{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T18:22:20Z","timestamp":1747333340925,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642011894"},{"type":"electronic","value":"9783642011900"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-01190-0_4","type":"book-chapter","created":{"date-parts":[[2009,4,27]],"date-time":"2009-04-27T14:29:35Z","timestamp":1240842575000},"page":"37-48","source":"Crossref","is-referenced-by-count":3,"title":["Ontology-Based Tools for Automating Integration and Validation of Firewall Rules"],"prefix":"10.1007","author":[{"given":"Ana-Maria","family":"Ghiran","sequence":"first","affiliation":[]},{"given":"Gheorghe Cosmin","family":"Silaghi","sequence":"additional","affiliation":[]},{"given":"Nicolae","family":"Tomai","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"6","key":"4_CR1","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MC.2004.2","volume":"37","author":"A. Wool","year":"2004","unstructured":"Wool, A.: A quantitative study of firewall configuration errors. Computer\u00a037(6), 62\u201367 (2004)","journal-title":"Computer"},{"unstructured":"W3C Consortium: Web ontology language (consulted on 28 January 2009), http:\/\/www.w3.org\/2004\/OWL\/","key":"4_CR2"},{"unstructured":"Horrocks, I., Patel-Schneider, P.F., Boley, H., Tabet, S., Grosof, B., Dean, M.: SWRL: A Semantic Web Rule Language Combining OWL and RuleML. W3C Member Submission (2004)","key":"4_CR3"},{"doi-asserted-by":"crossref","unstructured":"Wack, J., Cutler, K., Pole, J.: Guidelines on Firewalls and Firewall Policy: Recommendations of the National Institute of Standards and Technology. NIST special publication 800-41 (2002)","key":"4_CR4","DOI":"10.6028\/NIST.SP.800-41"},{"key":"4_CR5","first-page":"1203","volume-title":"IEEE INFOCOM 2000, The Conference on Computer Communications","author":"H. Adiseshu","year":"2000","unstructured":"Adiseshu, H., Suri, S., Parulkar, G.M.: Detecting and resolving packet filter conflicts. In: IEEE INFOCOM 2000, The Conference on Computer Communications, vol.\u00a03, pp. 1203\u20131212. IEEE Computer Society, Los Alamitos (2000)"},{"issue":"3","key":"4_CR6","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1109\/MCOM.2006.1607877","volume":"44","author":"H. Hamed","year":"2006","unstructured":"Hamed, H., Al-Shaer, E.: Taxonomy of conflicts in network security policies. IEEE Communications Magazine\u00a044(3), 134\u2013141 (2006)","journal-title":"IEEE Communications Magazine"},{"issue":"4","key":"4_CR7","doi-asserted-by":"publisher","first-page":"1106","DOI":"10.1016\/j.comnet.2006.06.015","volume":"51","author":"M.G. Gouda","year":"2007","unstructured":"Gouda, M.G., Liu, A.X.: Structured firewall design. Computer Networks\u00a051(4), 1106\u20131120 (2007)","journal-title":"Computer Networks"},{"key":"4_CR8","first-page":"256","volume-title":"IEEE Intl. Conf. on Communications","author":"E. Al-Shaer","year":"2003","unstructured":"Al-Shaer, E., Hamed, H.: Management and translation of filtering security policies. In: IEEE Intl. Conf. on Communications, pp. 256\u2013260. IEEE Computer Society, Los Alamitos (2003)"},{"key":"4_CR9","first-page":"199","volume-title":"IEEE Symposium on Security and Privacy","author":"L. Yuan","year":"2006","unstructured":"Yuan, L., Mai, J., Su, Z., Chen, H., Chuah, C.N., Mohapatra, P.: Fireman: A toolkit for firewall modeling and analysis. In: IEEE Symposium on Security and Privacy, pp. 199\u2013213. IEEE Computer Society, Los Alamitos (2006)"},{"key":"4_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/11516798_15","volume-title":"Principles of Distributed Systems","author":"A.X. Liu","year":"2005","unstructured":"Liu, A.X., Gouda, M.G., Ma, H.H., Ngu, A.H.: Firewall queries. In: Higashino, T. (ed.) OPODIS 2004. LNCS, vol.