{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T07:03:24Z","timestamp":1742972604538,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540859994"},{"type":"electronic","value":"9783540873532"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-87353-2_10","type":"book-chapter","created":{"date-parts":[[2008,9,25]],"date-time":"2008-09-25T14:40:21Z","timestamp":1222353621000},"page":"123-135","source":"Crossref","is-referenced-by-count":1,"title":["Multi-constraint Security Policies for Delegated Firewall Administration"],"prefix":"10.1007","author":[{"given":"C\u00e1ssio Ditzel","family":"Kropiwiec","sequence":"first","affiliation":[]},{"given":"Edgard","family":"Jamhour","sequence":"additional","affiliation":[]},{"given":"Manoel C.","family":"Penna","sequence":"additional","affiliation":[]},{"given":"Guy","family":"Pujolle","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Markham, T., Payne, C.: Security at the Network Edge: A Distributed Firewall Architecture. In: DARPA Information Survivability Conference and Exposition (DISCEX II 2001), vol.\u00a0I, p. 279 (2001)","DOI":"10.1109\/DISCEX.2001.932222"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Al-Shaer, E., Hamed, H.: Discovery of Policy Anomalies in Distributed Firewalls. In: 23rd Conference of the IEEE Communications Society (INFOCOMM), pp. 2605\u20132616 (2004)","DOI":"10.1109\/INFCOM.2004.1354680"},{"key":"10_CR3","unstructured":"Cisco Systems Inc.: Cisco PIX Firewall Command Reference (2004), http:\/\/www.cisco.com"},{"key":"10_CR4","unstructured":"Cisco Systems Inc.: Cisco IOS Reference Guide (2004), http:\/\/www.cisco.com"},{"key":"10_CR5","unstructured":"CheckPoint Software Technologies Ltd.: Stateful Inspection Technology (2005), http:\/\/www.checkpoint.com\/products"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Lee, T.K., Yusuf, S., Luk, W., Sloman, M., Lupu, E., Dulay, N.: Compiling Policy Descriptions into Reconfigurable Firewall Processors. In: 11th Annual IEEE Symposium on Field-Programmable Custom Computing Machines, pp. 39\u201348 (2003)","DOI":"10.1109\/FPGA.2003.1227240"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Damianou, N., Dulay, N., Lupu, E., Sloman, M.: The Ponder Policy Specification Language. In: Policy 2001: Workshop on Policies for Distributed Systems and Networks, pp. 18\u201339 (2001)","DOI":"10.1007\/3-540-44569-2_2"},{"key":"10_CR8","unstructured":"Haixin, D., Jianping, W., Xing, L.: Policy-Based Access Control Framework for Large Networks. In: Eighth IEEE International Conference on Networks, pp. 267\u2013273 (2000)"},{"key":"10_CR9","unstructured":"Ou, X., Govindavajhala, S., Appel, A.W.: Network security management with high-level security policies. Technical report TR-714-04, Computer Science Dept, Princeton University (2004)"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Burns, J., Cheng, A., Gurung, P., Rajagopalan, S., Rao, P., Rosenbluth, D., Surendran, A.V., Martin, J.D.M.: Automatic Management of Network Security Policy. In: DARPA Information Survivability Conference and Exposition, vol.\u00a0II, pp. 12\u201326 (2001)","DOI":"10.1109\/DISCEX.2001.932156"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Guttman, J.D.: Filtering postures: local enforcement for global policies. In: IEEE Symposium on Security and Privacy, pp. 120\u2013129 (1997)","DOI":"10.1109\/SECPRI.1997.601327"},{"issue":"4","key":"10_CR12","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1145\/1035582.1035583","volume":"22","author":"Y. Bartal","year":"2004","unstructured":"Bartal, Y., Mayer, A.J., Nissin, K., Wool, A.: Firmato: A novel firewall management toolkit. ACM Transactions on Computer Systems\u00a022(4), 381\u2013420 (2004)","journal-title":"ACM Transactions on Computer Systems"},{"key":"10_CR13","unstructured":"DOD: Trusted Computer Security Evaluation Criteria. DOD 5200.28-STD. Department of Defense (1985)"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Albuquerque, J.P., Krumm, H., Geus, P.L.: Policy Modeling and Refinement for Network Security Systems. In: IEEE 6th International Workshop on Policies for Distributed Systems and Networks, pp. 24\u201333 (2005)","DOI":"10.1109\/POLICY.2005.24"},{"key":"10_CR15","volume-title":"The Z notation: a reference manual","author":"J.M. Spivey","year":"1992","unstructured":"Spivey, J.M.: The Z notation: a reference manual. Prentice Hall International (UK) Ltd, Hertfordshire (1992)"},{"key":"10_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1007\/BFb0027284","volume-title":"ZUM\u201997: The Z Formal Specification Notation","author":"M. Saaltink","year":"1997","unstructured":"Saaltink, M.: The Z\/EVES system. In: Bowen, J.P., Hinchey, M.G., Till, D. (eds.) ZUM 1997. LNCS, vol.\u00a01212, pp. 72\u201385. Springer, Heidelberg (1997)"},{"key":"10_CR17","unstructured":"Kropiwiec, C.D.: Z-specification for Firewall Policies, Algorithms and Theorem Proofs (2008), http:\/\/www.ppgia.pucpr.br\/jamhour\/Research\/"}],"container-title":["Lecture Notes in Computer Science","Managing Large-Scale Service Deployment"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-87353-2_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T02:37:29Z","timestamp":1738377449000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-87353-2_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540859994","9783540873532"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-87353-2_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}