{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T07:17:06Z","timestamp":1725520626141},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540881803"},{"type":"electronic","value":"9783540881810"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-88181-0_16","type":"book-chapter","created":{"date-parts":[[2008,10,20]],"date-time":"2008-10-20T11:31:09Z","timestamp":1224502269000},"page":"123-130","source":"Crossref","is-referenced-by-count":8,"title":["Automatic Verification of Firewall Configuration with Respect to Security Policy Requirements"],"prefix":"10.1007","author":[{"given":"Soutaro","family":"Matsumoto","sequence":"first","affiliation":[]},{"given":"Adel","family":"Bouhoula","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"16_CR1","first-page":"60","volume":"8","author":"H. Hamdi","year":"2008","unstructured":"Hamdi, H., Bouhoula, A., Mosbah, M.: A declarative approach for easy specification and automated enforcement of security policy. International Journal of Computer Science and Network Security\u00a08(2), 60\u201371 (2008)","journal-title":"International Journal of Computer Science and Network Security"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Abou El Kalam, A., Baida, R.E., Balbiani, P., Benferhat, S., Cuppens, F., Deswarte, Y., Mi\u00e9ge, A., Saurel, C., Trouessin, G.: Organization Based Access Control. In: 4th IEEE International Workshop on Policies for Distributed Systems and Networks (Policy 2003) (June 2003)","DOI":"10.1109\/POLICY.2003.1206966"},{"key":"16_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1007\/11430230_16","volume-title":"Testing of Communicating Systems","author":"D. Senn","year":"2005","unstructured":"Senn, D., Basin, D.A., Caronni, G.: Firewall conformance testing. In: Khendek, F., Dssouli, R. (eds.) TestCom 2005. LNCS, vol.\u00a03502, pp. 226\u2013241. Springer, Heidelberg (2005)"},{"key":"16_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1007\/11754008_22","volume-title":"Testing of Communicating Systems","author":"V. Darmaillacq","year":"2006","unstructured":"Darmaillacq, V., Fernandez, J.C., Groz, R., Mounier, L., Richier, J.L.: Test generation for network security rules. In: Uyar, M.\u00dc., Duale, A.Y., Fecko, M.A. (eds.) TestCom 2006. LNCS, vol.\u00a03964, pp. 341\u2013356. Springer, Heidelberg (2006)"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Abbes, T., Bouhoula, A., Rusinowitch, M.: Inference System for Detecting Firewall Filtering Rules Anomalies. In: Proceedings of the 23rd Annual ACM Symposium on Applied Computing, Fortaleza, Ceara, Brazil, pp. 2122\u20132128 (March 2008)","DOI":"10.1145\/1363686.1364197"},{"key":"16_CR6","unstructured":"Hazelhurst, S.: Algorithms for analysing firewall and router access lists. CoRR cs.NI\/0008006 (2000)"},{"key":"16_CR7","series-title":"Lecture Notes in Computer Science","first-page":"502","volume-title":"Theory and Applications of Satisfiability Testing","author":"N. E\u00e9n","year":"2003","unstructured":"E\u00e9n, N., S\u00f6rensson, N.: An extensible sat-solver. In: Giunchiglia, E., Tacchella, A. (eds.) SAT 2003. LNCS, vol.\u00a02919, pp. 502\u2013518. Springer, Heidelberg (2003)"}],"container-title":["Advances in Soft Computing","Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS\u201908"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-88181-0_16.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:56:57Z","timestamp":1619524617000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-88181-0_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540881803","9783540881810"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-88181-0_16","relation":{},"ISSN":["1867-5662","1860-0794"],"issn-type":[{"type":"print","value":"1867-5662"},{"type":"electronic","value":"1860-0794"}],"subject":[]}}