{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T16:31:32Z","timestamp":1742920292693,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540232391"},{"type":"electronic","value":"9783540301899"}],"license":[{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30189-9_15","type":"book-chapter","created":{"date-parts":[[2010,9,22]],"date-time":"2010-09-22T15:28:48Z","timestamp":1285169328000},"page":"176-188","source":"Crossref","is-referenced-by-count":9,"title":["Automated Validation of Service Configuration on Network Devices"],"prefix":"10.1007","author":[{"given":"Sylvain","family":"Hall\u00e9","sequence":"first","affiliation":[]},{"given":"Rudy","family":"Deca","sequence":"additional","affiliation":[]},{"given":"Omar","family":"Cherkaoui","sequence":"additional","affiliation":[]},{"given":"Roger","family":"Villemaire","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"6","key":"15_CR1","doi-asserted-by":"publisher","first-page":"939","DOI":"10.1093\/logcom\/13.6.939","volume":"13","author":"N. Alechina","year":"2003","unstructured":"Alechina, N., Demri, S., De Rijke, M.: A modal perspective on path constraints. Journal of Logic and Computation\u00a013(6), 939\u2013956 (2003)","journal-title":"Journal of Logic and Computation"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Al-Shaer, E., Hamed, H.: Discovery of Policy Anomalies in Distributed Firewalls. In: Proc. IEEE INFOCOM (2004)","DOI":"10.1109\/INFCOM.2004.1354680"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Bush, R., Griffin, T.: Integrity for Virtual Private Routed Networks. In: Proc. IEEE INFOCOM (2003)","DOI":"10.1109\/INFCOM.2003.1208982"},{"issue":"4","key":"15_CR4","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1145\/604264.604278","volume":"30","author":"L. Cardelli","year":"2001","unstructured":"Cardelli, L.: Describing semistructured data. SIGMOD Record\u00a030(4), 80\u201385 (2001)","journal-title":"SIGMOD Record"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Cardelli, L., Ghelli, G.: TQL: A query language for semistructured data based on the ambient logic. Mathematical Structures in Computer Science (to appear)","DOI":"10.1017\/S0960129504004141"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Deca, R., Cherkaoui, O., Puche, D.: A Validation Solution for Network Configuration. In: Communications Networks and Services Research Conference (CNSR 2004), Fredericton, N.B. (2004)","DOI":"10.1109\/DNSR.2004.1344738"},{"key":"15_CR7","unstructured":"Distributed Management Task Force, http:\/\/www.dmtf.org\/"},{"key":"15_CR8","unstructured":"DSP111, DMTF white paper, Common Information Model core model, version 2.4, August 30 (2000)"},{"key":"15_CR9","series-title":"Lecture Notes in Computer Science","volume-title":"CONCUR \u201996: Concurrency Theory","author":"C. Fournet","year":"1996","unstructured":"Fournet, C., Gonthier, G., L\u00e9vy, J.-J., Maranget, L., R\u00e9my, D.: A Calculus of Mobile Agents. In: Sassone, V., Montanari, U. (eds.) CONCUR 1996. LNCS, vol.\u00a01119, Springer, Heidelberg (1996)"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Fuller, V., Li, T., Yu, J., Varadhan, K.: Classless Inter-Domain Routing (CIDR): an Address Assignment and Aggregation Strategy. RFC 1519 (1993)","DOI":"10.17487\/rfc1519"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Gottlob, G., Koch, C.: Monadic queries over tree-structured data. In: LICS 2002, pp. 189\u2013202 (2002)","DOI":"10.1109\/LICS.2002.1029828"},{"key":"15_CR12","unstructured":"ITU Recommendation M.3000, Overview of TMN Recommendations (February 2000)"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Mayer, A., Wool, A., Ziskind, E.: Fang: A Firewall Analysis Engine. In: Proc. IEEE Symposium on Security and Privacy (2000)","DOI":"10.1109\/SECPRI.2000.848455"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Miklau, G., Suciu, D.: Containment and equivalence for an Xpath fragment. In: Proc. PODS 2002, pp. 65\u201376 (2002)","DOI":"10.1145\/543613.543623"},{"key":"15_CR15","unstructured":"Pepelnjak, I., Guichard, J.: MPLS VPN Architectures. Cisco Press (2001)"},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Rekhter, Y., Li, T.: An Architecture for IP Address Allocation with CIDR. RFC 1518 (1993)","DOI":"10.17487\/rfc1518"},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"Rosen, E., Rekhter, Y.: BGP\/MPLS VPNs. RFC 2547 (1999)","DOI":"10.17487\/rfc2547"},{"key":"15_CR18","volume-title":"Virtual Private Networks","author":"C. Scott","year":"1998","unstructured":"Scott, C., Wolfe, P., Erwin, M.: Virtual Private Networks. O\u2019Reilly, Sebastopol (1998)"},{"key":"15_CR19","volume-title":"Directory Enabled Networks","author":"J. Strassner","year":"1999","unstructured":"Strassner, J., Baker, F.: Directory Enabled Networks. Macmillan Technical Publishing, Basingstoke (1999)"},{"key":"15_CR20","unstructured":"TQL web site, Universit\u00e0 di Pisa, http:\/\/tql.di.unipi.it\/tql\/"},{"key":"15_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/3-540-47959-7_3","volume-title":"Internet Programming Languages","author":"J. Vitek","year":"1999","unstructured":"Vitek, J., Castagna, G.: Seal: a framework for secure mobile computations. In: Bal, H.E., Cardelli, L., Belkhouche, B. (eds.) ICCL-WS 1998. LNCS, vol.\u00a01686, pp. 44\u201377. Springer, Heidelberg (1999)"}],"container-title":["Lecture Notes in Computer Science","Management of Multimedia Networks and Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30189-9_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,4]],"date-time":"2019-06-04T20:49:22Z","timestamp":1559681362000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30189-9_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540232391","9783540301899"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30189-9_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}