{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T16:40:07Z","timestamp":1746031207381},"reference-count":15,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/csac.1999.816030","type":"proceedings-article","created":{"date-parts":[[2003,1,20]],"date-time":"2003-01-20T17:38:35Z","timestamp":1043084315000},"page":"209-218","source":"Crossref","is-referenced-by-count":22,"title":["Policy-based management: bridging the gap"],"prefix":"10.1109","author":[{"given":"S.","family":"Hinrichs","sequence":"first","affiliation":[]}],"member":"263","reference":[{"journal-title":"Securing Your Network with Cisco Centri Firewall","year":"1997","key":"ref10"},{"journal-title":"The COPS Protocol","year":"1999","author":"boyle","key":"ref11"},{"journal-title":"COPS Usage for RSVP","year":"1999","author":"boyle","key":"ref12"},{"journal-title":"COPS Usage for Policy Provisioning","year":"1999","author":"reichmeyer","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1997.601327"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1999.766714"},{"journal-title":"NetRanger Overview","year":"1999","key":"ref4"},{"journal-title":"Policy Framework Core Information Model","year":"1999","author":"strassner","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2058"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(93)90029-5"},{"journal-title":"Trusted Computer System Evaluation Criteria","year":"1985","key":"ref8"},{"journal-title":"3 Multi-dimensional Searching and Computational Geometry","year":"1984","author":"mehlhorn","key":"ref7"},{"journal-title":"Cisco security manager tutorial","year":"1999","key":"ref2"},{"journal-title":"Compiling programs for distributed-memory multiprocessors","year":"1988","author":"callahan","key":"ref1"},{"journal-title":"A two-bit differentiated services architecture for the internet","year":"1997","author":"nichols","key":"ref9"}],"event":{"name":"15th Annual Computer Security Applications Conference","acronym":"CSAC-99","location":"Phoenix, AZ, USA"},"container-title":["Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6631\/17686\/00816030.pdf?arnumber=816030","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,10]],"date-time":"2017-03-10T18:44:30Z","timestamp":1489171470000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/816030\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/csac.1999.816030","relation":{},"subject":[]}}