{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,13]],"date-time":"2024-11-13T05:31:34Z","timestamp":1731475894502,"version":"3.28.0"},"reference-count":10,"publisher":"Institution of Engineering and Technology (IET)","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IET Inf. Secur."],"published-print":{"date-parts":[[2007,12,10]]},"DOI":"10.1049\/iet-ifs:20060171","type":"journal-article","created":{"date-parts":[[2007,12,24]],"date-time":"2007-12-24T23:04:10Z","timestamp":1198537450000},"page":"143-151","source":"Crossref","is-referenced-by-count":5,"title":["Comparing and debugging firewall rule tables"],"prefix":"10.1049","volume":"1","author":[{"given":"L.","family":"Lu","sequence":"first","affiliation":[{"name":"Centre for Information Security Research, School of Information Technology and Computer Science, University of Wollongong, Wollongong, NSW, Australia"}]},{"given":"R.","family":"Safavi-Naini","sequence":"additional","affiliation":[{"name":"Centre for Information Security Research, School of Information Technology and Computer Science, University of Wollongong, Wollongong, NSW, Australia"}]},{"given":"J.","family":"Horton","sequence":"additional","affiliation":[{"name":"Centre for Information Security Research, School of Information Technology and Computer Science, University of Wollongong, Wollongong, NSW, Australia"}]},{"given":"W.","family":"Susilo","sequence":"additional","affiliation":[{"name":"Centre for Information Security Research, School of Information Technology and Computer Science, University of Wollongong, Wollongong, NSW, Australia"}]}],"member":"265","reference":[{"key":"10.1049\/iet-ifs:20060171_r1","unstructured":"Cheswick, W.R., and Bellovin, S.M.: \u2018Firewalls and internet security, repelling the Wily Hacker\u2019, (Addison-Wesley 1994)"},{"journal-title":"IEEE Symp. Security and Privacy","year":"1999","author":"Bartal","key":"10.1049\/iet-ifs:20060171_r2"},{"journal-title":"Systems, Man and Cybernetics, IEEE Int. Conf.","year":"2003","author":"Lee","key":"10.1049\/iet-ifs:20060171_r3"},{"key":"10.1049\/iet-ifs:20060171_r4","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1007\/3-540-44569-2_2","volume":"1995","author":"Damianou","year":"2001","journal-title":"Workshop on Policies for Distributed Systems and Networks, LNCS"},{"journal-title":"Int. Conf. Dependable Systems and Networks (DSN 2000)","year":"2000","author":"Hazelhurst","key":"10.1049\/iet-ifs:20060171_r5"},{"key":"10.1049\/iet-ifs:20060171_r6","unstructured":"\u2018Algorithms for analyzing firewall, and router access lists\u2019, Technical report trwitscs-1999, University of the Witwatersrand, South Africa, 1999 Department of Computer Science"},{"journal-title":"IEEE\/IFIP 8th Int. Symp. Integrated Network Management","year":"2004","author":"Al-Shaer","key":"10.1049\/iet-ifs:20060171_r7"},{"key":"10.1049\/iet-ifs:20060171_r8","first-page":"2605","volume":"4","author":"Al-Shaer","year":"2004","journal-title":"IEEE INFOCOM, Twenty-third Annual Joint Conf. IEEE Computer and Communications Societies"},{"key":"10.1049\/iet-ifs:20060171_r9","unstructured":"Strassberg, K., Gondek, R., and Rollie, G.: \u2018Firewalls: the complete reference\u2019, (McGraw-Hill\/Osborne 2002), p. 84\u201388"},{"key":"10.1049\/iet-ifs:20060171_r10","first-page":"13","author":"Petty","year":"1997","journal-title":"Proc. 1997 Distributed Simulation Symp"}],"container-title":["IET Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/digital-library.theiet.org\/content\/journals\/10.1049\/iet-ifs_20060171?crawler=true&mimetype=application\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,12]],"date-time":"2024-11-12T16:19:23Z","timestamp":1731428363000},"score":1,"resource":{"primary":{"URL":"http:\/\/digital-library.theiet.org\/doi\/10.1049\/iet-ifs%3A20060171"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,12,10]]},"references-count":10,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2007,12,10]]}},"alternative-id":["10.1049\/iet-ifs:20060171"],"URL":"https:\/\/doi.org\/10.1049\/iet-ifs:20060171","relation":{},"ISSN":["1751-8709","1751-8717"],"issn-type":[{"type":"print","value":"1751-8709"},{"type":"electronic","value":"1751-8717"}],"subject":[],"published":{"date-parts":[[2007,12,10]]}}}