{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T11:19:59Z","timestamp":1725794399862},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662436127"},{"type":"electronic","value":"9783662436134"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-43613-4_9","type":"book-chapter","created":{"date-parts":[[2014,5,20]],"date-time":"2014-05-20T07:56:40Z","timestamp":1400572600000},"page":"133-148","source":"Crossref","is-referenced-by-count":8,"title":["Verifying Security Policies Using Host Attributes"],"prefix":"10.1007","author":[{"given":"Cornelius","family":"Diekmann","sequence":"first","affiliation":[]},{"given":"Stephan-A.","family":"Posselt","sequence":"additional","affiliation":[]},{"given":"Heiko","family":"Niedermayer","sequence":"additional","affiliation":[]},{"given":"Holger","family":"Kinkelin","sequence":"additional","affiliation":[]},{"given":"Oliver","family":"Hanka","sequence":"additional","affiliation":[]},{"given":"Georg","family":"Carle","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Bartal, Y., Mayer, A., Nissim, K., Wool, A.: Firmato: A novel firewall management toolkit. In: IEEE Symposium on Security and Privacy, pp. 17\u201331. IEEE (1999)","key":"9_CR1"},{"unstructured":"Bell, D.: Looking back at the Bell-La Padula model. In: Proceedings of the 21st Annual Computer Security Applications Conference, pp. 337\u2013351 (December 2005)","key":"9_CR2"},{"key":"9_CR3","volume-title":"Secure computer systems: A mathematical model. MTR-2547","author":"D. Bell","year":"1973","unstructured":"Bell, D., LaPadula, L.: Secure computer systems: A mathematical model. MTR-2547, vol.\u00a0II. The MITRE Corporation, Bedford (1973)"},{"issue":"4","key":"9_CR4","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1109\/TNSM.2010.1012.0365","volume":"7","author":"P. Bera","year":"2010","unstructured":"Bera, P., Ghosh, S., Dasgupta, P.: Policy based security analysis in enterprise networks: A formal approach. IEEE Transactions on Network and Service Management\u00a07(4), 231\u2013243 (2010)","journal-title":"IEEE Transactions on Network and Service Management"},{"doi-asserted-by":"crossref","unstructured":"Bishop, M.: What is computer security? IEEE Security & Privacy\u00a01 (February 2003)","key":"9_CR5","DOI":"10.1109\/MSECP.2003.1176998"},{"key":"9_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1282380.1282382","volume-title":"Proceedings of the 2007 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, SIGCOMM 2007","author":"M. Casado","year":"2007","unstructured":"Casado, M., Freedman, M.J., Pettit, J., Luo, J., McKeown, N., Shenker, S.: Ethane: taking control of the enterprise. In: Proceedings of the 2007 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, SIGCOMM 2007, pp. 1\u201312. ACM, New York (2007)"},{"unstructured":"Common Criteria: Security assurance components. Common Criteria for Information Technology Security Evaluation CCMB-2012-09-003 (September 2012), \n \n http:\/\/www.commoncriteriaportal.org\/files\/ccfiles\/CCPART3V3.1R4.pdf","key":"9_CR7"},{"key":"9_CR8","first-page":"239","volume-title":"Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, ASIACCS 2009","author":"R. Craven","year":"2009","unstructured":"Craven, R., Lobo, J., Ma, J., Russo, A., Lupu, E., Bandara, A.: Expressive policy analysis with enhanced system dynamicity. In: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, ASIACCS 2009, pp. 239\u2013250. ACM, New York (2009)"},{"key":"9_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/3-540-44569-2_2","volume-title":"Policies for Distributed Systems and Networks","author":"N. Damianou","year":"2001","unstructured":"Damianou, N., Dulay, N., Lupu, E., Sloman, M.: The ponder policy specification language. In: Sloman, M., Lobo, J., Lupu, E.C. (eds.) POLICY 2001. LNCS, vol.