Skip to main content

Table 4 Security countermeasures provided by publications in the area of virtual network security

From: Virtual network security: threats, countermeasures, and challenges

Publication

Countermeasures

 
 

AC

AU

CO

IN

NR

AV

[4]

  

×

   

[20]

  

×

   

[22]

  

×

   

[24]

  

×

   

[19]

×

×

×

   

[5]

×

×

×

×

  

[26]

 

×

×

×

 

×

[31]

 

×

×

×

 

×

[10]

  

×

×

  

[25]

 

×

    

[6]

     

×

[7]

     

×

[27]

     

×

[29]

     

×

[30]

     

×

[32]

     

×

[33]

     

×

[34]

     

×

[35]

     

×

  1. From left to right: Access Control, Authentication, Confidentiality, Integrity, Nonrepudiation, Availability.