2Voellmy A,Wang J.Scalable software defined network controllers[C]//Proceedings of the ACM SIGCOMM 2012 Conference on Applications,Technologies,Architectures,and Proto-cols for Computer Communication.ACM,2012:289-290.
3Xu K,Xiong H,Wu C,et al.Data-provenance verification for secure hosts[J].IEEE Transactions on Dependable and Secure Computing,2012,9(2):173-183.
4Rezvani M,Ignjatovic A,Bertino E,et al.Provenance-aware security risk analysis for hosts and network flows[C]//Procee-dingvS of the Network Operations and Management Symposium(NOMS).IEEE,2014:l-8.
5Alam SMI,Fahmy S.A practical approach for provenance transmission in wireless sensor networks[J].Ad Hoc Networks,2014,16:28-45.
6Gehani A,Tariq D.SPADE:Support for provenance auditing in distributed environments[C]// Proceedings of the 13th International Middleware Conference.Springer-Verlag New York,Inc.,2012:101-120.
7Hu F,Hao Q,Bao K.A survey on software-defined network and openflow:from concept to implementation[J].Communications Surveys & Tutorials IEEE,2014,16(4):2181-2206.
8Caraguay V,Leonardo A,Barona Lopez L I,et al.Evolution and challenges of software defined networking[C]//2013 IEEE SDN for Future Networks and Services(SDN4FNS).IEEE,2013:1-7.
9Kreutz D,Ramos F,Verissimo P.Towards secure and dependable software-defined networks[C]//Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking.ACM,2013:55-60.
10Bates A,Butler K,Haeberlen A,et al.Let SDN be your eyes:Secure forensics in data center networks[C]//Proceedings of the NDSS Workshop on Security of Emerging Network Technologies(SENT'14).2014.