{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T05:21:16Z","timestamp":1739337676388,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642033537"},{"type":"electronic","value":"9783642033544"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03354-4_49","type":"book-chapter","created":{"date-parts":[[2009,7,23]],"date-time":"2009-07-23T06:46:56Z","timestamp":1248331616000},"page":"663-678","source":"Crossref","is-referenced-by-count":1,"title":["A New Method for Creating Efficient Security Policies in Virtual Private Network"],"prefix":"10.1007","author":[{"given":"Mohammad Mehdi Gilanian","family":"Sadeghi","sequence":"first","affiliation":[]},{"given":"Borhanuddin","family":"Mohd Ali","sequence":"additional","affiliation":[]},{"given":"Hossein","family":"Pedram","sequence":"additional","affiliation":[]},{"given":"Mehdi","family":"Deghan","sequence":"additional","affiliation":[]},{"given":"Masoud","family":"Sabaei","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"49_CR1","volume-title":"IPSEC, The New Security Standard for Internet, Intranets, Virtual Private Network","author":"N. Doraswamy","year":"1999","unstructured":"Doraswamy, N., Harkind, D.: IPSEC, The New Security Standard for Internet, Intranets, Virtual Private Network. Prentice Hall PTR, Englewood Cliffs (1999)"},{"key":"49_CR2","doi-asserted-by":"crossref","unstructured":"Kent, S., Atkinson, R.: Security Architecture for the Internet Protocol. RFC 2401 (1998)","DOI":"10.17487\/rfc2401"},{"key":"49_CR3","doi-asserted-by":"crossref","unstructured":"Lupu, E.C., Sloman, M.: Conflict Analysis for Management Policies. In: 5th IFIP\/IEEE International Symposium on Integrated Network Management, pp. 430\u2013443 (1997)","DOI":"10.1007\/978-0-387-35180-3_32"},{"issue":"6","key":"49_CR4","doi-asserted-by":"publisher","first-page":"852","DOI":"10.1109\/32.824414","volume":"25","author":"E.C. Lupu","year":"1999","unstructured":"Lupu, E.C., Sloman, M.: Conflicts in Policy Based Distributed Systems Management. IEEE Transaction on Software Engineering\u00a025(6), 852\u2013869 (1999)","journal-title":"IEEE Transaction on Software Engineering"},{"key":"49_CR5","doi-asserted-by":"crossref","unstructured":"Fu, Z., Wu, S.F.: Automatic Generation of IPsec\/VPN policies in an Intra-Domain Environment. In: 12th International Workshop on Distributed System: operation & management (DSOM 2001), Nancy, France (2001)","DOI":"10.3990\/2.24"},{"key":"49_CR6","doi-asserted-by":"publisher","first-page":"1404","DOI":"10.1109\/49.257932","volume":"11","author":"J.D. Moffett","year":"1993","unstructured":"Moffett, J.D., Sloman, M.S.: Policy Hierarchies for Distributed Systems Management. IEEE Journal on Selected Areas in Communication\u00a011, 1404\u20131414 (1993)","journal-title":"IEEE Journal on Selected Areas in Communication"},{"key":"49_CR7","doi-asserted-by":"crossref","unstructured":"Blaze, M., Keromytis, A., Richardson, M., Sanchez, L.: IP Security Policy Requirements. Internet draft, draft-ietf-ipsp-requirements-02.txt, IPSP Working Group (2002)","DOI":"10.17487\/rfc3586"},{"key":"49_CR8","unstructured":"Condell, M., Lynn, C., Zao, J.: Security Policy Specification Language. Internet Draft, draft_ietf_ipsp_spsl_00.txt (2000)"},{"key":"49_CR9","unstructured":"Jason, J.: IPsec Configuration Policy Model. Internet Draft, draft_ietf_ipsp_config_ policy_model_00.txt (2000)"},{"key":"49_CR10","unstructured":"Pereira, R., Bhattacharya, P.: IPSec Policy Data Model. Internet Draft, draft_ietf_ipsec_policy_model_00.txt (1998)"},{"issue":"6","key":"49_CR11","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/MCOM.2003.1204750","volume":"41","author":"K.L.E. Law","year":"2003","unstructured":"Law, K.L.E.: Scalable Design of a Policy-Based Management System and its Performance. IEEE Communication Magazine\u00a041(6), 72\u201397 (2003)","journal-title":"IEEE Communication Magazine"},{"key":"49_CR12","unstructured":"Zao, J., Sanchez, L., Condell, M., Lyn, C., Fredette, M., Helinek, P., Krishnan, P., Jackson, A., Mankins, D., Shepard, M., Kent, S.: Domain Based Internet Security Policy Management. In: Proceedings of DARPA Information Survivability Conference and Exposition (2000)"},{"key":"49_CR13","unstructured":"Baek, S., Jeong, M., Park, J., Chung, T.: