{"id":"https://openalex.org/W2999390192","doi":"https://doi.org/10.1155/2020/6302739","title":"Attribute-Guard: Attribute-Based Flow Access Control Framework in Software-Defined Networking","display_name":"Attribute-Guard: Attribute-Based Flow Access Control Framework in Software-Defined Networking","publication_year":2020,"publication_date":"2020-01-10","ids":{"openalex":"https://openalex.org/W2999390192","doi":"https://doi.org/10.1155/2020/6302739","mag":"2999390192"},"language":"en","primary_location":{"id":"doi:10.1155/2020/6302739","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/6302739","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/6302739.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2020/6302739.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5005039138","display_name":"Xianwei Zhu","orcid":"https://orcid.org/0000-0003-0405-296X"},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xianwei Zhu","raw_affiliation_strings":["PLA Strategic Support Force Information Engineering University, Zhengzhou 45004, China"],"affiliations":[{"raw_affiliation_string":"PLA Strategic Support Force Information Engineering University, Zhengzhou 45004, China","institution_ids":["https://openalex.org/I169689159"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064095903","display_name":"Chaowen Chang","orcid":"https://orcid.org/0000-0002-3583-9880"},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"ChaoWen Chang","raw_affiliation_strings":["PLA Strategic Support Force Information Engineering University, Zhengzhou 45004, China"],"affiliations":[{"raw_affiliation_string":"PLA Strategic Support Force Information Engineering University, Zhengzhou 45004, China","institution_ids":["https://openalex.org/I169689159"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101444050","display_name":"Xi Qin","orcid":"https://orcid.org/0009-0003-5788-2796"},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qin Xi","raw_affiliation_strings":["PLA Strategic Support Force Information Engineering University, Zhengzhou 45004, China"],"affiliations":[{"raw_affiliation_string":"PLA Strategic Support Force Information Engineering University, Zhengzhou 45004, China","institution_ids":["https://openalex.org/I169689159"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071045218","display_name":"Zhibin Zuo","orcid":"https://orcid.org/0000-0002-9063-5856"},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"ZhiBin Zuo","raw_affiliation_strings":["PLA Strategic Support Force Information Engineering University, Zhengzhou 45004, China"],"affiliations":[{"raw_affiliation_string":"PLA Strategic Support Force Information Engineering University, Zhengzhou 45004, China","institution_ids":["https://openalex.org/I169689159"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5005039138"],"corresponding_institution_ids":["https://openalex.org/I169689159"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":1.1328,"has_fulltext":true,"cited_by_count":8,"citation_normalized_percentile":{"value":0.79359476,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"2020","issue":null,"first_page":"1","last_page":"18"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8921365737915039},{"id":"https://openalex.org/keywords/forwarding-plane","display_name":"Forwarding plane","score":0.7433656454086304},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6473008394241333},{"id":"https://openalex.org/keywords/openflow","display_name":"OpenFlow","score":0.6350730657577515},{"id":"https://openalex.org/keywords/guard","display_name":"Guard (computer science)","score":0.6035902500152588},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5981134176254272},{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.5524864196777344},{"id":"https://openalex.org/keywords/identifier","display_name":"Identifier","score":0.5047181844711304},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4669873118400574},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.43166303634643555},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.35142385959625244},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34624528884887695}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8921365737915039},{"id":"https://openalex.org/C10597312","wikidata":"https://www.wikidata.org/wiki/Q5473302","display_name":"Forwarding