Research Article
A New Approach for Delivering Customized Security Everywhere: Security Service Chain
| | Input: Security request set , security function set , maximum number of iterations |  | Output: Instance combinations of SSCs |  | Initialize |  | while () |  | for all  and   do |  |  |  | Find the minimum  satisfying |  | end for |  | Compute |  | if   or   then |  |  |  | Assign all  to |  | end if |  | update(all  ) |  |  |  | end while |  | return |  | Function update(all  ) |  | for all  and   do |  | if    then |  | Backtrack set  from th element until |  | find the first element satisfying |  |  |  | end if |  |  |  |  |  | end for | 
 |