{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T13:05:01Z","timestamp":1725627901691},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1109\/noms.2008.4575112","type":"proceedings-article","created":{"date-parts":[[2008,9,16]],"date-time":"2008-09-16T15:17:28Z","timestamp":1221578248000},"page":"17-24","source":"Crossref","is-referenced-by-count":15,"title":["Application domain independent policy conflict analysis using information models"],"prefix":"10.1109","author":[{"given":"Steven","family":"Davy","sequence":"first","affiliation":[]},{"given":"Brendan","family":"Jennings","sequence":"additional","affiliation":[]},{"given":"John","family":"Strassner","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2006.1607877"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2006.1687561"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.854119"},{"key":"14","first-page":"83","article-title":"analysis and classification of ipsec security policy conflicts","author":"lin","year":"2006","journal-title":"Proc FCST '06 Japan-China Joint Workshop on Frontier of Computer Science and Technology"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/762476.762481"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2005.25"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/GIIS.2007.4404174"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/LANOMS.2007.4362466"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/EASe.2008.8"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/383891.383894"},{"year":"0","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2003.1206963"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2003.1206958"},{"key":"4","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1007\/3-540-44569-2_2","article-title":"the ponder policy specification language","author":"damianou","year":"2001","journal-title":"Proc 4th IEEE Int l Workshop on Policies for Distributed Systems and Networks"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2003.1206955"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/32.824414"}],"event":{"name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium","start":{"date-parts":[[2008,4,7]]},"location":"Salvador, Bahia, Brazil","end":{"date-parts":[[2008,4,11]]}},"container-title":["NOMS 2008 - 2008 IEEE Network Operations and Management Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4567164\/4575087\/04575112.pdf?arnumber=4575112","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T07:46:35Z","timestamp":1497771995000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4575112\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/noms.2008.4575112","relation":{},"subject":[],"published":{"date-parts":[[2008]]}}}