{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T18:06:00Z","timestamp":1725386760961},"reference-count":8,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,4]]},"DOI":"10.1109\/noms.2008.4575248","type":"proceedings-article","created":{"date-parts":[[2008,9,16]],"date-time":"2008-09-16T19:17:28Z","timestamp":1221592648000},"page":"923-926","source":"Crossref","is-referenced-by-count":0,"title":["Algorithm to automatically solve security policy conflicts among IP devices configurations"],"prefix":"10.1109","author":[{"given":"Simone","family":"Ferraresi","sequence":"first","affiliation":[]},{"given":"Emanuele","family":"Francocci","sequence":"additional","affiliation":[]},{"given":"Alessio","family":"Quaglini","sequence":"additional","affiliation":[]},{"given":"Andrea","family":"Baiocchi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2004.1354680"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.854119"},{"key":"1","first-page":"319","article-title":"towards an algebraic approach to solve policy conflicts","author":"basile","year":"2004","journal-title":"FCS'04 Foundations of Computer Security WOLFASI subworkshop (Workshop On Logical Foundations of an Adaptive Security Infrastructure)"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2004.1281597"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2000.832496"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2003.1194157"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2004.4623689"},{"key":"8","doi-asserted-by":"crossref","DOI":"10.1145\/352600.353052","article-title":"implementing a distributed firewall","author":"ioannidis","year":"2000","journal-title":"Proceedings of 7th ACM Conference on Computer and Comminications Security (CCS'00)"}],"event":{"name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium - Pervasive Management for Ubiquitous Networks and Services","start":{"date-parts":[[2008,4,7]]},"location":"Salvador, Bahia","end":{"date-parts":[[2008,4,11]]}},"container-title":["NOMS 2008 - 2008 IEEE Network Operations and Management Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4567164\/4575087\/04575248.pdf?arnumber=4575248","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,5]],"date-time":"2019-04-05T02:08:59Z","timestamp":1554430139000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/4575248\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,4]]},"references-count":8,"URL":"https:\/\/doi.org\/10.1109\/noms.2008.4575248","relation":{},"subject":[],"published":{"date-parts":[[2008,4]]}}}