Solving security constraints for 5G slice embedding: A proof-of-concept.
François BoutignyStéphane Betgé-BrezetzGregory BlancAntoine LavignotteHervé DebarHouda JmilaPublished in: Comput. Secur. (2020)
Keyphrases
- constrained problems
- reducing the search space
- information security
- linear programming problems
- intrusion detection
- statistical databases
- mixed integer program
- linear constraints
- database systems
- combinatorial optimization
- constraint satisfaction
- linear programming
- constrained optimization
- geometric constraints
- watermarking algorithm
- security issues
- mixed integer
- constraint programming
- security mechanisms
- computer security
- access control