cao, Z.3    Dong, X.4    Jia, W.5    Chen, Y.6    Vasilakos, A.7
  • 42
    • 78649322624 scopus 로고    scopus 로고
    • A survey on security issues in service delivery models of cloud computing
    • S. Subashini, and V. Kavitha A survey on security issues in service delivery models of cloud computing J. Netw. Comput. Appl. 34 2011 1 11
    • (2011) J. Netw. Comput. Appl. , vol.34 , pp. 1-11
    • Subashini, S.1    Kavitha, V.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.