{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T20:17:14Z","timestamp":1743020234850,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540476597"},{"type":"electronic","value":"9783540476627"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11907466_17","type":"book-chapter","created":{"date-parts":[[2006,10,15]],"date-time":"2006-10-15T11:27:12Z","timestamp":1160911632000},"page":"197-208","source":"Crossref","is-referenced-by-count":1,"title":["ZERO-Conflict: A Grouping-Based Approach for Automatic Generation of IPSec\/VPN Security Policies"],"prefix":"10.1007","author":[{"given":"Kuong-Ho","family":"Chen","sequence":"first","affiliation":[]},{"given":"Yuan-Siao","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Tzong-Jye","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Chyi-Ren","family":"Dow","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Blaze, M., Keromytis, A., Richardson, M., Sanchez, L.: IP Security Policy (IPSP) Requirements, RFC 3586, IPSP Working Group (August 2003)","DOI":"10.17487\/rfc3586"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Chang, C.L., Chiu, Y.P., Lei, C.L.: Automatic Generation of Conflict-Free IPSec Policies. In: International Conference on Formal Techniques for Networked and Distributed Systems, pp. 233\u2013246 (October 2005)","DOI":"10.1007\/11562436_18"},{"issue":"24","key":"17_CR3","first-page":"44","volume":"10","author":"J. Conover","year":"1999","unstructured":"Conover, J.: Policy-Based Network Management. Network Computing\u00a010(24), 44\u201350 (1999)","journal-title":"Network Computing"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Fu, Z., Wu, S.F.: Automatic Generation of IPSec\/VPN Security Policies in an Intra-Domain Environment. In: 12th International Workshop on Distributed Systems: Operations & Management (DSOM 2001), pp. 279\u2013290 (2001)","DOI":"10.3990\/2.24"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Fu, Z., Wu, S.F., Huang, H., Loh, K., Gong, F., Baldine, I., Xu, C.: IPSec\/VPN Security Policy: Correctness, Conflict Detection, and Resolution. In: IEEE Policy 2001 Workshop, pp. 39\u201356 (2001)","DOI":"10.1007\/3-540-44569-2_3"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Hamed, H., Al-Shaer, E., Marrero, W.: Modeling and verification of IPSec and VPN security policies. In: 13th IEEE International Conference on Network Protocols (ICNP 2005), vol.\u00a00, pp. 259\u2013278 (November 2005)","DOI":"10.1109\/ICNP.2005.25"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Kent, S., Atkinson, R.: Security Architecture for the Internet Protocol. RFC 2401, Internet Society, Network Working Group (November 1998)","DOI":"10.17487\/rfc2401"},{"issue":"6","key":"17_CR8","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MNET.2003.1248659","volume":"17","author":"M. Li","year":"2003","unstructured":"Li, M.: Policy-based IPSec management. Network, IEEE\u00a017(6), 36\u201343 (2003)","journal-title":"Network, IEEE"},{"key":"17_CR9","unstructured":"Moffett, J.D.: Requirements and Policies. In: Position paper for Workshop on Policies in Distributed Systems, HP- Laboratories (November 1999)"},{"issue":"9","key":"17_CR10","doi-asserted-by":"publisher","first-page":"1404","DOI":"10.1109\/49.257932","volume":"11","author":"J.D. Moffett","year":"1993","unstructured":"Moffett, J.D., Sloman, M.S.: Policy Hierarchies for Distributed Systems Management. IEEE Journal on Selected Areas in Communication\u00a011(9), 1404\u20131414 (1993)","journal-title":"IEEE Journal on Selected Areas in Communication"},{"issue":"4","key":"17_CR11","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/BF02283186","volume":"2","author":"M. Sloman","year":"1994","unstructured":"Sloman, M.: Policy Driven Management for Distributed Systems. Journal of Network and Systems Management\u00a02(4), 333\u2013360 (1994)","journal-title":"Journal of Network and Systems Management"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Yang, Y., Martel, C.U., Wu, S.F.: On Building the Minimal Number of Tunnels - An Ordered-Split approach to manage IPSec\/VPN policies. In: 9th IEEE\/IFIP Network Operations and Management Symposium (NOMS 2004), vol.\u00a01, pp. 277\u2013290 (April 2004)","DOI":"10.1109\/NOMS.2004.1317665"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Yang, Y., Fu, Z., Wu, S.F.: BANDS: An Inter-Domain Internet Security Policy Management System for IPSec\/VPN. In: 8th IFIP\/IEEE International Symposium on Integrated Network Management 2003, pp. 231\u2013244 (March 2003)","DOI":"10.1007\/978-0-387-35674-7_28"}],"container-title":["Lecture Notes in Computer Science","Large Scale Management of Distributed Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11907466_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T14:20:35Z","timestamp":1736605235000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11907466_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540476597","9783540476627"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/11907466_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}