Research Article
Attribute-Guard: Attribute-Based Flow Access Control Framework in Software-Defined Networking
Table 4
The granularity of flow authentication comparison.
| Schemes | Signature | Permission management | The granularity of authentication |
| SE-Floodlight | Role-based | Role-based | Three authorization roles | RoseMary | Role-based | Role-based | Three authorization roles | FRESCO | Role-based | Role-based | Three authorization roles | FortNOX | Role-based | Role-based | Three authorization roles | PERM-GUARD | Identity-based | Identity-based and access list | 16 permission | PermOF | No | Access control list and PKI | 18 permission | Attribute-Guard | Attribute-based | Attribute-based | Custom the number of access structure |
|
|