{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T14:58:19Z","timestamp":1725548299181},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642041167"},{"type":"electronic","value":"9783642041174"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-04117-4_11","type":"book-chapter","created":{"date-parts":[[2010,2,22]],"date-time":"2010-02-22T11:44:00Z","timestamp":1266839040000},"page":"207-219","source":"Crossref","is-referenced-by-count":1,"title":["Intranet Security via Firewalls"],"prefix":"10.1007","author":[{"given":"Inderjeet","family":"Pabla","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ibrahim","family":"Khalil","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jiankun","family":"Hu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"11_CR1","unstructured":"CiscoSystems: Cisco PIX Firewall and VPN Configuration Guide, Version 6.3 (Cisco Systems Inc Version 6.3, 2003)"},{"key":"11_CR2","unstructured":"F.\u00a0Cuppens, N.\u00a0Cuppens, J.\u00a0Garca-Alfaro: Detection and Removal of Firewall Misconfiguration, Proc. 2005 IASTED International Conference on Communication, Network and Information Security (CNIS 2005) (IASTED PRESS, 2005)"},{"issue":"10","key":"11_CR3","doi-asserted-by":"publisher","first-page":"2069","DOI":"10.1109\/JSAC.2005.854117","volume":"23","author":"R. Boutaba","year":"2005","unstructured":"R.\u00a0Boutaba, M.\u00a0Hasan, E.\u00a0Al-Shaer, H.\u00a0Hamed: Conflict classification and analysis of distributed firewall policies, IEEE J. Selected Areas in Commun. 23(10), 2069\u20132084 (2005)","journal-title":"IEEE J. Selected Areas in Commun."},{"key":"11_CR4","unstructured":"CiscoSystems: PIX Firewall Software Version 6.3 Commands (Cisco Systems Inc, 2002)"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"E.\u00a0Al-Shaer, H.\u00a0Hamed: Firewall policy advisor for anomaly detection and rule editing, Proc. IEEE\/IFIP 8th Int. Symp. Integrated Network Management (IM 2003) (2003)","DOI":"10.1007\/978-0-387-35674-7_2"},{"key":"11_CR6","unstructured":"W.R.\u00a0Cheswick, S.M.\u00a0Bellovin: Firewalls and Internet Security; Repelling the Wily Hacker (Addison Wesley, NJ, USA 1994)"},{"key":"11_CR7","unstructured":"E.D.\u00a0Zwicky, S.\u00a0Cooper, D.B.\u00a0Chapman: Building Internet firewalls, 2nd edn. (O\u2019Reilly, USA 2000)"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"T.E.\u00a0Uribe, S.\u00a0Cheung: Automatic analysis of firewall and network intrusion detection system configurations, Proc. 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, ed. by V.\u00a0Atluri, M.\u00a0Backes, D.A.\u00a0Basin, M.\u00a0Waidner (ACM, 2004)","DOI":"10.1145\/1029133.1029143"},{"key":"11_CR9","unstructured":"S. Suri, G. Varghese: Packet Filtering in High Speed Networks (SODA, 1999)"},{"key":"11_CR10","unstructured":"Scott Hazelhurst: Algorithms for Analysing Firewall and Router Access Lists (CoRR, 2000)"},{"key":"11_CR11","unstructured":"T.Y.C.\u00a0Woo: A modular approach to packet classification: algorithms and results, Proc. IEEE INFOCOM \u201900 (2000)"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"E.W.\u00a0Fulp, S.J.\u00a0Tarsa: Trie-Based Policy Representations for Network Firewalls, Proc. 10th IEEE Symposium on Computers and Communications ISCC 2005 (IEEE Comput. Soc., 2005) pp. 434\u2013441","DOI":"10.1109\/ISCC.2005.149"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"P. Gupta, N. McKeown: Packet Classification on Multiple Fields (SIGCOMM, 1999)","DOI":"10.1145\/316188.316217"},{"key":"11_CR14","unstructured":"H. Adiseshu, S. Suri, G.M. Parulkar: Detecting and Resolving Packet Filter Conflicts (INFOCOM, 2000)"},{"key":"11_CR15","unstructured":"D. Eppstein, S. Muthukrishnan: Internet Packet Filter Management and Rectangle Geometry (CoRR, 2000)"},{"issue":"6","key":"11_CR16","doi-asserted-by":"publisher","first-page":"1353","DOI":"10.1109\/TNET.2005.860108","volume":"13","author":"H. Lu","year":"2005","unstructured":"H.\u00a0Lu, S.\u00a0Sahni: Conflict detection and resolution in two-dimensional prefix router tables, IEEE\/ACM Trans. Netw. 13(6), 1353\u20131363 (2005)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"11_CR17","doi-asserted-by":"crossref","unstructured":"E.S. Al-Shaer, H.H. Hamed: Discovery of Policy Anomalies in Distributed Firewalls (INFOCOM, 2004)","DOI":"10.1109\/INFCOM.2004.1354680"},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"E.\u00a0Lupu, M.\u00a0Sloman: Conflict Analysis for Management Policies, Proc. 5th International Symposium on Integrated Network Management IM\u201997 (Chapman & Hall, 1997)","DOI":"10.1007\/978-0-387-35180-3_32"},{"key":"11_CR19","unstructured":"I.S. Pabla: A New Architecture For Conflict-Free Firewall Policy Provisioning (RMIT University, 2006)"}],"container-title":["Handbook of Information and Communication Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04117-4_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:39:20Z","timestamp":1606167560000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04117-4_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642041167","9783642041174"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04117-4_11","relation":{},"subject":[],"published":{"date-parts":[[2010]]}}}