Skip to main content

Advertisement

Table 2 Permission data base example

From: Vulnerabilities and solutions for isolation in FlowVisor-based virtual network environments

Virtual network OpenFlow Action 1 OF Action 2 ... OF Action N
  (send to controller) (discard)   
Controller A Allowed Denied ... Denied
Controller B Denied Denied ... Allowed
Controller C Allowed Allowed ... Allowed