{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T21:18:32Z","timestamp":1725571112115},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642177729"},{"type":"electronic","value":"9783642177736"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17773-6_9","type":"book-chapter","created":{"date-parts":[[2010,12,10]],"date-time":"2010-12-10T06:47:32Z","timestamp":1291963652000},"page":"81-97","source":"Crossref","is-referenced-by-count":0,"title":["Reconciling Multiple IPsec and Firewall Policies"],"prefix":"10.1007","author":[{"given":"Tuomas","family":"Aura","sequence":"first","affiliation":[]},{"given":"Moritz","family":"Becker","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Roe","sequence":"additional","affiliation":[]},{"given":"Piotr","family":"Zieli\u0144ski","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Johnson, D.B., Perkins, C., Arkko, J.: Mobility support in IPv6. RFC 3775, IETF Mobile IP Working Group (2004)","DOI":"10.17487\/rfc3775"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Kent, S., Seo, K.: Security architecture for the Internet Protocol. RFC 4301, IETF (2005)","DOI":"10.17487\/rfc4301"},{"key":"9_CR3","volume-title":"Social Choice and Individual Values","author":"K.J. Arrow","year":"1970","unstructured":"Arrow, K.J.: Social Choice and Individual Values. Yale University Press, New Haven (1970)"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Guttman, J.D., Herzog, A.L.: Rigorous automated network security management. International Journal of Information Security\u00a04(1-2) (2005)","DOI":"10.1007\/s10207-004-0052-x"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Hamed, H.H., Al-Shaer, E.S., Marrero, W.: Modeling and verification of IPSec and VPN security policies. In: 13th IEEE International Conference on Network Protocols (ICNP 2005), pp. 259\u2013278 (2005)","DOI":"10.1109\/ICNP.2005.25"},{"key":"9_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/11535706_15","volume-title":"Data and Applications Security XIX","author":"A.X. Liu","year":"2005","unstructured":"Liu, A.X., Gouda, M.G.: Complete redundancy detection in firewalls. In: Jajodia, S., Wijesekera, D. (eds.) Data and Applications Security 2005. LNCS, vol.\u00a03654, pp. 196\u2013209. Springer, Heidelberg (2005)"}],"container-title":["Lecture Notes in Computer Science","Security Protocols"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17773-6_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,6]],"date-time":"2019-06-06T23:29:18Z","timestamp":1559863758000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17773-6_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642177729","9783642177736"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17773-6_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}