{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:53:03Z","timestamp":1740099183527,"version":"3.37.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030000202"},{"type":"electronic","value":"9783030000219"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00021-9_3","type":"book-chapter","created":{"date-parts":[[2018,9,25]],"date-time":"2018-09-25T11:21:11Z","timestamp":1537874471000},"page":"26-36","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Security Classification Transmission Method Based on SDN in Industrial Networks"],"prefix":"10.1007","author":[{"given":"Jianming","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Wenli","family":"Shang","sequence":"additional","affiliation":[]},{"given":"Zhoubin","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Zixiang","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,26]]},"reference":[{"key":"3_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10922-016-9393-9","volume":"25","author":"S Singh","year":"2017","unstructured":"Singh, S., Jha, R.K.: A survey on software defined networking: architecture for next generation network. J. Netw. Syst. Manag. 25, 1\u201354 (2017)","journal-title":"J. Netw. Syst. Manag."},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Scott-Hayward, S., O\u2019Callaghan, G., Sezer, S.: SDN Security: A Survey Future Networks and Services, pp. 1\u20137. IEEE, Trento (2013)","DOI":"10.1109\/SDN4FNS.2013.6702553"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Adami, D., Giordano, S., D\u2019Amore, G., et al.: A new SDN traffic control application for security routing in critical infrastructures. In: The 13th International Joint Conference on e-Business and Telecommunications, pp. 129\u2013138. SCITEPRESS-Science and Technology Publications, Lda (2016)","DOI":"10.5220\/0006017501290138"},{"issue":"10","key":"3_CR4","doi-asserted-by":"publisher","first-page":"2236","DOI":"10.1109\/TIFS.2015.2453936","volume":"10","author":"S Shin","year":"2015","unstructured":"Shin, S., Wang, H., Gu, G.: A first step toward network security virtualization: from concept to prototype. IEEE Trans. Inf. Forensics Secur. 10(10), 2236\u20132249 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2\u20133","key":"3_CR5","first-page":"1","volume":"86","author":"M Wang","year":"2016","unstructured":"Wang, M., Liu, J., Chen, J., et al.: Perm-guard: authenticating the validity of flow rules in software defined networking. J. Signal Process. Syst. 86(2\u20133), 1\u201317 (2016)","journal-title":"J. Signal Process. Syst."},{"issue":"2","key":"3_CR6","first-page":"522","volume":"34","author":"L Binkui","year":"2017","unstructured":"Binkui, L., Lei, Z., et al.: Security routing strategy based on switch level division in SDN. Appl. Res. Comput. 34(2), 522\u2013525 (2017)","journal-title":"Appl. Res. Comput."},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Henneke, D., Wisniewski, L., Jasperneite, J.: Analysis of realizing a future industrial network by means of Software-Defined Networking (SDN). In: IEEE World Conference on Factory Communication Systems, pp. 1\u20134. IEEE, Aveiro (2016)","DOI":"10.1109\/WFCS.2016.7496525"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Hussein, A., Elhajj, I.H., Chehab, A., Kayssi, A.: SDN security plane: an architecture for resilient security services. In: IEEE International Conference on Cloud Engineering Workshop, pp. 54\u201359. IEEE, Berlin (2016)","DOI":"10.1109\/IC2EW.2016.15"},{"issue":"2","key":"3_CR9","first-page":"289","volume":"5","author":"W Yahya","year":"2015","unstructured":"Yahya, W., Basuki, A., Jiang, J.R.: The extended dijkstra\u2019s-based load balancing for openflow network. Int. J. Electr. Comput. Eng. 5(2), 289\u2013296 (2015)","journal-title":"Int. J. Electr. Comput. Eng."},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Singh, V.K., Nimisha, I.K.T.: Applications of maximal network flow problems in transportation and assignment problems. J. Math. Res. 2(1) (2010)","DOI":"10.5539\/jmr.v2n1p28"},{"key":"3_CR11","unstructured":"Mininet tools. http:\/\/mininet.org\/ . Accessed 11 Feb 2018"},{"key":"3_CR12","unstructured":"Project Floodlight. http:\/\/www.projectfloodlight.org\/ . Accessed 11 Feb 2018"},{"issue":"2","key":"3_CR13","first-page":"248","volume":"45","author":"W Ming","year":"2016","unstructured":"Ming, W., Wenli, S., Peng, Z., et al.: Modbus\/TCP communication access control method based on function code depth detection. Inf. Control 45(2), 248\u2013256 (2016)","journal-title":"Inf. Control"},{"key":"3_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/978-3-642-28537-0_9","volume-title":"Passive and Active Measurement","author":"C Rotsos","year":"2012","unstructured":"Rotsos, C., Sarrar, N., Uhlig, S., Sherwood, R., Moore, Andrew W.: OFLOPS: an open framework for openflow switch evaluation. In: Taft, N., Ricciato, F. (eds.) PAM 2012. LNCS, vol. 7192, pp. 85\u201395. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-28537-0_9"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Gelberger, A., Yemini, N., Ran, G.: Performance analysis of software-defined networking (SDN). In: IEEE International Symposium on Modelling, Analysis & Simulation of Computer and Telecommunication Systems, pp. 389\u2013393. IEEE Computer Society, San Francisco (2013)","DOI":"10.1109\/MASCOTS.2013.58"}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00021-9_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,24]],"date-time":"2019-10-24T16:57:36Z","timestamp":1571936256000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00021-9_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030000202","9783030000219"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00021-9_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cloud Computing and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Haikou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icccsconf.org\/icccs2018.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}