\u00a03544, pp. 197\u2013212. Springer, Heidelberg (2005)"},{"unstructured":"Eronen, P., Zitting, J.: An expert system for analyzing firewall rules. In: 6th Nordic Workshop on Secure IT Systems, Technical report IMM-TR-2001-14. Technical University of Denmark (2001)","key":"4_CR11"},{"unstructured":"The HLFL project (consulted on 28 January 2009), http:\/\/www.hlfl.org\/","key":"4_CR12"},{"unstructured":"The Dynamic XML firewall (consulted on 28 January 2009), http:\/\/daxfi.sourceforge.net","key":"4_CR13"},{"key":"4_CR14","first-page":"120","volume-title":"IEEE Symposium on Security and Privacy","author":"J.D. Guttman","year":"1997","unstructured":"Guttman, J.D.: Filtering postures: local enforcement for global policies. In: IEEE Symposium on Security and Privacy, pp. 120\u2013129. IEEE Computer Society, Los Alamitos (1997)"},{"unstructured":"Moses, T.: eXtensible Access Control Markup Language, Ver. 2.0. OASIS Standard (2005)","key":"4_CR15"},{"issue":"6","key":"4_CR16","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MIC.2004.53","volume":"8","author":"J.B.D. Joshi","year":"2004","unstructured":"Joshi, J.B.D., Bhatti, R., Bertino, E., Ghafoor, A.: Access-control language for multidomain environments. IEEE Internet Computing\u00a08(6), 40\u201350 (2004)","journal-title":"IEEE Internet Computing"},{"issue":"4","key":"4_CR17","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MIS.2004.31","volume":"19","author":"A. Uszok","year":"2004","unstructured":"Uszok, A., Bradshaw, J.M., Johnson, M., Jeffers, R., Tate, A., Dalton, J., Aitken, S.: KAoS policy management for semantic Web Services. IEEE Intelligent Systems\u00a019(4), 32\u201341 (2004)","journal-title":"IEEE Intelligent Systems"},{"key":"4_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/3-540-44569-2_2","volume-title":"Policies for Distributed Systems and Networks","author":"N. Damianou","year":"2001","unstructured":"Damianou, N., Dulay, N., Lupu, E., Sloman, M.: The PONDER policy specification language. In: Sloman, M., Lobo, J., Lupu, E.C. (eds.) POLICY 2001. LNCS, vol.\u00a01995, pp. 18\u201338. Springer, Heidelberg (2001)"},{"unstructured":"Hazelhurst, S., Fatti, A., Henwood, A.: Binary decision diagram representations of firewall and router access lists. Technical report, Department of Computer Science, University of the Witwatersrand, Johannesburg, South Africa (1998)","key":"4_CR19"},{"doi-asserted-by":"crossref","unstructured":"Fitzgerald, W.M., Foley, S.N., Foghl\u00fa, M.\u00d3.: Network access control interoperation using Semantic Web techniques. In: WOSIS 2008: 6th Intl. Workshop on Security in Information Systems, pp. 26\u201337. INSTICC Press (2008)","key":"4_CR20","DOI":"10.5220\/0001743300260037"},{"key":"4_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/978-3-540-30475-3_17","volume-title":"The Semantic Web \u2013 ISWC 2004","author":"H. Knublauch","year":"2004","unstructured":"Knublauch, H., Fergerson, R.W., Noy, N.F., Musen, M.A.: The Prot\u00e9g\u00e9 OWL plugin: An open development environment for Semantic Web applications. In: McIlraith, S.A., Plexousakis, D., van Harmelen, F. (eds.) ISWC 2004. LNCS, vol.\u00a03298, pp. 229\u2013243. Springer, Heidelberg (2004)"},{"unstructured":"Sirin, E., Parsia, B., Grau, B.C., Kalyanpur, A., Katz, Y.: Pellet: A practical OWL-DL reasoner. Technical report, University of Maryland (2005)","key":"4_CR22"},{"unstructured":"Haarslev, V., M\u00f6ller, R.: Racer: An OWL reasoning agent for the Semantic Web. In: Intl. Workshop on Applications, Products and Services of Web-based Support Systems, in conjunction with the 2003 IEEE\/WIC Intl. Conf. on Web Intelligence, pp. 91\u201395 (2003)","key":"4_CR23"},{"unstructured":"Frieman-Hill, E.: Jess in Action: Java Rule-Based Systems. Manning Publications (2003)","key":"4_CR24"}],"container-title":["Lecture Notes in Business Information Processing","Business Information Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-01190-0_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,9]],"date-time":"2025-02-09T05:47:55Z","timestamp":1739080075000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-01190-0_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642011894","9783642011900"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-01190-0_4","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2009]]}}}