{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:18:23Z","timestamp":1725484703865},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540416104"},{"type":"electronic","value":"9783540445692"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-44569-2_8","type":"book-chapter","created":{"date-parts":[[2007,5,31]],"date-time":"2007-05-31T01:01:53Z","timestamp":1180573313000},"page":"120-136","source":"Crossref","is-referenced-by-count":10,"title":["Model-Based Tool-Assistance for Packet-Filter Design"],"prefix":"10.1007","author":[{"given":"Ingo","family":"L\u00fcck","sequence":"first","affiliation":[]},{"given":"Christian","family":"Sch\u00e4fer","sequence":"additional","affiliation":[]},{"given":"Heiko","family":"Krumm","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,2,8]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Y. Bartal, A. Mayer, K. Nissim and A. Wool: Firmato: A Novel Firewall Management Toolkit. In Proc. IEEE Computer Society Symposium on Security an Privacy, 1999.","DOI":"10.1109\/SECPRI.1999.766714"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"M. Casassa Mont, A. Baldwin, C. Goh: POWER Prototype: Towards Integrated Policy-Based Management. in Proc. of the IEEE\/IFIP Int. Symposium on Network Operations and Management NOMS 2000, IEEE, 2000.","DOI":"10.1109\/NOMS.2000.830429"},{"key":"8_CR3","unstructured":"Desktop Management Taskforce: Common Information Model-Specification 2.0; Desktop Management Taskforce Inc. DMTF, 1998, available via http:\/\/www.dmtf.org\/spec\/"},{"key":"8_CR4","unstructured":"Cisco Systems, Inc: Delivering end-to-end security in policy-based networks. http:\/\/www-uk.cisco.com\/warp\/public\/cc\/cisco\/mkt\/enm\/cap\/tech\/deesp_wp.htm , 1999."},{"key":"8_CR5","unstructured":"M. Ejiri, S. Goyal (eds.): Proc. of the IEEE\/IFIP Int. Symposium on Network Operations and Management NOMS.96, IEEE, 1996."},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"D.F. Ferraiolo, J.F. Barkley and D.R. Kuhn: A Role Based Access Control Model and Reference Implementation within a Corporate Intranet. ACM Transactions on Information Systems Security, Volume 1, Number 2, February 1999.","DOI":"10.1145\/300830.300834"},{"key":"8_CR7","volume-title":"Service Management and Availability Planning for Data Backup and Recovery","author":"M. Haworth","year":"1998","unstructured":"M. Haworth: Service Management and Availability Planning for Data Backup and Recovery; HP Open View Service Management Solutions, White paper, Hewlett-Packard Company, Palo Alto, 1998."},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"K. Heiler, R. Wies: Policy Driven Configuration Management of Network Devices. In [Eji96], pg. 674\u2013689, 1996.","DOI":"10.1109\/NOMS.1996.539527"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"A. Lazar et al. (eds.): Integrated Network Management V, Proc. 5th IFIP\/IEEE Int. Symposium on Integrated Network Management, Chapman & Hall, London, 1997.","DOI":"10.1007\/978-0-387-35180-3"},{"key":"8_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1007\/3-540-48100-1_19","volume-title":"Derivation of Backup Service Management Applications from Service and System Models","author":"I. L\u00fcck","year":"1999","unstructured":"I. L\u00fcck, M. Sch\u00f6nbach, A. Mester and H. Krumm: Derivation of Backup Service Management Applications from Service and System Models. In: R. Stadler, B. Stiller (Eds.), Active Technologies for Network and Service Management, Proc. DSOM.99, pages 243\u2013255, Z\u00fcrich, Oct. 1999, LNCS 1700, Springer-Verlag."},{"key":"8_CR11","volume-title":"Successful Deployment of IT Service Management in the Distributed Enterprise","author":"D. McBride","year":"1998","unstructured":"D. McBride: Successful Deployment of IT Service Management in the Distributed Enterprise; White paper, Hewlett-Packard Company, Palo Alto, 1998."},{"key":"8_CR12","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1109\/49.257932","volume":"11","author":"J. Moffet","year":"1993","unstructured":"J. Moffet, M. Sloman: Policy Hierarchies for Distributed Systems Management. IEEE Journal on Selected Areas in Communications, 11, 9, 1993.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"8_CR13","unstructured":"C.P. Pfleeger: Security in Computing (second edition). Prentice-Hall, Inc. 1997."},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"G. Rodosek, T. Kaiser: Determining the Availability of Distributed Applications; in [Laz97], pg. 207\u2013218, 1997.","DOI":"10.1007\/978-0-387-35180-3_16"},{"issue":"2","key":"8_CR15","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R. Sandhu","year":"1996","unstructured":"R. Sandhu, E. Coyne, H. Feinstein, Ch. Youman: Role-Based Access Control Models. IEEE Computer 29(2), pg. 38\u201347, 1996.","journal-title":"IEEE Computer"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"C.L. Schuba and E.H. Spafford: A Reference Model for Firewall Technology. First Annual Sprint Applied Research parTners Advanced Networking (SPARTAN) Symposium, March 1997.","DOI":"10.1109\/CSAC.1997.646183"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"M. Sloman: Policy Driven Management for Distributed Systems. Journal of Network and Systems Management, Plenum Press, Vol. 2, No. 4, 1994.","DOI":"10.1007\/BF02283186"},{"key":"8_CR18","volume-title":"The Unified Modelling Language User Guide","author":"G. Booch","year":"1997","unstructured":"G. Booch, J. Rumbaugh, I. Jacobson: The Unified Modelling Language User Guide; Addison-Wesley, Reading, 1997."},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"R. Wies: Using a Classification of Management Policies for Policy Specification and Policy Transformation. In Proc. of the 4th IFIP\/IEEE Int. Symposium on Integrated Network Management, Santa Barbara, 1995.","DOI":"10.1007\/978-0-387-34890-2_4"}],"container-title":["Lecture Notes in Computer Science","Policies for Distributed Systems and Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44569-2_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T13:33:07Z","timestamp":1556458387000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44569-2_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540416104","9783540445692"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/3-540-44569-2_8","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}