\u00a01995, pp. 18\u201338. Springer, Heidelberg (2001)"},{"issue":"5","key":"9_CR10","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1145\/360051.360056","volume":"19","author":"D.E. Denning","year":"1976","unstructured":"Denning, D.E.: A lattice model of secure information flow. Communications of the ACM\u00a019(5), 236\u2013243 (1976)","journal-title":"Communications of the ACM"},{"unstructured":"Diekmann, C., Hanka, O., Posselt, S.-A., Schlatt, M.: Imaginary aircraft cabin data network (toy example) (July 2013), \n \n http:\/\/www.net.in.tum.de\/pub\/diekmann\/cabin_data_network.pdf","key":"9_CR11"},{"doi-asserted-by":"crossref","unstructured":"Eckert, C.: IT-Sicherheit: Konzepte-Verfahren-Protokolle, 8th edn. Oldenbourg Verlag (2013) ISBN 3486721380","key":"9_CR12","DOI":"10.1524\/9783486735871"},{"unstructured":"Gong, L., Qian, X.: The complexity and composability of secure interoperation. In: Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy, pp. 190\u2013200 (1994)","key":"9_CR13"},{"issue":"3","key":"9_CR14","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1145\/1384609.1384625","volume":"38","author":"N. Gude","year":"2008","unstructured":"Gude, N., Koponen, T., Pettit, J., Pfaff, B., Casado, M., McKeown, N., Shenker, S.: NOX: towards an operating system for networks. SIGCOMM Comput. Commun. Rev.\u00a038(3), 105\u2013110 (2008)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"9_CR15","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/s10207-004-0052-x","volume":"4","author":"J.D. Guttman","year":"2005","unstructured":"Guttman, J.D., Herzog, A.L.: Rigorous automated network security management. International Journal of Information Security\u00a04, 29\u201348 (2005)","journal-title":"International Journal of Information Security"},{"key":"9_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/978-3-642-12251-4_9","volume-title":"Functional and Logic Programming","author":"F. Haftmann","year":"2010","unstructured":"Haftmann, F., Nipkow, T.: Code generation via higher-order rewrite systems. In: Blume, M., Kobayashi, N., Vidal, G. (eds.) FLOPS 2010. LNCS, vol.\u00a06009, pp. 103\u2013117. Springer, Heidelberg (2010)"},{"issue":"3","key":"9_CR17","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1109\/MCOM.2006.1607877","volume":"44","author":"H. Hamed","year":"2006","unstructured":"Hamed, H., Al-Shaer, E.: Taxonomy of conflicts in network security policies. IEEE Communications Magazine\u00a044(3), 134\u2013141 (2006)","journal-title":"IEEE Communications Magazine"},{"unstructured":"Kazemian, P., Varghese, G., McKeown, N.: Header space analysis: static checking for networks. In: Networked Systems Design and Implementation, NSDI 2012. USENIX Association, Berkeley (2012)","key":"9_CR18"},{"issue":"6","key":"9_CR19","doi-asserted-by":"publisher","first-page":"563","DOI":"10.1109\/32.55085","volume":"16","author":"D. McCullough","year":"1990","unstructured":"McCullough, D.: A hookup theorem for multilevel security. IEEE Transactions on Software Engineering\u00a016(6), 563\u2013568 (1990)","journal-title":"IEEE Transactions on Software Engineering"},{"doi-asserted-by":"crossref","unstructured":"Nipkow, T., Paulson, L.C., Wenzel, M.T.: Isabelle\/HOL. LNCS, vol.\u00a02283. Springer, Heidelberg (2002) (last updated 2013)","key":"9_CR20","DOI":"10.1007\/3-540-45949-9"},{"doi-asserted-by":"crossref","unstructured":"Yuan, E., Tong, J.: Attributed based access control (ABAC) for web services. In: IEEE International Conference on Web Services (2005)","key":"9_CR21","DOI":"10.1109\/ICWS.2005.25"}],"container-title":["Lecture Notes in Computer Science","Formal Techniques for Distributed Objects, Components, and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-43613-4_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T21:48:13Z","timestamp":1558907293000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-43613-4_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662436127","9783662436134"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-43613-4_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}