{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:29:01Z","timestamp":1750307341783,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,7,20]],"date-time":"2011-07-20T00:00:00Z","timestamp":1311120000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,7,20]]},"DOI":"10.1145\/2003476.2003489","type":"proceedings-article","created":{"date-parts":[[2011,7,20]],"date-time":"2011-07-20T12:34:54Z","timestamp":1311165294000},"page":"77-88","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Symbolic analysis of network security policies using rewrite systems"],"prefix":"10.1145","author":[{"given":"Tony","family":"Bourdier","sequence":"first","affiliation":[{"name":"INRIA Nancy &amp; LORIA &amp; Universit\u00e9 Henri Poincar\u00e9, Villers les Nancy, France"}]},{"given":"Horatiu","family":"Cirstea","sequence":"additional","affiliation":[{"name":"INRIA Nancy &amp; LORIA &amp; Universit\u00e9 de Nancy 2, Villers les Nancy, France"}]}],"member":"320","published-online":{"date-parts":[[2011,7,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1363686.1364197"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.854119"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02348-4_7"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/280474"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/1779782.1779787"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2007.4381486"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SAR-SSI.2011.5931363"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1571-0661(05)82552-6"},{"key":"e_1_3_2_1_9_1","series-title":"Lecture Notes in Computer Science","volume-title":"All About Maude - A High-Performance Logical Framework","author":"Clavel M.","year":"2007","unstructured":"Clavel , M. , , Eds. All About Maude - A High-Performance Logical Framework ( 2007 ), vol. 4350 of Lecture Notes in Computer Science , Springer . Clavel, M., et al., Eds. All About Maude - A High-Performance Logical Framework (2007), vol. 4350 of Lecture Notes in Computer Science, Springer."},{"key":"e_1_3_2_1_10_1","volume-title":"Tree automata techniques and applications. Available on: http:\/\/gforge.inria.fr\/projects\/tata\/","author":"Comon H.","year":"2008","unstructured":"Comon , H. , Dauchet , M. , Gilleron , R. , Jacquemard , F. , Lugiez , D. , Tison , S. , and Tommasi , M . Tree automata techniques and applications. Available on: http:\/\/gforge.inria.fr\/projects\/tata\/ , 2008 . Comon, H., Dauchet, M., Gilleron, R., Jacquemard, F., Lugiez, D., Tison, S., and Tommasi, M. Tree automata techniques and applications. Available on: http:\/\/gforge.inria.fr\/projects\/tata\/, 2008."},{"key":"e_1_3_2_1_11_1","volume-title":"Ip filter based firewalls how to. Available on: http:\/\/www.obfuscation.org\/ipf\/ipf-howto.pdf","author":"Conoboy B.","year":"2002","unstructured":"Conoboy , B. , and Fictner , E . Ip filter based firewalls how to. Available on: http:\/\/www.obfuscation.org\/ipf\/ipf-howto.pdf , 2002 . Conoboy, B., and Fictner, E. Ip filter based firewalls how to. Available on: http:\/\/www.obfuscation.org\/ipf\/ipf-howto.pdf, 2002."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1706356.1706370"},{"key":"e_1_3_2_1_13_1","volume-title":"IASTED International Conference on Communication, Network and Information Security","author":"Cuppens F.","year":"2005","unstructured":"Cuppens , F. , Cuppens-Boulahia , N. , and Garcia-Alfaro , J . Detection and removal of firewall misconfiguration . In IASTED International Conference on Communication, Network and Information Security ( 2005 ), ACTA Press. Cuppens, F., Cuppens-Boulahia, N., and Garcia-Alfaro, J. Detection and removal of firewall misconfiguration. In IASTED International Conference on Communication, Network and Information Security (2005), ACTA Press."},{"key":"e_1_3_2_1_14_1","volume-title":"1st Conference on Network and Information Systems Security","author":"Cuppens F.","year":"2006","unstructured":"Cuppens , F. , Cuppens-Boulahia , N. , and Garcia Alfaro , J. Detection of network security component misconfiguration by rewriting and correlation . In 1st Conference on Network and Information Systems Security ( 2006 ). Cuppens, F., Cuppens-Boulahia, N., and Garcia Alfaro, J. Detection of network security component misconfiguration by rewriting and correlation. In 1st Conference on Network and Information Systems Security (2006)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/1927806.1927815"},{"key":"e_1_3_2_1_16_1","first-page":"371","volume-title":"I. Autowrite: A Tool for Checking Properties of Term Rewriting Systems. In 13th Conference on Rewriting Techniques and Applications","author":"Durand","year":"2002","unstructured":"Durand , I. Autowrite: A Tool for Checking Properties of Term Rewriting Systems. In 13th Conference on Rewriting Techniques and Applications ( 2002 ), Lecture Notes in Computer Science, Springer , pp. 371 -- 375 . Durand, I. Autowrite: A Tool for Checking Properties of Term Rewriting Systems. In 13th Conference on Rewriting Techniques and Applications (2002), Lecture Notes in Computer Science, Springer, pp. 371--375."