{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T21:10:08Z","timestamp":1742850608271,"version":"3.40.2"},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642292798"},{"type":"electronic","value":"9783642292804"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-29280-4_55","type":"book-chapter","created":{"date-parts":[[2012,4,2]],"date-time":"2012-04-02T07:12:18Z","timestamp":1333350738000},"page":"472-477","source":"Crossref","is-referenced-by-count":0,"title":["Consistency Maintenance of Modern Security Policies"],"prefix":"10.1007","author":[{"given":"Bartosz","family":"Brodecki","sequence":"first","affiliation":[]},{"given":"Jerzy","family":"Brzezi\u0144ski","sequence":"additional","affiliation":[]},{"given":"Piotr","family":"Sasak","sequence":"additional","affiliation":[]},{"given":"Micha\u0142","family":"Szychowiak","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"55_CR1","doi-asserted-by":"crossref","unstructured":"Abassi, R., Fatmi, S.G.E.: Dealing with Multi Security Policies in Communication Networks. In: 5th International Conference on Networking and Services ICNS, pp. 282\u2013287 (2009)","DOI":"10.1109\/ICNS.2009.24"},{"key":"55_CR2","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/TNSM.2004.4623689","volume":"1","author":"E. Al-Shaer","year":"2004","unstructured":"Al-Shaer, E., Hamed, H.: Modeling and Management of Firewall Policies. IEEE Transactions on Network and Service Management\u00a01, 2\u201310 (2004)","journal-title":"IEEE Transactions on Network and Service Management"},{"key":"55_CR3","doi-asserted-by":"crossref","unstructured":"Baboescu, F., Varghese, G.: Fast and scalable conflict detection for packet classifiers. In: 10th IEEE International Conference on Network Protocols, pp. 270\u2013279. IEEE Comput. Soc. (2002)","DOI":"10.1109\/ICNP.2002.1181414"},{"key":"55_CR4","unstructured":"Brodecki, B., Brzeziski, J., Sasak, P., Szychowiak, M.: ModCon algorithm for discovering security policy conflicts. In: 6th Joint Workshop on Information Security \u2013 JWIS 2011 (2011)"},{"key":"55_CR5","unstructured":"Brodecki, B., Szychowiak, M.: Conflict discovery algorithms used in ORCA. Tech. Rep. TR-ITSOA-OB8-4-PR-11-03, Poznan University of Technology (2011)"},{"key":"55_CR6","unstructured":"Craven, R., Lobo, J., Lupu, E., Russo, A., Sloman, M., Bandara, A.: A Formal Framework for Policy Analysis. Tech. Rep. DTR-2008\/5, Department of Computing, Imperial College London (2008)"},{"key":"55_CR7","doi-asserted-by":"publisher","first-page":"852","DOI":"10.1109\/32.824414","volume":"25","author":"E. Lupu","year":"1999","unstructured":"Lupu, E., Sloman, M.: Conflicts in policy-based distributed systems management. IEEE Transactions on Software Engineering\u00a025, 852\u2013869 (1999)","journal-title":"IEEE Transactions on Software Engineering"}],"container-title":["Lecture Notes in Computer Science","Advanced Computing, Networking and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-29280-4_55.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T20:40:49Z","timestamp":1742848849000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-29280-4_55"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642292798","9783642292804"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-29280-4_55","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}