Research Article
Towards Supporting Security and Privacy for Social IoT Applications: A Network Virtualization Perspective
Algorithm 2
Network layered processing.
Input: ; ; physical network G. | Output: ; | ; = L.1; | for ; ; do | for each ; do | if && | ; | else if && ∈&& = | ; | end if | end for | ++; | end for | for L.X ≤ ; do | for ; do | ; | = .1; | for ; do | if &&&& | ; | end if | ++; | end for | end for | end for | return |
|