{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T22:34:48Z","timestamp":1648938888101},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"1-2","license":[{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Ann. T\u00e9l\u00e9commun."],"published-print":{"date-parts":[[2004,1]]},"DOI":"10.1007\/bf03179677","type":"journal-article","created":{"date-parts":[[2021,7,7]],"date-time":"2021-07-07T06:33:22Z","timestamp":1625639602000},"page":"108-129","source":"Crossref","is-referenced-by-count":0,"title":["Application level active network (alan) server management architecture"],"prefix":"10.1007","volume":"59","author":[{"given":"Ioannis","family":"Liabotis","sequence":"first","affiliation":[]},{"given":"Temitope","family":"Olukemi","sequence":"additional","affiliation":[]},{"given":"Ognjen","family":"Prnjat","sequence":"additional","affiliation":[]},{"given":"Lionel","family":"Sacks","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"BF03179677_CR1","doi-asserted-by":"crossref","unstructured":"Damianou (N.),Dulay (N.),Lupu (E.),Sloman (M.), \u201cThe Ponder Policy Specification Language\u201d, Policies for Distributed Systems and Networks, 2001, Page(s) 18\u201338.","DOI":"10.1007\/3-540-44569-2_2"},{"issue":"7","key":"BF03179677_CR2","doi-asserted-by":"publisher","first-page":"655","DOI":"10.1016\/S0169-7552(98)00293-1","volume":"31","author":"M. Fry","year":"1999","unstructured":"Fry (M.),Ghosh (A.), \u201cApplication Level Active Networking\u201d,Computer Networks,31 (7) (1999) pp. 655\u2013667.","journal-title":"Computer Networks"},{"key":"BF03179677_CR3","unstructured":"FunnelWeb http:\/\/dmir.it.uts.edu.au\/projects\/alan\/"},{"key":"BF03179677_CR4","unstructured":"Liabotis (I.),Prnjat (O.),Sacks (L.), \u201cPolicy-Based Resource Management for Application Level Active Networks\u201d,SecondieeeLatin American Network Operations and Management Symposiumlanoms2001; August 2001."},{"key":"BF03179677_CR5","doi-asserted-by":"crossref","unstructured":"Marshall (I. W.),Cowan (J.),Crowcroft (J.),Fry (M.),Ghosh (A.),Hutchison (D.),Parish (D.),Phillips (I.),Pryce (N.),Sloman (M.),Waddington (D.), \u201cApplication-level Programmable Network Environment\u201d,btTechnology Journal,17, No. 2, April 1999.","DOI":"10.1023\/A:1009689900903"},{"key":"BF03179677_CR6","doi-asserted-by":"crossref","unstructured":"Marshall (I. W.),Fry (M.),Velasco (L.),Ghosh (A.), \u201cActive Information Networks andxml\u201d, in \u201cActive Networks\u201d ed. S. Covaci,lncs 1653 pp. 60\u201372,Springer-Verlag, 1999.","DOI":"10.1007\/978-3-540-48507-0_6"},{"key":"BF03179677_CR7","unstructured":"Marshall (I. W.),Gharib (H.),Hardwicke (J.),Roadknight (C.), \u201cA novel architecture for active service management\u201d, Integrated Network Management Proceedings,2001ieee\/ifipInternational Symposium on, 2001, Page(s): 795\u2013810"},{"key":"BF03179677_CR8","unstructured":"Natarajan (R.),Mckee (P.),Mathur (A. P.), \u201cAxml Based Policy-Driven Information Service\u201d,ieee\/ifip International Symposium on Integrated Network Management (im\u20192001), Seattle, May 2001."},{"key":"BF03179677_CR9","doi-asserted-by":"crossref","unstructured":"Olukemi (T.),Liabotis (I.),Prnjat (O.),Sacks (L.), \u201cSecurity and Resource Policy-based Management Architecture foralan Servers\u201d,Net-Con\u20192002 \u2014ifipandieeeConference on Network Control and Engineering for QoS, Security and Mobility, 2002.","DOI":"10.1007\/978-0-387-35620-4_8"},{"key":"BF03179677_CR10","unstructured":"Prnjat (O.),Olukemi (T.),Liabotis (I.),Sacks (L.), \u201cIntegrity and Security of the Application Level Active Networks\u201d;ifipWorkshop onipandatmTraffic Managementwatm\u20192001 andeunice\u20192001; Sept. 2001."},{"key":"BF03179677_CR11","unstructured":"Prnjat (O.),Liabotis (I.),Olukemi (T.),Sacks (L.),Fisher (M.),Mckee (P.),Carlberg (K.),Martinez (G.) \u201cPolicy-based Management foralan-Enabled Networks\u201d;ieee3rd International Workshop on Policies for Distributed Systems and Networks \u2014 Policy 2002, June 2002."},{"key":"BF03179677_CR12","unstructured":"Sacks (L.),Prnjat (O.),Liabotis (I.),Olukemi (T.),Ching (A.),Fisher (M.),Mckee (P.),Georgalas (N.),Yoshii (H.), \u201cActive Robust Resource Management in Cluster Computing Using Policies\u201d, to appear inthe Journal of Network and Systems Management, Special Issue on Policy Based Management of Networks and Services."},{"key":"BF03179677_CR13","doi-asserted-by":"crossref","unstructured":"Sloman (M.), \u201cPolicy Driven Management for Distributed Systems\u201d,Journal of Network and Systems Management, 1994.","DOI":"10.1007\/BF02283186"},{"key":"BF03179677_CR14","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/65.993218","volume":"16","author":"M. Sloman","year":"2002","unstructured":"Sloman (M.),Lupu (E.), \u201cSecurity and management policy specification\u201d,ieeeNetwork,16, Issue: 2, March\u2013April 2002, Page(s): 10\u201319.","journal-title":"ieee Network"},{"key":"BF03179677_CR15","unstructured":"W3C, \u201cxml Schema Part 0; Primer \u2014 W3C Recommendation, 2 May 2001\u201d, [www] http:\/\/www.w3.org\/TR\/xmlschema-0."},{"key":"BF03179677_CR16","unstructured":"W3C, \u201cxml Schema Part 2: Datatypes \u2014 W3C Recommendation, 2 May 2001\u201d, [www] http:\/\/www.w3.org\/TR\/xmlschema-2."}],"container-title":["Annales des T\u00e9l\u00e9communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/BF03179677.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/BF03179677\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/BF03179677.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,7]],"date-time":"2021-07-07T06:50:43Z","timestamp":1625640643000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/BF03179677"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,1]]},"references-count":16,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2004,1]]}},"alternative-id":["BF03179677"],"URL":"https:\/\/doi.org\/10.1007\/bf03179677","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"value":"0003-4347","type":"print"},{"value":"1958-9395","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004,1]]}}}