{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T21:53:54Z","timestamp":1725573234664},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540274179"},{"type":"electronic","value":"9783540320098"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11520184_3","type":"book-chapter","created":{"date-parts":[[2010,12,20]],"date-time":"2010-12-20T18:42:54Z","timestamp":1292870574000},"page":"25-43","source":"Crossref","is-referenced-by-count":3,"title":["Policy Interoperability and Network Autonomics"],"prefix":"10.1007","author":[{"given":"Shane","family":"Magrath","sequence":"first","affiliation":[]},{"given":"Robin","family":"Braun","sequence":"additional","affiliation":[]},{"given":"Fernando","family":"Cuervo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/65.993218","volume":"2","author":"M. Sloman","year":"2002","unstructured":"Sloman, M., Lupu, E.: Security and Management Policy Specification. IEEE Network\u00a02, 10\u201319 (2002)","journal-title":"IEEE Network"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Lupu, E., Milosevic, Z., Sloman, M.: Use of Roles and Policies for Specifying and Managing a Virtual Enterprise. In: Proceedings., Ninth International Workshop on Research Issues on Data Engineering: Information Technology for Virtual Enterprises, 1999. RIDE-VE 1999, pp. 72\u201379 (1999)","DOI":"10.1109\/RIDE.1999.758604"},{"key":"3_CR3","volume-title":"Policy-Based Network Management - Solutions for the Next Generation","author":"J. Strassner","year":"2003","unstructured":"Strassner, J.: Policy-Based Network Management - Solutions for the Next Generation. Morgan-Kaufmann, San Francisco (2003)"},{"key":"3_CR4","unstructured":"TMF: The NGOSS Technology Neutral Architecture Specification V3.0. Technical Report TMF053, TMF (2003)"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Westerinen, A., Schnizlein, J., Strassner, J., Scherling, M., Quinn, B., Herzog, S., Huynh, A., Carlson, M., Perry, J., Waldbusser, S.: Terminology for Policy-Based Management. In: Informational RFC 3198, IETF, Network Working Group (2001)","DOI":"10.17487\/rfc3198"},{"key":"3_CR6","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/65.993219","volume":"16","author":"D. Verma","year":"2002","unstructured":"Verma, D.: Simplifying Network Administration Using Policy-Based Management. IEEE Network\u00a016, 20\u201326 (2002)","journal-title":"IEEE Network"},{"key":"3_CR7","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/65.793689","volume":"13","author":"R. Rajan","year":"1999","unstructured":"Rajan, R., Verma, D., Kamat, S., Felstaine, E., Herzog, S.: A Policy Framework for Integrated and Differentiated Services in the Internet. IEEE Network\u00a013, 36\u201341 (1999)","journal-title":"IEEE Network"},{"key":"3_CR8","unstructured":"Verma, D.C.: Policy-Based Networking: Architecture and Algorithms. New Riders (2001)"},{"key":"3_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/3-540-44569-2_9","volume-title":"Policies for Distributed Systems and Networks","author":"D. Verma","year":"2001","unstructured":"Verma, D., Beigi, M., Jennings, R.: Policy Based SLA Management in Enterprise Networks. In: Sloman, M., Lobo, J., Lupu, E.C. (eds.) POLICY 2001. LNCS, vol.\u00a01995, p. 137. Springer, Heidelberg (2001)"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Lupu, E., Sloman, M.: A Policy Based Role Object Model. In: Proceedings of First International, Enterprise Distributed Object Computing Workshop 1997, EDOC 1997, pp. 36\u201347 (1997)","DOI":"10.1109\/EDOC.1997.628345"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Damianou, N., Dulay, N., Lupu, E., Sloman, M., Tonouchi, T.: Tools for Domain-Based Policy Management of Distributed Systems. In: Network Operations and Management Symposium 2002, NOMS 2002, pp. 203\u2013217. IEEE\/IFIP (2002)","DOI":"10.1109\/NOMS.2002.1015565"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Robinson, D., Sloman, M.: Domains: A New Approach to Distributed System Management. In: Proceedings of Workshop on the Future Trends of. Distributed Computing Systems in the 1990s 1998, pp. 154\u2013163 (1988)","DOI":"10.1109\/FTDCS.1988.26694"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Sloman, M., Magee, J., Twidle, K., Kramer, J.: An Architecture for Managing Distributed Systems. In: Proceedings of the