plane","level":3,"score":0.7433656454086304},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6473008394241333},{"id":"https://openalex.org/C192697461","wikidata":"https://www.wikidata.org/wiki/Q4045918","display_name":"OpenFlow","level":3,"score":0.6350730657577515},{"id":"https://openalex.org/C141141315","wikidata":"https://www.wikidata.org/wiki/Q2379942","display_name":"Guard (computer science)","level":2,"score":0.6035902500152588},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5981134176254272},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.5524864196777344},{"id":"https://openalex.org/C154504017","wikidata":"https://www.wikidata.org/wiki/Q853614","display_name":"Identifier","level":2,"score":0.5047181844711304},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4669873118400574},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.43166303634643555},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.35142385959625244},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34624528884887695},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2020/6302739","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/6302739","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/6302739.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:384521bfb69b457d9683fc3453b2bd75","is_oa":true,"landing_page_url":"https://doaj.org/article/384521bfb69b457d9683fc3453b2bd75","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2020 (2020)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2020/6302739","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/6302739","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/6302739.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2999390192.pdf","grobid_xml":"https://content.openalex.org/works/W2999390192.grobid-xml"},"referenced_works_count":10,"referenced_works":["https://openalex.org/W1714884520","https://openalex.org/W2022758041","https://openalex.org/W2055573977","https://openalex.org/W2256352919","https://openalex.org/W2313873621","https://openalex.org/W2789950367","https://openalex.org/W2804817434","https://openalex.org/W2915547272","https://openalex.org/W2949530985","https://openalex.org/W2986617006"],"related_works":["https://openalex.org/W2051935741","https://openalex.org/W4211055425","https://openalex.org/W4243609393","https://openalex.org/W2292300552","https://openalex.org/W2926903444","https://openalex.org/W3042077637","https://openalex.org/W2560450376","https://openalex.org/W2553068154","https://openalex.org/W2772741848","https://openalex.org/W4293182269"],"abstract_inverted_index":{"Software-defined":[0],"networking":[1],"(SDN)":[2],"decouples":[3],"the":[4,8,27,31,36,46,50,80,109,112,134,138],"control":[5,92],"plane":[6,33],"from":[7],"data":[9,32,47],"plane,":[10],"offering":[11],"flexible":[12],"network":[13,59],"configuration":[14],"and":[15,61,86,93,137,151,164],"management.":[16],"Because":[17],"of":[18,82,111,154],"this":[19,71],"architecture,":[20],"some":[21],"security":[22],"features":[23],"are":[24],"missing.":[25],"On":[26,49],"one":[28],"hand,":[29,52],"because":[30],"only":[34,55],"has":[35],"packet":[37],"forwarding":[38,127],"function,":[39],"it":[40,62],"is":[41,63,118],"impossible":[42,64],"to":[43,65,75,78,107,124],"effectively":[44],"authenticate":[45],"validity.":[48],"other":[51],"OpenFlow":[53],"can":[54,161],"match":[56],"based":[57,132],"on":[58,133],"characteristics,":[60],"achieve":[66],"fine-grained":[67,90,144],"access":[68,91,145],"control.":[69,128,146],"In":[70],"paper,":[72],"we":[73],"aim":[74],"develop":[76],"solutions":[77],"guarantee":[79],"validity":[81,113],"flow":[83,97,104,130,139],"in":[84,98],"SDN":[85],"present":[87],"Attribute-Guard,":[88],"a":[89,121,126],"authentication":[94,105,140],"scheme":[95],"for":[96],"SDN.":[99],"We":[100,147],"design":[101],"an":[102],"attribute-based":[103],"protocol":[106,141],"verify":[108],"legitimacy":[110],"flow.":[114,167],"The":[115,129,156],"attribute":[116,135],"identifier":[117,136],"used":[119],"as":[120],"matching":[122,131],"field":[123],"define":[125],"jointly":[142],"implement":[143],"conduct":[148],"theoretical":[149],"analysis":[150],"simulation-based":[152],"evaluation":[153],"Attribute-Guard.":[155],"results":[157],"show":[158],"that":[159],"Attribute-Guard":[160],"efficiently":[162],"identify":[163],"reject":[165],"fake":[166]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2}],"updated_date":"2026-04-18T07:56:08.524223","created_date":"2025-10-10T00:00:00"}
