{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:35:26Z","timestamp":1725550526039},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540293880"},{"type":"electronic","value":"9783540322443"}],"license":[{"start":{"date-parts":[[2005,1,1]],"date-time":"2005-01-01T00:00:00Z","timestamp":1104537600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11568285_4","type":"book-chapter","created":{"date-parts":[[2005,10,8]],"date-time":"2005-10-08T09:06:33Z","timestamp":1128762393000},"page":"36-47","source":"Crossref","is-referenced-by-count":5,"title":["Improving the Configuration Management of Large Network Security Systems"],"prefix":"10.1007","author":[{"given":"Jo\u00e3o Porto","family":"de Albuquerque","sequence":"first","affiliation":[]},{"given":"Holger","family":"Isenberg","sequence":"additional","affiliation":[]},{"given":"Heiko","family":"Krumm","sequence":"additional","affiliation":[]},{"given":"Paulo L\u00edcio","family":"de Geus","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Bartal, Y., Mayer, A.J., Nissim, K., Wool, A.: Firmato: A novel firewall management toolkit. ACM Transactions on Computer Systems\u00a022(4) (November 2004)","DOI":"10.1145\/1035582.1035583"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Damianou, N., Dulay, N., Lupu, E., Sloman, M., Tonouchi, T.: Tools for domain-based policy management of distributed systems. In: IEEE\/IFIP Network Operations and Management Symposium (NOMS 2002), Florence, Italy (2002)","DOI":"10.1109\/NOMS.2002.1015565"},{"key":"4_CR3","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1007\/3-540-46037-3_28","volume-title":"Diagrammatic Representation and Inference","author":"O. K\u00f6th","year":"2002","unstructured":"K\u00f6th, O., Minas, M.: Structure, abstraction, and direct manipulation in diagram editors. In: Hegarty, M., Meyer, B., Narayanan, N.H. (eds.) Diagrams 2002. LNCS (LNAI), vol.\u00a02317, p. 290. Springer, Heidelberg (2002)"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Lymberopoulos, L., Lupu, E., Sloman, M.: Ponder policy implementation and validation in a CIM and differentiated services framework. In: IFIP\/IEEE Network Operations and Management Symposium (NOMS 2004), Seoul, Korea (April 2004)","DOI":"10.1109\/NOMS.2004.1317639"},{"key":"4_CR5","first-page":"589","volume-title":"Proc. 8th IEEE\/IFIP Network Operations and Management Symposium NOMS 2002","author":"I. L\u00fcck","year":"2002","unstructured":"L\u00fcck, I., V\u00f6gel, S., Krumm, H.: Model-based configuration of VPNs. In: Proc. 8th IEEE\/IFIP Network Operations and Management Symposium NOMS 2002, Florence, Italy, pp. 589\u2013602. IEEE, Los Alamitos (2002)"},{"issue":"9","key":"4_CR6","first-page":"11","volume":"11","author":"J.D. Moffett","year":"1993","unstructured":"Moffett, J.D., Sloman, M.S.: Policy hierarchies for distributed system management. IEEE JSAC Special Issue on Network Management\u00a011(9), 11 (1993)","journal-title":"IEEE JSAC Special Issue on Network Management"},{"key":"4_CR7","unstructured":"Musial, B., Jacobs, T.: Application of focus + context to UML. In: Australian Symposium on Information Visualisation, Adelaide, Australia. Conferences in Research and Practice in Information Technology, vol.\u00a024. ACS (2003)"},{"key":"4_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/11555827_17","volume-title":"Computer Security \u2013 ESORICS 2005","author":"J.P. Albuquerque de","year":"2005","unstructured":"de Albuquerque, J.P., Krumm, H., de Geus, P.L.: On scalability and modularisation in the modelling of security systems. In: di de Capitani Vimercati, S., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol.\u00a03679, pp. 287\u2013304. Springer, Heidelberg (2005)"},{"key":"4_CR9","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/POLICY.2005.24","volume-title":"POLICY 2005: Proceedings of the Sixth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2005)","author":"J.P. Albuquerque de","year":"2005","unstructured":"de Albuquerque, J.P., Krumm, H., de Geus, P.L.: Policy modeling and refinement for network security systems. In: POLICY 2005: Proceedings of the Sixth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2005), Washington, DC, USA, pp. 24\u201333. IEEE Computer Society, Los Alamitos (2005)"},{"issue":"2","key":"4_CR10","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R.S. Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Computer\u00a029(2), 38\u201347 (1996)","journal-title":"IEEE Computer"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Sarkar, M., Brown, M.H.: Graphical fisheye views of graphs. In: Proceedings of ACM CHI 1992 Conference on Human Factors in Computing Systems, Visualizing Objects, Graphs, and Video, pp. 83\u201391 (1992)","DOI":"10.1145\/142750.142763"}],"container-title":["Lecture Notes in Computer Science","Ambient Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11568285_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,13]],"date-time":"2019-03-13T02:03:50Z","timestamp":1552442630000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11568285_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540293880","9783540322443"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/11568285_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}