Author of the publication

A Security Policy Model Transformation and Verification Approach for Software Defined Networking.

, , , and . CoRR, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Numerical simulations of migration and coalescence behavior of microvoids driven by diffusion and electric field in solder interconnects., , , , and . Microelectron. Reliab., (2017)Privacy-aware cloud service selection approach based on P-Spec policy models and privacy sensitivities., , , and . Future Gener. Comput. Syst., (2018)SOM-based DDoS Defense Mechanism using SDN for the Internet of Things., , , , and . CoRR, (2020)面向大数据的隐私发布暴露检测方法 (Big Data Oriented Privacy Disclosure Detection Method for Information Release)., , and . 计算机科学, 46 (10): 148-153 (2019)A Privacy Risk Assessment Scheme for Fog Nodes in Access Control System., , , , and . IEEE Trans. Reliab., 71 (4): 1513-1526 (2022)Ontology-Based Privacy Data Chain Disclosure Discovery Method for Big Data., , , , and . IEEE Trans. Serv. Comput., 15 (1): 59-68 (2022)SDN-Based Security Enforcement Framework for Data Sharing Systems of Smart Healthcare., , , and . IEEE Trans. Netw. Serv. Manag., 17 (1): 308-318 (2020)A user requirements-oriented privacy policy self-adaption scheme in cloud computing., , , and . Frontiers Comput. Sci., 17 (2): 172203 (2022)Optimal Key-Tree for RFID Authentication Protocols with Storage Constraints., , , , and . SciSec, volume 11933 of Lecture Notes in Computer Science, page 278-292. Springer, (2019)Requirement-Oriented Privacy Protection Analysis Architecture in Cloud Computing., , , and . J. Commun., 10 (1): 55-63 (2015)