{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:11:55Z","timestamp":1725538315149},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642040900"},{"type":"electronic","value":"9783642040917"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04091-7_15","type":"book-chapter","created":{"date-parts":[[2009,9,26]],"date-time":"2009-09-26T05:52:07Z","timestamp":1253944327000},"page":"117-126","source":"Crossref","is-referenced-by-count":5,"title":["Ontology-Based Policy Translation"],"prefix":"10.1007","author":[{"given":"Cataldo","family":"Basile","sequence":"first","affiliation":[]},{"given":"Antonio","family":"Lioy","sequence":"additional","affiliation":[]},{"given":"Salvatore","family":"Scozzi","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Vallini","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","unstructured":"Agrawal, D.: Business impact of research on policy for distributed systems and networks. In: IEEE POLICY 2007, Bologna, Italy (June 2007)"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Westerinen, A., Schnizlein, J., Strassner, J., et al.: Terminology for Policy-Based Management. RFC-3198 (November 2001)","DOI":"10.17487\/rfc3198"},{"key":"15_CR3","volume-title":"Policy Based Network Management","author":"J.C. Strassner","year":"2004","unstructured":"Strassner, J.C.: Policy Based Network Management. Morgan Kauffman Publishers, San Francisco (2004)"},{"issue":"5-6","key":"15_CR4","doi-asserted-by":"publisher","first-page":"907","DOI":"10.1006\/ijhc.1995.1081","volume":"43","author":"T.R. Gruber","year":"1995","unstructured":"Gruber, T.R.: Toward Principles for the Design of Ontologies Used for Knowledge Sharing. Int. Journal Human-Computer Studies\u00a043(5-6), 907\u2013928 (1995)","journal-title":"Int. Journal Human-Computer Studies"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Strassner, J., Neuman de Souza, J., Raymer, D., Samudrala, S., Davy, S., Barrett, K.: The design of a new policy model to support ontology-driven reasoning for autonomic networking. In: LANOMS 2007, Rio de Janeiro, Brasil, September 2007, pp. 114\u2013125 (2007)","DOI":"10.1109\/LANOMS.2007.4362466"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Tsoumas, B., Gritzalis, D.: Towards an ontology-based security management. In: Int. Conf. on Advanced Information Networking and Applications, Vienna, Austria, pp. 985\u2013992 (2006)","DOI":"10.1109\/AINA.2006.329"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Fenz, S., Ekelhart, A.: Formalizing information security knowledge. In: ASIACCS, Sydney, Australia, pp. 183\u2013194 (2009)","DOI":"10.1145\/1533057.1533084"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Ekelhart, A., Fenz, S., Klemen, M., Weippl, E.: Security ontologies: Improving quantitative risk analysis. In: Hawaii Int. Conf. on System Sciences, Big Island, Hawaii, p. 156a (2007)","DOI":"10.1109\/HICSS.2007.478"},{"issue":"4","key":"15_CR9","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MIS.2004.31","volume":"19","author":"A. Uszok","year":"2004","unstructured":"Uszok, A., Bradshaw, J.M., Johnson, M., Jeffers, R., Tate, A., Dalton, J., Aitken, S.: KAoS policy management for semantic web services. IEEE Intelligent Systems\u00a019(4), 32\u201341 (2004)","journal-title":"IEEE Intelligent Systems"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Uszok, A., Bradshaw, J., Lott, J.: et\u00a0al.: New developments in ontology-based policy management: Increasing the practicality and comprehensiveness of KAoS. In: IEEE POLICY 2008, Palisades, NY, USA, June 2008, pp. 145\u2013152 (2008)","DOI":"10.1109\/POLICY.2008.47"},{"issue":"3","key":"15_CR11","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/s10207-005-0074-z","volume":"5","author":"A. Mayer","year":"2006","unstructured":"Mayer, A., Wool, A., Ziskind, E.: Offline firewall analysis. Int. J. Inf. Secur.\u00a05(3), 125\u2013144 (2006)","journal-title":"Int. J. Inf. Secur."},{"issue":"1","key":"15_CR12","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/TNSM.2004.4623689","volume":"1","author":"E. Al-Shaer","year":"2004","unstructured":"Al-Shaer, E., Hamed, H.: Modeling and Management of Firewall Policies. IEEE Transactions on Network and Service Management\u00a01(1), 2\u201310 (2004)","journal-title":"IEEE Transactions on Network and Service Management"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Agrawal, D., Calo, S., Lee, K.W., Lobo, J.: Issues in designing a policy language for distributed management of it infrastructures. In: IFIP\/IEEE Int. Symp. on Integrated Network Management, Munich, Germany, pp. 30\u201339 (2007)","DOI":"10.1109\/INM.2007.374767"},{"key":"15_CR14","unstructured":"Moore, B., Ellesson, E., Strassner, J., Westerinen, A.: Policy core information model (RFC-3060) (February 2001)"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Moore, B.: Policy core information model (PCIM) extensions (RFC-3460) (January 2003)","DOI":"10.17487\/rfc3460"},{"key":"15_CR16","unstructured":"NIST: Role based access control, http:\/\/csrc.nist.gov\/groups\/SNS\/rbac\/"},{"key":"15_CR17","unstructured":"Loscocco, P.A., Smalley, S.D., Muckelbauer, P.A., Taylor, R.C., Turner, S.J., Farrell, J.F.: The inevitability of failure: The flawed assumption of security in modern computing environments. In: National Information Systems Security Conf., Crystal City, VA, USA, pp. 303\u2013314 (1998)"},{"key":"15_CR18","unstructured":"SANS: The SANS Security Policy Project, http:\/\/www.sans.org\/resources\/policies\/"},{"key":"15_CR19","unstructured":"POSITIF Consortium: The POSITIF system description language (P-SDL) (2007), http:\/\/www.positif.org\/"},{"key":"15_CR20","unstructured":"Clark, Parsia: Pellet: The open source OWL DL reasoner, http:\/\/clarkparsia.com\/pellet"},{"key":"15_CR21","unstructured":"Clark, K.G., Feigenbaum, L., Torres, E.: SPARQL protocol for RDF, http:\/\/www.w3.org\/TR\/rdf-sparql-protocol\/"},{"key":"15_CR22","unstructured":"HP-Labs: Jena a semantic web framework for java, http:\/\/jena.sourceforge.net\/"},{"key":"15_CR23","unstructured":"OASIS: Core and hierarchical role based access control (RBAC) profile of XACML v2.0, http:\/\/docs.oasis-open.org\/xacml\/2.0\/access_control-xacml-2.0-rbac-pro%file1-spec-os.pdf"},{"key":"15_CR24","unstructured":"Smith, M.K., Welty, C., McGuinness, D.L.: OWL web ontology language guide (2004), http:\/\/www.w3.org\/TR\/owl-guide\/"},{"key":"15_CR25","unstructured":"Stanford: Prot\u00e9g\u00e9, http:\/\/protege.stanford.edu\/"},{"key":"15_CR26","unstructured":"Bechhofer, S.: The DIG description logic interface: DIG\/1.0"}],"container-title":["Advances in Intelligent and Soft Computing","Computational Intelligence in Security for Information Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04091-7_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:39:01Z","timestamp":1606185541000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04091-7_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642040900","9783642040917"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04091-7_15","relation":{},"ISSN":["1867-5662","1867-5670"],"issn-type":[{"type":"print","value":"1867-5662"},{"type":"electronic","value":"1867-5670"}],"subject":[],"published":{"date-parts":[[2009]]}}}