{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:22:44Z","timestamp":1729664564127,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/sncc.2014.6866525","type":"proceedings-article","created":{"date-parts":[[2014,7,30]],"date-time":"2014-07-30T17:18:09Z","timestamp":1406740689000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Common policy language for Policy Compliance and Change Detection System in managed service in data networks"],"prefix":"10.1109","author":[{"given":"Saeed M.","family":"Agbariah","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"3","article-title":"As the value of enterprise networks escalates, so does the need for configuration management","author":"kerravala","year":"2004","journal-title":"Yankee Group"},{"key":"2","article-title":"Why do internet services fail and what can be done about it","author":"opeenheimer","year":"2003","journal-title":"Proc the 4th USENIX Symposium on Internet Technologies and Systems"},{"year":"0","key":"10"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2011.6006050"},{"first-page":"110","year":"2009","author":"tahir","key":"7"},{"year":"0","key":"6"},{"key":"5","article-title":"Requirements for configuration management of IP-based networks","author":"sanchez","year":"2001","journal-title":"RFC 3139"},{"key":"4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.5121\/csit.2013.3801","article-title":"Automated policy compliance and change detection managed service in data networks","author":"agbariah","year":"2013","journal-title":"Second International Conference on Advanced Information Technologies and Applications"},{"key":"9","article-title":"A dynamic analysis system for Cisco IOS based on virtualization","author":"yuxiang","year":"2011","journal-title":"Third International Conference on Multimedia Information Networking and Security"},{"year":"2013","key":"8"},{"key":"11","first-page":"25","volume":"11","author":"hucaby","year":"2010","journal-title":"Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification IEEE Std 802 11"},{"first-page":"70","year":"2010","author":"hucaby","key":"12"}],"event":{"name":"2014 International Symposium on Networks, Computers and Communications (ISNCC)","start":{"date-parts":[[2014,6,17]]},"location":"Hammamet, Tunisia","end":{"date-parts":[[2014,6,19]]}},"container-title":["The 2014 International Symposium on Networks, Computers and Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6861313\/6866503\/06866525.pdf?arnumber=6866525","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T13:37:21Z","timestamp":1498138641000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6866525\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/sncc.2014.6866525","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]}}}