{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T10:20:43Z","timestamp":1725704443072},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642348822"},{"type":"electronic","value":"9783642348839"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34883-9_22","type":"book-chapter","created":{"date-parts":[[2012,10,31]],"date-time":"2012-10-31T04:26:31Z","timestamp":1351657591000},"page":"275-287","source":"Crossref","is-referenced-by-count":7,"title":["Limitation of Listed-Rule Firewall and the Design of Tree-Rule Firewall"],"prefix":"10.1007","author":[{"given":"Thawatchai","family":"Chomsiri","sequence":"first","affiliation":[]},{"given":"Xiangjian","family":"He","sequence":"additional","affiliation":[]},{"given":"Priyadarsi","family":"Nanda","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Al-Shaer, E., Hamed, H.: Firewall Policy Advisor for anomaly Detection and Rule Editing. In: IEEE\/IFIP Integrated Management, IM 2003 (March 2003)","key":"22_CR1","DOI":"10.1007\/978-0-387-35674-7_2"},{"issue":"10","key":"22_CR2","doi-asserted-by":"publisher","first-page":"2069","DOI":"10.1109\/JSAC.2005.854119","volume":"23","author":"E. Al-Shaer","year":"2005","unstructured":"Al-Shaer, E., Hamed, H., Boutaba, R., Hasan, M.: Conflict classification and analysis of distributed firewall policies. IEEE Journal on Selected Areas in Communications (JSAC)\u00a023(10), 2069\u20132084 (2005)","journal-title":"IEEE Journal on Selected Areas in Communications (JSAC)"},{"issue":"3","key":"22_CR3","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1109\/MCOM.2006.1607877","volume":"44","author":"H. Haded","year":"2006","unstructured":"Haded, H., Al-Shaer, E.: Taxonomy of conflicts in network security policies. IEEE Communications Magazine\u00a044(3), 134\u2013141 (2006)","journal-title":"IEEE Communications Magazine"},{"unstructured":"Hazelhusrt, S.: Algorithms for Analyzing Firewall and Router Access Lists. Technical Report TR-WitsCS-1999, Department of Computer Science, University of the Witwatersrand, South Africa (July 1999)","key":"22_CR4"},{"unstructured":"Eronen, P., Zitting, J.: An Expert System for Analyzing Firewall Rules. In: Proceedings of 6th Nordic Workshop on Secure IT-Systems (NordSec 2001), pp. 100\u2013107 (2001)","key":"22_CR5"},{"unstructured":"Lihua, J.M., Su, Z.: FIREMAN: A toolkit for Firewall modeling and analysis. In: Proceedings of the 2006 IEEE Symposium on Security and Privacy (2006)","key":"22_CR6"},{"unstructured":"Cisco Content Services Switch Basic Configuration Guide, \n                    \n                      http:\/\/www.cisco.com\/en\/US\/docs\/app_ntwk_services\/data_center_app_services\/css11500series\/v7.10\/configuration\/basic\/guide\/basicgd.pdf","key":"22_CR7"},{"doi-asserted-by":"crossref","unstructured":"Liu, A., Gouda, M.: Diverse Firewall Design. IEEE Transaction on Parallel and Distributed Systems\u00a019(9) (September 2008)","key":"22_CR8","DOI":"10.1109\/TPDS.2007.70802"},{"unstructured":"Pornavalai, C., Chomsiri, T.: Firewall Policy Analyzing by Relational Algebra. In: Proceeding of the 2004 International Technical Conference on Circuits\/Systems, Computers and Communications (ITC-CSCC 2004), pp. 214\u2013219 (2004)","key":"22_CR9"},{"unstructured":"http:\/\/en.wikipedia.org\/wiki\/Binary_search_tree","key":"22_CR10"},{"unstructured":"http:\/\/en.wikipedia.org\/wiki\/Linear_search","key":"22_CR11"}],"container-title":["Lecture Notes in Computer Science","Internet and Distributed Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34883-9_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T01:21:05Z","timestamp":1558315265000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34883-9_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642348822","9783642348839"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34883-9_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}