[1] |
SANDHU R S , COYNE E J , FEINSTEIN H L , et al. Role-based access control models[J]. IEEE Computer, 1996,29(2): 38-47.
|
[2] |
DANGOVAS V , KULIESIUS F . SDN-driven authentication and access control system[J]. Society of Digital Information & Wireless Communication, 2014.
|
[3] |
AHMAD I , NAMAL S , YLIANTTILA M , et al. Security in software defined networks:a survey[J]. IEEE Communications Survey & Tutorials, 2015,99: 1-30.
|
[4] |
YOON C H , PARK T J , LEE S G , et al. Enabling security functions with SDN:a feasibility study[J]. Computer Networks, 2015,(85): 19-35.
|
[5] |
HU Z Y , WANG M G , YAN X Q , et al. A comprehensive security architecture for SDN[A]. Proceedings of the 18th International Conference on Intelligence in Next Generation Networks[C]. Paris,France, 2015. 30-37.
|
[6] |
KERPEZ K J , CIOFFI J M , GINIS G , et al. Software-defined access networks[J]. IEEE Communication Magazine, 2014,52(9): 152-159.
|
[7] |
MATIAS J , GARAY J , MENDIOLA A , et al. Flow NAC:flow-based network access control[A]. Proceedings of 2014 3rd European Workshop on Software Defined Networks[C]. Budapest, 2014. 79-84.
|
[8] |
IEEE Std.802.1X-2010,Port-Based Network Access Control,[EB/OL]. .
|
[9] |
Trusted computing group. trusted network connect architecture for Interoperability,specification version 1.5[EB/OL]. , 2012.
|
[10] |
CHAKRABORTY S , RAY I . TrustBAC-integrating trust relationships into the RBAC model for access control in open system[A]. Proceedings of the 11th ACM symposium on Access control models and technologies[C]. New York,USA, 2006. 49-58.
|
[11] |
CASADO M , GARFINKEL T , AKELLA A , et al. SANE:a protection architecture for enterprise networks[A]. Proceedings of USENIX Security Symposium[C]. 2006. 1-12.
|
[12] |
CASADO M , FREEDMAN M J , PETTIT J , et al. Ethane:taking control of the enterprise[J]. ACM SIGCOMM Computer Communication Review, 2007,37(4): 1-12.
|
[13] |
ZHENG R B , YANG W L , ZHOU J . Future access architecture:software-defined access networking[A]. Proceedings of IEEE the 11th Consumer Communications and Networking Conference[C]. Las Vegas,NV, 2014. 881-886.
|
[14] |
KLAEDTKE F , KARAME G O , BIFULCO R , et al. Towards an access control scheme for accessing flow in SDN[A]. Proceedings of the 1st IEEE Conference on Network Softwarization[C]. London, 2015. 1-6.
|
[15] |
MCKEOWN N , ANDERSON T , BALAKRISHNAN H , et al. Openflow:enabling innovation in campus networks[J]. ACM SIGCOMM Computer Communication Review, 2008 38: 69-74.
|
[16] |
MAZIERES D , KAMINSKY M , KAASHOEK M F , et al. Separating key management from file system security[J]. ACM SIGOPS Operating System Review, 1999,33(5): 124-139.
|