Policy-based Hybrid Management Architecture for IP-based VPN. In: Proceedings of 7th IEEE\/IFIP Network Operations and management Symposium (NOMS 2000), Honolulu, Hawaii (2000)"},{"key":"49_CR14","doi-asserted-by":"crossref","unstructured":"Fu, Z., Wu, S.F., Huang, H., Loh, K., Gong, F.: IPSec\/VPN Security Policy: Correctness, Conflict Detection and Resolution. In: IEEE policy 2001 Workshop (2001)","DOI":"10.1007\/3-540-44569-2_3"},{"key":"49_CR15","doi-asserted-by":"crossref","unstructured":"Yang, Y., Martel, C., Fu, Z., Wu, S.F.: IPsec\/VPN Security Policy Correctness and Assurance. In: Proceedings of Journal of High Speed Networking, Special issue on Managing Security Polices: Modeling, Verification and Configuration (2006)","DOI":"10.3233\/HSN-2006-291"},{"key":"49_CR16","doi-asserted-by":"crossref","unstructured":"Yang, Y., Martel, C., Wu, S.F.: On Building the Minimum Number of Tunnels \u2013 An Ordered-Split approach to manage IPsec\/VPN policies. In: Proceedings of 9th IEEE\/IFIP Network Operations and Management Symposium (NOMS 2004), Seoul, Korea (2004)","DOI":"10.1109\/NOMS.2004.1317665"},{"key":"49_CR17","doi-asserted-by":"crossref","unstructured":"Yang, Y., Fu, Z., Wu, S.F.: BANDS: An Inter-Domain Internet Security Policy Management System for IPSec\/VPN. In: Proceedings of 8th IFIP\/IEEE International Symposium on Integrated Network Management (IM 2003), Colorado (2003)","DOI":"10.1007\/978-0-387-35674-7_28"},{"key":"49_CR18","doi-asserted-by":"crossref","unstructured":"Al-Shaer, E., Hamed, H.: Taxonomy of Conflicts in Network Security Policies. Proceedings of IEEE Communications Magazine\u00a044(3) (2006)","DOI":"10.1109\/MCOM.2006.1607877"},{"key":"49_CR19","doi-asserted-by":"crossref","unstructured":"Hamed, H., Al-Shaer, E., Marrero, W.: Modeling and Verification of IPsec and VPN Security Policies. In: Proceedings of 13th IEEE International Conference on Network Protocols, ICNP 2005 (2005)","DOI":"10.1109\/ICNP.2005.25"},{"key":"49_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/11562436_18","volume-title":"Formal Techniques for Networked and Distributed Systems - FORTE 2005","author":"C.L. Chang","year":"2005","unstructured":"Chang, C.L., Chiu, Y.P., Lei, C.L.: Automatic Generation of Conflict-Free IPsec Policies. In: Wang, F. (ed.) FORTE 2005. LNCS, vol.\u00a03731, pp. 233\u2013246. Springer, Heidelberg (2005)"},{"key":"49_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/11568285_23","volume-title":"Ambient Networks","author":"N. Sheridan-Smith","year":"2005","unstructured":"Sheridan-Smith, N., Neill, T.O., Leaney, J.: Enhancements to Policy Distribution for Control Flow, Looping and Transactions. In: Sch\u00f6nw\u00e4lder, J., Serrat, J. (eds.) DSOM 2005. LNCS, vol.\u00a03775, pp. 269\u2013280. Springer, Heidelberg (2005)"},{"key":"49_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/11568285_8","volume-title":"Ambient Networks","author":"B. Kempter","year":"2005","unstructured":"Kempter, B., Danciu, V.: Generic policy conflict handling using a priori models. In: Sch\u00f6nw\u00e4lder, J., Serrat, J. (eds.) DSOM 2005. LNCS, vol.\u00a03775, pp. 84\u201396. Springer, Heidelberg (2005)"},{"key":"49_CR23","unstructured":"Yuan, L., Mai, J., Su, Z., Chen, H., Chuah, C.N., Mohapatra, P.: FIREMAN: A Toolkit for Firewall Modeling and Analysis. In: Proceedings of IEEE Symposium on Security and Privacy (2006)"},{"key":"49_CR24","unstructured":"Moffett, J.D.: Requirements and Policies. In: Position paper for Policy Workshop (1999)"},{"key":"49_CR25","unstructured":"Adiseshu, H., Suri, S., Parulkar, G.: Detecting and Resolving Packet Filter Conflicts. In: INFOCOM (2000)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Collaborative Computing: Networking, Applications and Worksharing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03354-4_49","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,11]],"date-time":"2025-02-11T09:47:36Z","timestamp":1739267256000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03354-4_49"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642033537","9783642033544"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03354-4_49","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2009]]}}}