{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T00:38:04Z","timestamp":1730248684107,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1109\/icitst.2015.7412120","type":"proceedings-article","created":{"date-parts":[[2016,2,26]],"date-time":"2016-02-26T16:35:10Z","timestamp":1456504510000},"page":"355-360","source":"Crossref","is-referenced-by-count":2,"title":["Automated security configuration checklist for a cisco IPsec VPN router using SCAP 1.2"],"prefix":"10.1109","author":[{"given":"Gabriel Biedima","family":"Peterside","sequence":"first","affiliation":[]},{"given":"Pavol","family":"Zavarsky","sequence":"additional","affiliation":[]},{"given":"Sergey","family":"Butakov","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"5","author":"gregg","year":"2013","journal-title":"CISSP Exam Cram 2"},{"article-title":"Guide to IPsec VPNs - NIST SP 800&#x2013;77","year":"0","author":"frankel","key":"ref11"},{"year":"2005","key":"ref12"},{"year":"2015","key":"ref13","article-title":"IPsec WAN Design Overview"},{"year":"2015","key":"ref14","article-title":"Next Generation Encryption"},{"article-title":"Router Security Configuration Guide","year":"2005","author":"antonie","key":"ref15"},{"year":"2015","key":"ref16","article-title":"Version 5.10.1 - Test Listing"},{"year":"2011","key":"ref17","article-title":"OVAL Definition Tutorial"},{"article-title":"The OVAL Language Specification Version 5.10.1","year":"2012","author":"baker","key":"ref18"},{"article-title":"Security Automation: Are humans still relevant?","year":"2014","author":"jackson","key":"ref19"},{"article-title":"Security Content Automation Protocol (SCAP): Helping organizations maintain and verify the security of their information systems","year":"2010","author":"radack","key":"ref4"},{"year":"2015","key":"ref3","article-title":"NIST Solicits Comments on the Security Content Automation Protocol (SCAP)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2011.39"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/IMF.2011.12"},{"journal-title":"National Institue of Standards and Technology","article-title":"SCAP Specifications","year":"2015","key":"ref8"},{"key":"ref7","first-page":"60","article-title":"Analysis of automation studies in the field of information security management","volume":"6","author":"dwivedi","year":"2013","journal-title":"International Journal of Engineering Research and Development"},{"article-title":"Security Automation Webinar: Protecting Your Enterprise with Security Automation","year":"2013","author":"hanna","key":"ref2"},{"article-title":"Security automation essentials: streamlined enterprise security management & monitoring with SCAP","year":"2012","author":"witte","key":"ref1"},{"year":"2015","key":"ref9","article-title":"XCCDF Introduction Handout"}],"event":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2015,12,14]]},"location":"London, United Kingdom","end":{"date-parts":[[2015,12,16]]}},"container-title":["2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7400833\/7412034\/07412120.pdf?arnumber=7412120","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T12:57:54Z","timestamp":1490101074000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7412120\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/icitst.2015.7412120","relation":{},"subject":[],"published":{"date-parts":[[2015,12]]}}}