{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T23:13:03Z","timestamp":1729638783375,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,7]]},"DOI":"10.1109\/policy.2009.32","type":"proceedings-article","created":{"date-parts":[[2009,8,11]],"date-time":"2009-08-11T15:14:48Z","timestamp":1250003688000},"page":"60-67","source":"Crossref","is-referenced-by-count":39,"title":["Model Checking Firewall Policy Configurations"],"prefix":"10.1109","author":[{"given":"Alan","family":"Jeffrey","sequence":"first","affiliation":[]},{"given":"Taghrid","family":"Samak","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498492"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/CMPSAC.2000.884700"},{"key":"18","article-title":"benchmarking methodology for firewall performance","volume":"3511","author":"hickman","year":"2003","journal-title":"RFC"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848455"},{"key":"16","first-page":"7","article-title":"architecting the lumeta firewall analyzer","author":"wool","year":"2001","journal-title":"Proc Usenix Security Symposium"},{"journal-title":"Buddy - A Binary Decision Diagram Package","year":"2004","author":"lind-nielsen","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2004.1281597"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-444-88074-1.50021-4"},{"key":"12","doi-asserted-by":"crossref","first-page":"502","DOI":"10.1007\/978-3-540-24605-3_37","article-title":"an extensible sat-solver","volume":"2919","author":"ee?n","year":"2003","journal-title":"Proc Theory and Applications of Satisfiability Testing"},{"key":"3","article-title":"a formal model for network-wide security analysis","author":"matous?ek","year":"2008","journal-title":"Proc IEEE Int Conf Engineering of Computer Based Systems"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2005.25"},{"key":"2","article-title":"fireman: a toolkit for firewall modeling and analysis","author":"yuan","year":"0","journal-title":"Proc IEEE Symp Security and Privacy"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2004.1354680"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-444-88074-1.50009-3"},{"key":"7","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1090\/dimacs\/035\/02","article-title":"algorithms for the satisfiability (sat) problem: a survey","author":"gu","year":"1997","journal-title":"Satisfiability Problem Theory and Applications"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/DAC.2001.156196"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/368273.368557"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1986.1676819"},{"journal-title":"The netfilter org project","year":"0","key":"9"},{"key":"8","first-page":"193","article-title":"symbolic model checking without bdds","author":"biere","year":"1999","journal-title":"Proc Tools and Algorithms for the Construction and Analysis of Systems"}],"event":{"name":"2009 IEEE International Symposium on Policies for Distributed Systems and Networks - POLICY","start":{"date-parts":[[2009,7,20]]},"location":"London, UK","end":{"date-parts":[[2009,7,22]]}},"container-title":["2009 IEEE International Symposium on Policies for Distributed Systems and Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5197366\/5197367\/05197385.pdf?arnumber=5197385","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T19:31:30Z","timestamp":1558467090000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5197385\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,7]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/policy.2009.32","relation":{},"subject":[],"published":{"date-parts":[[2009,7]]}}}