Research Article

A New Approach for Delivering Customized Security Everywhere: Security Service Chain

Algorithm 1

Mapping SSC.
Input: Security request set , security function set , maximum number of iterations
Output: Instance combinations of SSCs
Initialize
while ()
for all and   do
Find the minimum satisfying
end for
Compute
if   or   then
Assign all to
end if
update(all  )
end while
return  
Function update(all  )
for all and   do
if    then
Backtrack set from th element until
find the first element satisfying
end if
end for