Fourth Workshop on Future Trends of. Distributed Computing Systems, 1993, pp. 40\u201346 (1993)","DOI":"10.1109\/FTDCS.1993.344178"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Bandara, A.K., Lupu, E., Russo, A.: Using Event Calculus to Formalise Policy Specification and Analysis. In: IEEE Workshop on Policies for Distributed Systems and Networks, Policy 2003 (2003)","DOI":"10.1109\/POLICY.2003.1206955"},{"key":"3_CR15","unstructured":"Damianou, N.: A Policy Framework for Management of Distributed Systems. PhD thesis, Department of Computing. Imperial College, London (2002)"},{"key":"3_CR16","doi-asserted-by":"publisher","first-page":"1107","DOI":"10.1109\/INFCOM.2000.832468","volume-title":"Proceedings of Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies, INFOCOM 2000","author":"R. Bhatia","year":"2000","unstructured":"Bhatia, R., Lobo, J., Kohli, M.: Policy Evaluation for Network Management. In: Proceedings of Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies, INFOCOM 2000, vol.\u00a03, pp. 1107\u20131116. IEEE, Los Alamitos (2000)"},{"key":"3_CR17","unstructured":"Kohli, M., Lobo, J.: Realizing Network Control Policies Using Distributed Action Plans. Journal of Network and Systems Management\u00a011 (2003)"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Kanada, Y.: Policy Division and Fusion: Examples and a Method-or, Multiple Classifiers Considered Harmful. In: Proceedings of IEEE\/IFIP International Symposium on Integrated Network Management, pp. 545\u2013560 (2001)","DOI":"10.1109\/INM.2001.918065"},{"key":"3_CR19","unstructured":"Kanada, Y., O\u2019Keefe, B.J.: Rule-Based Building-Block Architectures for Policy-Based Networking. Journal of Network and Systems Management\u00a011 (2003)"},{"key":"3_CR20","doi-asserted-by":"crossref","unstructured":"Strassner, J.: Autonomic networking - theory and practice (tutorial seven). In: 2004 IEEE\/IFIP Network Operations and Management Symposium (2004)","DOI":"10.1109\/NOMS.2004.1317811"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Cuervo, F., Sim, M.: Policy Control Model: a Key Factor for the Success of Policy in Telecom Applications. In: IEEE 5th International Workshop on Policies for Distributed Systems and Networks, POLICY 2004 (2004)","DOI":"10.1109\/POLICY.2004.1309174"},{"key":"3_CR22","unstructured":"Seagall, B., Arnold, D.: Elvin has left the building: A publish\/subscribe notification service with quenching. In: Australian Unix and Open Systems Group (1997)"},{"key":"3_CR23","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/0004-3702(82)90020-0","volume":"19","author":"C.L. Forgy","year":"1982","unstructured":"Forgy, C.L.: Rete: A Fast Algorithm for the Many Pattern\/Many Object Pattern Match Problem. Artificial Intelligence\u00a019, 17\u201337 (1982)","journal-title":"Artificial Intelligence"},{"key":"3_CR24","unstructured":"Miranker, D.P.: TREAT: A Better Match Algorithm for AI Production Systems. In: National Conference on Artificial Intelligence, vol.\u00a01, pp. 42\u201347 (1987)"},{"key":"3_CR25","doi-asserted-by":"crossref","unstructured":"Perlin, M.: Incremental binding-space match: The linearized matchbox algorithm. In: Proceedings of the IEEE Conference on Tools for AI. (1991)","DOI":"10.1109\/TAI.1991.167028"},{"key":"3_CR26","unstructured":"various: Design Principles for the Immune Systems and Other Distributed Autonomous Systems. In: Santa Fe Institute Studies in the Sciences of Complexity. Oxford University Press, Oxford (2001)"},{"key":"3_CR27","volume-title":"Santa Fe Institute Studies in the Sciences of Complexity","author":"E. Bonabeau","year":"1999","unstructured":"Bonabeau, E., Dorigo, M., Theraulaz, G.: Swarm Intelligence: From Natural to Artificial Systems. In: Santa Fe Institute Studies in the Sciences of Complexity. Oxford University Press, Oxford (1999)"}],"container-title":["Lecture Notes in Computer Science","Autonomic Communication"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11520184_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:46:28Z","timestamp":1619505988000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11520184_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540274179","9783540320098"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/11520184_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}