{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:25:28Z","timestamp":1725488728679},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540428800"},{"type":"electronic","value":"9783540456001"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45600-7_36","type":"book-chapter","created":{"date-parts":[[2007,8,11]],"date-time":"2007-08-11T08:21:49Z","timestamp":1186820509000},"page":"328-339","source":"Crossref","is-referenced-by-count":2,"title":["A Unified Methodology for Verification and Synthesis of Firewall Configurations"],"prefix":"10.1007","author":[{"given":"Yongyuth","family":"Permpoontanalarp","sequence":"first","affiliation":[]},{"given":"Chaiwat","family":"Rujimethabhas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,10,24]]},"reference":[{"key":"36_CR1","unstructured":"Cheswick W.R. and Bellovin S.M., Firewalls and Internet Security: Repelling the Wily Hacker, Addison-Wesley, 1994."},{"key":"36_CR2","unstructured":"Chapman D.B. and Zwicky E.D., Building Internet Firewall, O' Reilly & Associates, 1995."},{"key":"36_CR3","doi-asserted-by":"crossref","unstructured":"Permpoontanalarp Y. and Rujimethabhas C., A Graph Theoretic Model for Hardware-based Firewalls, In proceedings of 9th IEEE International Conference on Networks (ICON), Thailand, 2001.","DOI":"10.1109\/ICON.2001.962345"},{"key":"36_CR4","unstructured":"Gross J. and Yellen J., Graph Theory and its Applications, CRC Press LLC, 1998"},{"key":"36_CR5","unstructured":"Holzmann G.J., Design and Validation of Computer Protocols, Prentice Hall Software Series, 1991."},{"key":"36_CR6","doi-asserted-by":"crossref","unstructured":"Bartal Y., Mayer A., Nissim K. and Wool A., Firmato: A Novel Firewall Management Toolkit, In proceedings of 20th IEEE Symposium on Security & Privacy, Oakland, CA, 1999.","DOI":"10.1109\/SECPRI.1999.766714"},{"key":"36_CR7","doi-asserted-by":"crossref","unstructured":"Guttman J.D., Filtering Postures: Local Enforcement for Global Policies, In proceedings of 17th IEEE Symposium on Security & Privacy, Oakland, CA, 1997.","DOI":"10.1109\/SECPRI.1997.601327"},{"key":"36_CR8","doi-asserted-by":"crossref","unstructured":"Mayer A., Wool A. and Ziskind E., Fang: A Firewall Analysis Engine, In proceedings of 21st IEEE Symposium on Security & Privacy, Oakland, CA, 2000.","DOI":"10.1109\/SECPRI.2000.848455"},{"key":"36_CR9","unstructured":"Rujimethabhas C., A Graph-based Methodology for Hardware-based Firewalls, Master Thesis, Department of Computer Engineering, King Mongkut\u2019s University of Technology Thonburi, Bangkok, Thailand, 2001."}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45600-7_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,21]],"date-time":"2019-02-21T02:53:48Z","timestamp":1550717628000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45600-7_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540428800","9783540456001"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/3-540-45600-7_36","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}