Research Article
A New Approach for Delivering Customized Security Everywhere: Security Service Chain
Input: Security request set , security function set , maximum number of iterations | Output: Instance combinations of SSCs | Initialize | while () | for all and do | | Find the minimum satisfying | end for | Compute | if or then | | Assign all to | end if | update(all ) | | end while | return | Function update(all ) | for all and do | if then | Backtrack set from th element until | find the first element satisfying | | end if | | | end for |
|