{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T14:31:13Z","timestamp":1742394673401,"version":"3.33.0"},"publisher-location":"Boston, MA","reference-count":15,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387723662"},{"type":"electronic","value":"9780387723679"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-0-387-72367-9_9","type":"book-chapter","created":{"date-parts":[[2007,11,9]],"date-time":"2007-11-09T23:12:08Z","timestamp":1194649928000},"page":"97-108","source":"Crossref","is-referenced-by-count":7,"title":["Management of Exceptions on Access Control Policies"],"prefix":"10.1007","author":[{"given":"J. G.","family":"Alfaro","sequence":"first","affiliation":[]},{"given":"F.","family":"Cuppens","sequence":"additional","affiliation":[]},{"given":"N.","family":"Cuppens-Boulahia","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Alfaro, J. G., Cuppens, F., and Cuppens-Boulahia, N. Analysis of Policy Anomalies on Distributed Network Security Setups. In 11th European Symposium On Research In Computer Security (Esorics 2006), pp. 496\u2013511, Hamburg, Germany, 2006.","DOI":"10.1007\/11863908_30"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Alfaro, J. G., Cuppens, F., and Cuppens-Boulahia, N. Towards Filtering and Alerting Rule Rewriting on Single-Component Policies. In Intl. Conference on Computer Safety, Reliability, and Security (Safecomp 2006), pp. 182\u2013194, Gdansk, Poland, 2006.","DOI":"10.1007\/11875567_14"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Alfaro, J. G., Cuppens, F., and Cuppens-Boulahia, N. Aggregating and Deploying Network Access Control Policies. In Symposium on Frontiers in Availability, Reliability and Security (FARES), 2nd International Conference on Availability, Reliability and Security (ARES 2007), Vienna, Austria, 2007.","DOI":"10.1109\/ARES.2007.34"},{"issue":"4","key":"9_CR4","first-page":"381","volume":"22","author":"Y. Bartal","year":"2004","unstructured":"Bartal, Y., Mayer, A., Nissim, K., Wool, A. Firmato: A novel firewall management toolkit ACM Transactions on Computer Systems (TOCS), 22(4):381\u2013420, 2004.","journal-title":"Firmato: A novel firewall management toolkit ACM Transactions on Computer Systems (TOCS)"},{"key":"9_CR5","unstructured":"Cuppens, F., Cuppens-Boulahia, N., and Alfaro, J. G. Detection and Removal of Firewall Misconfiguration. In Intl. Conference on Communication, Network and Information Security (CNIS05), pp. 154\u2013162, 2005."},{"key":"9_CR6","unstructured":"Cuppens, F., Cuppens-Boulahia, N., and Alfaro, J. G. Misconfiguration Management of Network Security Components. In 7th Intl. Symposium on System and Information Security, Sao Paulo, Brazil, 2005."},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Cuppens, F., Cuppens-Boulahia, N., Sans, T. and Miege, A. A formal approach to specify and deploy a network security policy. In 2nd Workshop on Formal Aspects in Security and Trust, pp. 203\u2013218, 2004.","DOI":"10.1007\/0-387-24098-5_15"},{"key":"9_CR8","volume-title":"A guide to the SQL standard","author":"C. J. Date","year":"1989","unstructured":"Date, C. J. A guide to the SQL standard. Addison-Wesley Longman Publishing Co., Inc. Boston, MA, USA, 1989."},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Gabillon, A. A formal access control model for XML databases. Lecture notes in computer science, 3674, pp. 86\u2013103, February 2005.","DOI":"10.1007\/11552338_7"},{"key":"9_CR10","unstructured":"Godik, S., Moses, T., and et al. extensible Access Control Markup Language (XACML) Version 2. Standard, OASIS. February 2005."},{"issue":"3","key":"9_CR11","doi-asserted-by":"crossref","first-page":"209","DOI":"10.3233\/HSN-2006-287","volume":"15","author":"H. Hamed","year":"2006","unstructured":"Hamed, H. and Al-Shaer, E. On autonomic optimization of firewall policy organization, Journal of High Speed Networks, 15(3):209\u2013227, 2006.","journal-title":"Journal of High Speed Networks"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Liu, A. X., Gouda, M. G., Ma, H. H., and Ngu, A. H. Firewall Queries. In Proceedings of the 8th International Conference on Principles of Distributed Systems (OPODIS-04), pp. 197\u2013212, 2004.","DOI":"10.1007\/11516798_15"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Mayer, A., Wool, A., Ziskind, E. Fang: A firewall analysis engine. Security and Privacy Proceedings, pp. 177\u2013187, 2000.","DOI":"10.1109\/SECPRI.2000.848455"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Paul, O., Laurent, M., and Gombault, S. A full bandwidth ATM Firewall. In Proceedings of the 6th European Symposium on Research in Computer Security (ESORICS 2000), pp. 206\u2013221, 2000.","DOI":"10.1007\/10722599_13"},{"key":"9_CR15","doi-asserted-by":"crossref","first-page":"803","DOI":"10.1007\/978-3-540-45235-5_79","volume":"2662","author":"B. Podey","year":"2003","unstructured":"Podey, B., Kessler, T., and Melzer, H.D. Network Packet Filter Design and Performance. Information Networking, Lecture notes in computer science, 2662, pp. 803\u2013816, 2003.","journal-title":"Information Networking, Lecture notes in computer science"}],"container-title":["IFIP International Federation for Information Processing","New Approaches for Security, Privacy and Trust in Complex Environments"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-72367-9_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,22]],"date-time":"2025-01-22T05:55:44Z","timestamp":1737525344000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-72367-9_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9780387723662","9780387723679"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-72367-9_9","relation":{},"ISSN":["1571-5736"],"issn-type":[{"type":"print","value":"1571-5736"}],"subject":[],"published":{"date-parts":[[2007]]}}}