[1] |
SHIN S, PORRAS P, YEGNESWARAN V, et al. FRESCO: Modular Composable Security Services for Software-defined Networks[C]// Internet Society. Proceedings of Network and Distributed Security Symposium, April 23, 2013, San Diego, USA. San Diego: Internet Society , 2013: 135-139.
|
[2] |
SHIN S, GU G. Attacking Software-defined Networks: A First Feasibility Study[C]// ACM. In Proceedings of the second ACM SIGCOMM workshop on Hot Topics in Software Defined Networking (HotSDN ‘13). August 2013, New York, NY, USA. New York: ACM, 2013: 165-166.
|
[3] |
RICHARD K D, COYNE J, WEIL R. Adding Attributes to Role-based Access Control[J]. Computer, 2010,43(6):79-81.
|
[4] |
GS-NFV-SEC-003, ETSI GS NFV-SEC 003 V1.1.1[S]. France, ETSI, 2014.
|
[5] |
JIANG Jian, WU Hongjian. Key Technologies and Impact Analysis of Network Function Virtualization[J], Information and Communications Technology and Policy, 2014(12):1-5.
|
|
姜建, 吴宏建. 网络功能虚拟化关键技术及影响分析[J]. 电信网技术, 2014(12):1-5.
|
[6] |
HAWILO H, SHAMI A, MIRAHMADI M, et al. NFV: State of the Art, Challenges, and Implementation in Next Generation Mobile Networks (vEPC)[J]. IEEE Network, 2014,28(6):18-26.
|
[7] |
MCGUIRE K, The Truth about Docker Container Lifecycles [EB/OL]. https://events.static.linuxfound.org/sites/events/files/slides/cc15_mcguire.pdf, 2015-8-17.
|
[8] |
LIU Wenmao, QIU Xiaofeng, CHEN Pengcheng, et al. A Software Defined Security Architecture in SDN Environment[J]. Journal of Frontiers of Computer Science and Technology, 2015,9(1):63-70.
|