{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T02:28:32Z","timestamp":1729650512836,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,5]]},"DOI":"10.1109\/ifipnetworking.2016.7497196","type":"proceedings-article","created":{"date-parts":[[2016,6,25]],"date-time":"2016-06-25T11:39:03Z","timestamp":1466854743000},"page":"252-260","source":"Crossref","is-referenced-by-count":19,"title":["Verified iptables firewall analysis"],"prefix":"10.1109","author":[{"given":"Cornelius","family":"Diekmann","sequence":"first","affiliation":[]},{"given":"Julius","family":"Michaelis","sequence":"additional","affiliation":[]},{"given":"Maximilian","family":"Haslbeck","sequence":"additional","affiliation":[]},{"given":"Georg","family":"Carle","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1145\/2774993.2774997"},{"key":"ref11","article-title":"The Margrave tool for firewall analysis","author":"nelson","year":"2010","journal-title":"Large Installation System Administration Conference (LISA)"},{"key":"ref12","volume":"2283","author":"nipkow","year":"2002","journal-title":"Isabelle\/HOL A Proof Assistant for Higher-Order Logic ser"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/CNSM.2015.7367354"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1016\/j.cose.2004.02.003"},{"key":"ref4","first-page":"199","article-title":"FIREMAN: a toolkit for firewall modeling and analysis","author":"yuan","year":"2006","journal-title":"Symposium on Security and Privacy"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1007\/978-3-319-19249-9_13"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/INFCOM.2004.1354680"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1145\/1314436.1314440"},{"key":"ref8","first-page":"41","article-title":"Firewall analysis with policy-based host classification","volume":"6","author":"marmorstein","year":"2006","journal-title":"Large Installation System Administration Conference (LISA)"},{"key":"ref7","first-page":"71","article-title":"A tool for automated iptables firewall analysis","author":"marmorstein","year":"2005","journal-title":"USENIX Annual Technical Conference Freenix track"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/MIC.2010.29"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/MC.2004.2"},{"key":"ref9","article-title":"Classless Inter-domain Routing (CIDR): The Internet Address Assignment and Aggregation Plan","author":"fuller","year":"2006","journal-title":"RFC 4632 (Best Current Practice) Internet Engineering Task Force"}],"event":{"name":"2016 IFIP Networking Conference (IFIP Networking) and Workshops","start":{"date-parts":[[2016,5,17]]},"location":"Vienna, Austria","end":{"date-parts":[[2016,5,19]]}},"container-title":["2016 IFIP Networking Conference (IFIP Networking) and Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7493812\/7497194\/07497196.pdf?arnumber=7497196","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,29]],"date-time":"2016-09-29T17:51:53Z","timestamp":1475171513000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7497196\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/ifipnetworking.2016.7497196","relation":{},"subject":[],"published":{"date-parts":[[2016,5]]}}}