Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Mao Jian is active.

Publication


Featured researches published by Mao Jian.


network and system security | 2014

Hierarchical Solution for Access Control and Authentication in Software Defined Networks

He Shuangyu; Liu Jianwei; Mao Jian; Chen Jie

Software defined network(SDN) one of most popular and influential technique is an emerging network architecture. It has attracted great attention to reform its performance and extend its applications in recent years. Although this new architecture provides all parties with a common programming environment to drive differentiation, almost all studies focus on efficiency and utility. Few efforts have been made to enforce authentications or access control in SDN. In this paper, we propose a hierarchical attribute-based access control scheme by incorporating the hierarchical identity based encryption and cipherpolicy attribute based encryption(CP-ABE) system. Combing the hierarchical structure and the characteristic inherited from CP-ABE, the prosed scheme gains not only scalability, but also flexibility and fine-gained access control. Based on this we then present an authentication protocol for this special architecture to enhance the ability of controllers in SDN for managing the users, devices and data flows flexibly.Software defined network(SDN) one of most popular and influential technique is an emerging network architecture. It has attracted great attention to reform its performance and extend its applications in recent years. Although this new architecture provides all parties with a common programming environment to drive differentiation, almost all studies focus on efficiency and utility. Few efforts have been made to enforce authentications or access control in SDN. In this paper, we propose a hierarchical attribute-based access control scheme by incorporating the hierarchical identity based encryption and cipherpolicy attribute based encryption(CP-ABE) system. Combing the hierarchical structure and the characteristic inherited from CP-ABE, the prosed scheme gains not only scalability, but also flexibility and fine-gained access control. Based on this we then present an authentication protocol for this special architecture to enhance the ability of controllers in SDN for managing the users, devices and data flows flexibly.


Archive | 2014

Distributed cloud storage data integrity protection method

Mao Jian; Xu Xiandong; Liu Jianwei; Zhang Yan; Li Kun; Xiu Chundi


Archive | 2013

Publicly-verifiable cloud data possession checking method

Mao Jian; Feng Ke; Li Teng; Liu Jianwei; Zhang Yan; Zhang Jianhong


Archive | 2013

Mobile AD Hoc network self-adapting secure routing method based on reliability

Liu Jianwei; Liu Jing; Zheng Zhiming; Mao Jian; Xiu Chundi; Shang Tao; Chen Jianhua; Chen Qingyu


Archive | 2013

Integrity verification method of cloud storage data

Mao Jian; Li Teng; Zhang Yan; Feng Ke; Liu Jianwei; Wu Qianhong


Archive | 2015

Flow rule validity authentication method under software-defined networking

Liu Jianwei; Wang Mengmeng; Mao Jian; Chen Jie; Mao Kefei; Liu Zhe; Qiu Xiufeng


Archive | 2015

Efficient cloud storage data possession verification method

Mao Jian; Zhang Yan; Liu Jianwei; Xu Xiandong; Feng Ke; Shang Tao


Archive | 2014

Network backbone node selecting method for wireless sensor based on compressed sensing

Shang Tao; Pei Hengli; Liu Jianwei; Xiu Chundi; Mao Jian


Archive | 2014

Data integrity verifying method under multi-cloud environment

Mao Jian; Zhang Yan; Li Teng; Chen Yue; Liu Jianwei; Zhang Jianhong


Archive | 2016

Method and device for detecting abnormal behaviors of mobile application program

Mao Jian; Cui Jian; Wang Ruilong; Chen Yue; Wang Peiren; Liu Jianwei; Wu Qianhong

Collaboration


Dive into the Mao Jian's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge