{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T21:57:19Z","timestamp":1767650239482,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2004,10,29]],"date-time":"2004-10-29T00:00:00Z","timestamp":1099008000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,10,29]]},"DOI":"10.1145\/1029133.1029143","type":"proceedings-article","created":{"date-parts":[[2005,1,30]],"date-time":"2005-01-30T17:58:48Z","timestamp":1107107928000},"page":"66-74","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":28,"title":["Automatic analysis of firewall and network intrusion detection system configurations"],"prefix":"10.1145","author":[{"given":"Tom\u00e1s E.","family":"Uribe","sequence":"first","affiliation":[{"name":"SRI International, Menlo Park, CA"}]},{"given":"Steven","family":"Cheung","sequence":"additional","affiliation":[{"name":"SRI International, Menlo Park, CA"}]}],"member":"320","published-online":{"date-parts":[[2004,10,29]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"3Com. 3Com Embedded Firewall. Software for the 3CR990 Network Interface Card (NIC) Family Dec. 2001.  3Com. 3Com Embedded Firewall. Software for the 3CR990 Network Interface Card (NIC) Family Dec. 2001."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1999.766714"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1986.1676819"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2001.932156"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2003.1194892"},{"key":"e_1_3_2_1_7_1","unstructured":"Cisco Systems Inc. Cisco PIX Firewall and VPN Configuration Guide: Version 6.3 2003. http:\/\/www.cisco.com.  Cisco Systems Inc. Cisco PIX Firewall and VPN Configuration Guide: Version 6.3 2003. http:\/\/www.cisco.com."},{"volume-title":"The MIT Press","year":"1999","author":"Clarke E. M.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","first-page":"100","volume-title":"Proc. 6th Nordic Workshop on Secure IT Systems (NordSec 2001","author":"Eronen P.","year":"2001"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.3990\/2.24"},{"key":"e_1_3_2_1_12_1","first-page":"120","volume-title":"IEEE Symposium on Security and Privacy","author":"Guttman J. D.","year":"1997"},{"volume-title":"MITRE Corp.","year":"2003","author":"Guttman J. D.","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/352600.353052"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2001.932222"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/882494.884424"},{"key":"e_1_3_2_1_17_1","first-page":"353","volume-title":"Proceedings of the 20th National Information Systems Security Conference","author":"Porras P.","year":"1997"},{"volume-title":"Inc.","year":"1998","author":"Ptacek T. H.","key":"e_1_3_2_1_18_1"},{"volume-title":"USENIX LISA'99","year":"1999","author":"Roesch M.","key":"e_1_3_2_1_19_1"},{"volume-title":"Dependable Systems and Networks. IEEE","year":"2003","author":"Uribe T. E.","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_21_1","unstructured":"A. Wool. Architecting the Lumeta firewall analyzer. In sProc. of the 10th USENIX Security Symposium Aug. 2001.   A. Wool. Architecting the Lumeta firewall analyzer. In sProc. of the 10th USENIX Security Symposium Aug. 2001."}],"event":{"name":"CCS04: 11th ACM Conference on Computer and Communications Security 2004","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Washington DC USA","acronym":"CCS04"},"container-title":["Proceedings of the 2004 ACM workshop on Formal methods in security engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1029133.1029143","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1029133.1029143","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:31:07Z","timestamp":1750264267000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1029133.1029143"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,10,29]]},"references-count":19,"alternative-id":["10.1145\/1029133.1029143","10.1145\/1029133"],"URL":"https:\/\/doi.org\/10.1145\/1029133.1029143","relation":{},"subject":[],"published":{"date-parts":[[2004,10,29]]},"assertion":[{"value":"2004-10-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}