},{"key":"e_1_3_2_1_17_1","volume-title":"Autowrite version 4","author":"Durand I.","year":"2011","unstructured":"Durand , I. Autowrite version 4 , 2011 . http:\/\/dept-info.labri.u-bordeaux.fr\/\\ idurand\/autowrite\/. Durand, I. Autowrite version 4, 2011. http:\/\/dept-info.labri.u-bordeaux.fr\/\\ idurand\/autowrite\/."},{"key":"e_1_3_2_1_18_1","first-page":"100","volume-title":"Nordic Work. on Secure IT Systems","author":"Eronen P.","year":"2001","unstructured":"Eronen , P. , and Zitting , J . An expert system for analyzing firewall rules . In Nordic Work. on Secure IT Systems ( 2001 ), pp. 100 -- 107 . Eronen, P., and Zitting, J. An expert system for analyzing firewall rules. In Nordic Work. on Secure IT Systems (2001), pp. 100--107."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10817-004-6246-0"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4632"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/11814771_24"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/977400.977959"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2006.1607877"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-32033-3_14"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/647195.720823"},{"key":"e_1_3_2_1_27_1","first-page":"257","volume-title":"Computational Logic: Essays in Honor of Alan Robinson","author":"Jouannaud J.-P.","year":"1991","unstructured":"Jouannaud , J.-P. , and Kirchner , C . Solving equations in abstract algebras: a rule-based survey of unification . In Computational Logic: Essays in Honor of Alan Robinson . The MIT-Press , 1991 , ch. 8, pp. 257 -- 321 . Jouannaud, J.-P., and Kirchner, C. Solving equations in abstract algebras: a rule-based survey of unification. In Computational Logic: Essays in Honor of Alan Robinson. The MIT-Press, 1991, ch. 8, pp. 257--321."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2009.02.072"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2008.289"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/11516798_15"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2008.263"},{"key":"e_1_3_2_1_32_1","first-page":"1","volume-title":"24th international conference on Large installation system administration","author":"Nelson T.","year":"2010","unstructured":"Nelson , T. , Barratt , C. , Dougherty , D. , Fisler , K. , and Krishnamurthi , S . The margrave tool for firewall analysis . In 24th international conference on Large installation system administration ( 2010 ), USENIX Association , pp. 1 -- 8 . Nelson, T., Barratt, C., Dougherty, D., Fisler, K., and Krishnamurthi, S. The margrave tool for firewall analysis. In 24th international conference on Large installation system administration (2010), USENIX Association, pp. 1--8."},{"key":"e_1_3_2_1_33_1","volume-title":"Available on: http:\/\/www.netfilter.org\/documentation","author":"Russell R.","year":"2002","unstructured":"Russell , R. Linux 2.4 packet filtering how to. Available on: http:\/\/www.netfilter.org\/documentation , 2002 . Russell, R. Linux 2.4 packet filtering how to. Available on: http:\/\/www.netfilter.org\/documentation, 2002."}],"event":{"name":"PPDP '11: Symposium on Principles and Practices of Declarative Programming","sponsor":["University of Southern Denmark","Danish Agency for Science Technology and Innovation DASTI","SIGPLAN ACM Special Interest Group on Programming Languages"],"location":"Odense Denmark","acronym":"PPDP '11"},"container-title":["Proceedings of the 13th international ACM SIGPLAN symposium on Principles and practices of declarative programming"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2003476.2003489","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2003476.2003489","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:06:22Z","timestamp":1750244782000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2003476.2003489"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,7,20]]},"references-count":32,"alternative-id":["10.1145\/2003476.2003489","10.1145\/2003476"],"URL":"https:\/\/doi.org\/10.1145\/2003476.2003489","relation":{},"subject":[],"published":{"date-parts":[[2011,7,20]]},"assertion":[{"value":"2011-07-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}