Research Article
A New Approach for Delivering Customized Security Everywhere: Security Service Chain
| Input: Security request set , security function set , maximum number of iterations | | Output: Instance combinations of SSCs | | Initialize | | while () | | for all and do | | | Find the minimum satisfying | | end for | | Compute | | if or then | | | Assign all to | | end if | | update(all ) | | | end while | | return | | Function update(all ) | | for all and do | | if then | | Backtrack set from th element until | | find the first element satisfying | | | end if | | | | end for |
|