{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,27]],"date-time":"2024-03-27T08:24:43Z","timestamp":1711527883620},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2005,6,1]],"date-time":"2005-06-01T00:00:00Z","timestamp":1117584000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int J Inf Secur"],"published-print":{"date-parts":[[2005,6]]},"DOI":"10.1007\/s10207-004-0064-6","type":"journal-article","created":{"date-parts":[[2005,3,7]],"date-time":"2005-03-07T11:26:22Z","timestamp":1110194782000},"page":"209-226","source":"Crossref","is-referenced-by-count":8,"title":["Techniques for improving the security and manageability of IPsec policy"],"prefix":"10.1007","volume":"4","author":[{"given":"Jonathan","family":"Trostle","sequence":"first","affiliation":[]},{"given":"Bill","family":"Gossman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,1]]},"reference":[{"key":"64_CR1","unstructured":"Bellovin SM (1995) Using the Domain Name System for system break-ins. In: Proceedings of the 1995 Usenix Security Symposium, June 1995"},{"key":"64_CR2","unstructured":"Blaze M, Ioannidis J, Keromytis AD (2001) Trust management for IPsec. In: Proceedings of the 2001 symposium on network and distributed systems, February 2001, pp 139\u2013151"},{"key":"64_CR3","doi-asserted-by":"crossref","unstructured":"Carpenter B (2000) Internet transparency. RFC 2775, February 2000","DOI":"10.17487\/rfc2775"},{"key":"64_CR4","doi-asserted-by":"crossref","unstructured":"Carpenter B, Crowcroft J, Rekhter Y (1997) IPv4 address behaviour today. RFC 2101, February 1997","DOI":"10.17487\/rfc2101"},{"key":"64_CR5","doi-asserted-by":"crossref","unstructured":"Dierks T, Allen C (1999) The TLS Protocol version 1.0. RFC 2743, January","DOI":"10.17487\/rfc2246"},{"key":"64_CR6","doi-asserted-by":"crossref","unstructured":"Eastlake D (1999) Domain Name System security extensions. RFC 2535, March 1999","DOI":"10.17487\/rfc2535"},{"key":"64_CR7","doi-asserted-by":"crossref","unstructured":"Handley M, Schulzrinne H, Schooler E, Rosenberg J (1999) SIP: Session Initiation Protocol. RFC 2543, March 1999","DOI":"10.17487\/rfc2543"},{"key":"64_CR8","doi-asserted-by":"crossref","unstructured":"Harkins D, Carrel D (1998) The Internet Key Exchange (IKE). RFC 2409, November 1998","DOI":"10.17487\/rfc2409"},{"key":"64_CR9","doi-asserted-by":"crossref","unstructured":"Kempf J, Guttman E (1999) An API for service location. RFC 2614, June 1999","DOI":"10.17487\/rfc2614"},{"key":"64_CR10","doi-asserted-by":"crossref","unstructured":"Kent S, Atkinson R (1998) Security architecture for the Internet Protocol. RFC 2401, November 1998","DOI":"10.17487\/rfc2401"},{"key":"64_CR11","doi-asserted-by":"crossref","unstructured":"Kent S, Atkinson R (1998) IP Encapsulating Security Payload (ESP). RFC 2406, November","DOI":"10.17487\/rfc2406"},{"key":"64_CR12","doi-asserted-by":"crossref","unstructured":"Kent S, Atkinson R (1998) IP Authentication Header. RFC 2402, November 1998","DOI":"10.17487\/rfc2402"},{"key":"64_CR13","doi-asserted-by":"crossref","unstructured":"Kohl J, Neuman C (1993) The Kerberos Network Authentication Service (V5). RFC 1510, September 1993","DOI":"10.17487\/rfc1510"},{"key":"64_CR14","doi-asserted-by":"crossref","unstructured":"Linn J (2000) Generic Security Service Application Program Interface Version 2, Update 1. RFC 2743, January 2000","DOI":"10.17487\/rfc2743"},{"key":"64_CR15","unstructured":"McDonald D, Metz C, Phan B (1998) PF KEY Key Management API, version 2. RFC 2367, July 1998"},{"key":"64_CR16","doi-asserted-by":"crossref","unstructured":"Mockapetris P (1987) Domain names \u2013 concepts and facilities. RFC 1034, November 1987","DOI":"10.17487\/rfc1034"},{"key":"64_CR17","doi-asserted-by":"crossref","unstructured":"Mockapetris P (1987) Domain names \u2013 implementation and specification. RFC 1035, November 1987","DOI":"10.17487\/rfc1035"},{"key":"64_CR18","unstructured":"http:\/\/www.PacketCable.com"},{"key":"64_CR19","first-page":"analysis","volume":"IPsec","author":"Perlman","year":"2000","unstructured":"Perlman R, Kaufman C (2000) Key exchange in IPsec: analysis of IKE. IEEE Internet Comput Nov\/Dec, pp 50\u201356","journal-title":"Key exchange in"},{"key":"64_CR20","doi-asserted-by":"crossref","unstructured":"Postel J (1980) User Datagram Protocol. RFC 768, August 1980","DOI":"10.17487\/rfc0768"},{"key":"64_CR21","doi-asserted-by":"crossref","unstructured":"Postel J (1981) Transmission Control Protocol. RFC 793, September 1981","DOI":"10.17487\/rfc0793"},{"key":"64_CR22","unstructured":"Sommerfeld B (2001) posting to IETF IPsec WG archive. Message-Id: <200105032004.f43K4J901839> 3 May 2001"},{"key":"64_CR23","doi-asserted-by":"crossref","unstructured":"Srisuresh P, Holdrege M (1999) IP Network Address Translator (NAT) terminology and considerations. RFC 2663, August 1999","DOI":"10.17487\/rfc2663"},{"key":"64_CR24","unstructured":"Stevens WR (1998) UNIX network programming, networking APIs: sockets and XTI, vol 1, 2nd edn. Prentice Hall, Upper Saddle River, NJ"},{"key":"64_CR25","unstructured":"Trostle J, Kosinovsky I, Swift M (2001) Implementation of crossrealm referral handling in the MIT Kerberos client. In: Proceedings of the 2001 symposium on network and distributed systems, February 2001, pp 201\u2013210"},{"key":"64_CR26","unstructured":"Vixie P (1995) DNS and BIND security issues. In: Proceedings of the 1995 Usenix Security Symposium, June 1995"},{"key":"64_CR27","unstructured":"Zwicky ED, Cooper S, Chapman DB (2000) Building Internet firewalls, 2nd edn. O\u2019Reilly, Sebastopol, CA"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-004-0064-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-004-0064-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-004-0064-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,6]],"date-time":"2020-04-06T03:58:46Z","timestamp":1586145526000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-004-0064-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,6]]},"references-count":27,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2005,6]]}},"alternative-id":["64"],"URL":"https:\/\/doi.org\/10.1007\/s10207-004-0064-6","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005,6]]}}}