{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T01:16:13Z","timestamp":1725498973976},"publisher-location":"Wiesbaden","reference-count":8,"publisher":"Vieweg","isbn-type":[{"type":"print","value":"9783834802132"},{"type":"electronic","value":"9783834891952"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-8348-9195-2_29","type":"book-chapter","created":{"date-parts":[[2007,12,21]],"date-time":"2007-12-21T05:48:39Z","timestamp":1198216119000},"page":"266-274","source":"Crossref","is-referenced-by-count":0,"title":["S-VPN Policy: Access List Conflict Automatic Analysis and Resolution"],"prefix":"10.1007","author":[{"given":"Simone","family":"Ferraresi","sequence":"first","affiliation":[]},{"given":"Stefano","family":"Pesic","sequence":"additional","affiliation":[]},{"given":"Livia","family":"Trazza","sequence":"additional","affiliation":[]},{"given":"Andrea","family":"Baiocchi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"29_CR1","doi-asserted-by":"crossref","unstructured":"E. Al Shaer and H. Hamed, \u201cModeling and Management of Firewall Policies\u201d, in IEEE eTransactions on Network and Service Management, Volume 1-1, April 2004.","DOI":"10.1109\/TNSM.2004.4623689"},{"key":"29_CR2","doi-asserted-by":"crossref","unstructured":"E. Al Shaer, H. Hamed, R. Boutaba, M. Hasan, \u201cConflict Classification and Analysis of Distributed Firewall Policies\u201d, in IEEE Journal on Selected Areas in Communications, vol. 23, no.10, October 2005.","DOI":"10.1109\/JSAC.2005.854119"},{"key":"29_CR3","doi-asserted-by":"crossref","unstructured":"E. Al Shaer and H. Hamed, \u201cFirewall Policy Advisor for Anomaly Detection and Rule Editing\u201d, in Proceedings of IEEEIIFIP Integrated Management Conference (1M2003),March 2003.","DOI":"10.1007\/978-0-387-35674-7_2"},{"key":"29_CR4","unstructured":"E. Al Shaer, H. Hamed, W. Marrero \u201cModeling and Verification of IPSec and VPN Security Policies\u201d, Proceedings of IEEE ICNP\u20192005, November 2005."},{"key":"29_CR5","doi-asserted-by":"crossref","unstructured":"HB. Hari, S. Suri and G. Parulkar, \u201cDetecting and Resolving Packet Filter Conflicts\u201d, Proceedings of IEEE INFOCOM 2000, March 2000.","DOI":"10.1109\/INFCOM.2000.832496"},{"key":"29_CR6","doi-asserted-by":"crossref","unstructured":"M. Gouda and X. Liu, \u201cFirewall Design: Consistency, Completeness, and Compactness\u201d Proceedings of the 24th IEEE International Conference on Distributed Computing Systems (ICDCS\u201904), March 2004.","DOI":"10.1109\/ICDCS.2004.1281597"},{"key":"29_CR7","doi-asserted-by":"crossref","unstructured":"S. Ioannidis, A. Keromytis, S. Bellovin and J. Smith, \u201cImplementing a Distributed Firewall\u201d Proceedings of 7th ACM Conference on Computer and Cornminications Security (CCS\u2019OO), November 2000.","DOI":"10.1145\/352600.353052"},{"key":"29_CR8","unstructured":"W. Cheswick and S. Bellovin, \u201cFirewalls and Internet Security\u201d, AddisonWesley, 1995"}],"container-title":["ISSE 2006 \u2014 Securing Electronic Busines Processes"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-8348-9195-2_29.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T12:14:44Z","timestamp":1606133684000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-8348-9195-2_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783834802132","9783834891952"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-8348-9195-2_29","relation":{},"subject":[]}}