Voir la notice de l'article provenant de la source Math-Net.Ru
@article{MAIS_2017_24_6_a7, author = {E. Yu. Antoshina and D. Ju. Chalyy}, title = {Semantic security methods for software-defined networks}, journal = {Modelirovanie i analiz informacionnyh sistem}, pages = {755--759}, publisher = {mathdoc}, volume = {24}, number = {6}, year = {2017}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/MAIS_2017_24_6_a7/} }
TY - JOUR AU - E. Yu. Antoshina AU - D. Ju. Chalyy TI - Semantic security methods for software-defined networks JO - Modelirovanie i analiz informacionnyh sistem PY - 2017 SP - 755 EP - 759 VL - 24 IS - 6 PB - mathdoc UR - http://geodesic.mathdoc.fr/item/MAIS_2017_24_6_a7/ LA - ru ID - MAIS_2017_24_6_a7 ER -
E. Yu. Antoshina; D. Ju. Chalyy. Semantic security methods for software-defined networks. Modelirovanie i analiz informacionnyh sistem, Tome 24 (2017) no. 6, pp. 755-759. http://geodesic.mathdoc.fr/item/MAIS_2017_24_6_a7/
[1] Sabelfeld A, Myers A.C., “Language-Based Information-Flow Security”, IEEE Journal on Selected Areas in Communications, 21:1 (2003), 5–19 | DOI
[2] Smeliansky R.L., “SDN for Network Security”, Proc. of Int. Conf. "Modern Networking Technologies (MoNeTec), 2014, 86–95
[3] Casado M., Foster N., Guha A., “Abstractions for Software-Defined Networks”, Communications of the ACM, 57:10 (2014), 86–95 | DOI
[4] Foster N., Freedman M.J., Monasanto Ch., Rexford J., Story A., Walker D., “Splendid Isolation: A Slice Abstraction for Software-Defined Networks”, CM Int. Conf. on Functional Programming (2011), 279—291 | Zbl
[5] McKeown N., Anderson T., Balakrishnan H., Parulkar G., Kozen D., Peterson L., Rexford J., Shenker S., Turner J., “OpenFlow: Enabling Innovation in Campus Networks”, SIGCOMM Computer Communications Review, 38:2 (2008), 69–74 | DOI
[6] Antoshina E.Ju., Nikitin E.S., Chalyy D.Ju., Sokolov V.A., “End-to-end Information Flow Security Model for Software-Defined Networks”, Modeling and Analysis of Information Systems, 22:6 (2015), 735–749 | MR