{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T22:13:54Z","timestamp":1648678434930},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"1-2","license":[{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Ann. T\u00e9l\u00e9commun."],"published-print":{"date-parts":[[2004,1]]},"DOI":"10.1007\/bf03179675","type":"journal-article","created":{"date-parts":[[2021,7,7]],"date-time":"2021-07-07T06:33:22Z","timestamp":1625639602000},"page":"70-87","source":"Crossref","is-referenced-by-count":0,"title":["ProNet: A policy network environment"],"prefix":"10.1007","volume":"59","author":[{"given":"Joseane","family":"Farias Fidalgo","sequence":"first","affiliation":[]},{"given":"Djamel Fawzi","family":"Hadj Sadok","sequence":"additional","affiliation":[]},{"given":"Judith","family":"Kelner","sequence":"additional","affiliation":[]},{"given":"Robson","family":"Do Nascimento Fidalgo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"BF03179675_CR1","unstructured":"Asgari (A.),et al., \u201cA monitoring and Measurement Architecture for Traffic Engineered IP Networks\u201d,International Symposiumon Tellecommunications, Tehran, Iran, Sep. 2001."},{"key":"BF03179675_CR2","doi-asserted-by":"crossref","unstructured":"Damianou (N.),et al., \u201cThe Ponder Policy Specification Language\u201d,Workshop on Policies for Distributed Systems and Networks, Bristol, U.K. 2001","DOI":"10.1007\/3-540-44569-2_2"},{"key":"BF03179675_CR3","doi-asserted-by":"crossref","unstructured":"Durham (D.),Boyle, (J.),Cohen (R.),Herzog (S.),Rajan (R.),Sastry (A.), Thecops (Common Open Policy Service) Protocol,rfc2748, 2000.","DOI":"10.17487\/rfc2748"},{"key":"BF03179675_CR4","unstructured":"Elek (V.),Karlsson (G.),Ronngren (R.), \u201cAdmission control based on end-to-end measurements\u201d,infocom2000, Tel Aviv, Israel, Mar. 2000."},{"key":"BF03179675_CR5","unstructured":"Elmasri (R.),Navathe (S. B.), Fundamentals of Database Systems,Addison-Wesley, 1994."},{"key":"BF03179675_CR6","doi-asserted-by":"crossref","unstructured":"Flegkas (P.),et al., \u201cOn Policy-based Extensible Hierarchical Network Management in QoS-enabled IP Networks\u201d,Workshop on Policies for Distributed Systems and Networks, Springer-Verlag (lncs series), 2001.","DOI":"10.1007\/3-540-44569-2_15"},{"key":"BF03179675_CR7","unstructured":"Hoagland (J. A.),et al., \u201cSecurity Policy Specification Using a Graphical Approach\u201d,ucDavis Computer Science Department, 1998."},{"key":"BF03179675_CR8","doi-asserted-by":"crossref","unstructured":"Howard (L.), \u201cAn Approach for Usingldap as a Network Information Service\u201d,rfc2307, 1998.","DOI":"10.17487\/rfc2307"},{"key":"BF03179675_CR9","unstructured":"Hayton (R.J.),et al., \u201cAccess Control in an Open Distributed Environment\u201d.ieeeSymposium on Security and Privacy, Oakland, California, U.S.A, 1998."},{"key":"BF03179675_CR10","unstructured":"Jajodia (S.),et al., \u201cA Logical Language for Expressing Authorisations\u201d,ieeeSymposium on Security and Privacy, Oakland, USA, 1997."},{"key":"BF03179675_CR11","unstructured":"Marriot (D.A.),et al., \u201cSpecification of Management Policies\u201d,dsomWorkshop, Oct. 1994."},{"key":"BF03179675_CR12","doi-asserted-by":"crossref","unstructured":"Moore (B.),Elesson (E.),Strassner (J.),Westerinen (A.), \u201cPolicy Core Information Model \u2014 Version 1 Specification\u201d,rfc3060, 2001.","DOI":"10.17487\/rfc3060"},{"key":"BF03179675_CR13","unstructured":"Park (J.T.),et al.., \u201cManagement of Service Level Agreements for Multimedia Internet Service Using a Utility Model\u201d,ieeeCommunications Magazine, May 2001."},{"key":"BF03179675_CR14","doi-asserted-by":"crossref","unstructured":"Ribeiro (C.),et al., \u201cEnforcing Obligation with Security Monitors\u201d,Third International Conference on Information and Communications Security, Xian, China, 2001.","DOI":"10.1007\/3-540-45600-7_20"},{"key":"BF03179675_CR15","doi-asserted-by":"crossref","unstructured":"Stone (G.N.),Lundy (B.),Xie (G.G.), \u201cNetwork Policy Languages: A Survey and a New Approach\u201d,ieeeNetwork, January 2001, pp. 10\u201321.","DOI":"10.1109\/65.898818"},{"key":"BF03179675_CR16","doi-asserted-by":"crossref","unstructured":"Wies (R.), \u201cPolicies in Network and Systems Management: Formal Definition and Architecture\u201d,Journal of Network and Systems Management, Plenum Publishing Corp.,2 no 1, March 1994, p. 63\u201383.","DOI":"10.1007\/BF02141605"}],"container-title":["Annales des T\u00e9l\u00e9communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/BF03179675.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/BF03179675\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/BF03179675.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,7]],"date-time":"2021-07-07T06:49:51Z","timestamp":1625640591000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/BF03179675"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,1]]},"references-count":16,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2004,1]]}},"alternative-id":["BF03179675"],"URL":"https:\/\/doi.org\/10.1007\/bf03179675","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"value":"0003-4347","type":"print"},{"value":"1958-9395","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004,1]]}}}