Mao Jian
Beihang University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Mao Jian.
network and system security | 2014
He Shuangyu; Liu Jianwei; Mao Jian; Chen Jie
Software defined network(SDN) one of most popular and influential technique is an emerging network architecture. It has attracted great attention to reform its performance and extend its applications in recent years. Although this new architecture provides all parties with a common programming environment to drive differentiation, almost all studies focus on efficiency and utility. Few efforts have been made to enforce authentications or access control in SDN. In this paper, we propose a hierarchical attribute-based access control scheme by incorporating the hierarchical identity based encryption and cipherpolicy attribute based encryption(CP-ABE) system. Combing the hierarchical structure and the characteristic inherited from CP-ABE, the prosed scheme gains not only scalability, but also flexibility and fine-gained access control. Based on this we then present an authentication protocol for this special architecture to enhance the ability of controllers in SDN for managing the users, devices and data flows flexibly.Software defined network(SDN) one of most popular and influential technique is an emerging network architecture. It has attracted great attention to reform its performance and extend its applications in recent years. Although this new architecture provides all parties with a common programming environment to drive differentiation, almost all studies focus on efficiency and utility. Few efforts have been made to enforce authentications or access control in SDN. In this paper, we propose a hierarchical attribute-based access control scheme by incorporating the hierarchical identity based encryption and cipherpolicy attribute based encryption(CP-ABE) system. Combing the hierarchical structure and the characteristic inherited from CP-ABE, the prosed scheme gains not only scalability, but also flexibility and fine-gained access control. Based on this we then present an authentication protocol for this special architecture to enhance the ability of controllers in SDN for managing the users, devices and data flows flexibly.
Archive | 2014
Mao Jian; Xu Xiandong; Liu Jianwei; Zhang Yan; Li Kun; Xiu Chundi
Archive | 2013
Mao Jian; Feng Ke; Li Teng; Liu Jianwei; Zhang Yan; Zhang Jianhong
Archive | 2013
Liu Jianwei; Liu Jing; Zheng Zhiming; Mao Jian; Xiu Chundi; Shang Tao; Chen Jianhua; Chen Qingyu
Archive | 2013
Mao Jian; Li Teng; Zhang Yan; Feng Ke; Liu Jianwei; Wu Qianhong
Archive | 2015
Liu Jianwei; Wang Mengmeng; Mao Jian; Chen Jie; Mao Kefei; Liu Zhe; Qiu Xiufeng
Archive | 2015
Mao Jian; Zhang Yan; Liu Jianwei; Xu Xiandong; Feng Ke; Shang Tao
Archive | 2014
Shang Tao; Pei Hengli; Liu Jianwei; Xiu Chundi; Mao Jian
Archive | 2014
Mao Jian; Zhang Yan; Li Teng; Chen Yue; Liu Jianwei; Zhang Jianhong
Archive | 2016
Mao Jian; Cui Jian; Wang Ruilong; Chen Yue; Wang Peiren; Liu Jianwei; Wu Qianhong