{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T03:25:44Z","timestamp":1764732344964,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540476597"},{"type":"electronic","value":"9783540476627"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11907466_16","type":"book-chapter","created":{"date-parts":[[2006,10,15]],"date-time":"2006-10-15T07:27:12Z","timestamp":1160897232000},"page":"185-196","source":"Crossref","is-referenced-by-count":32,"title":["Using Argumentation Logic for Firewall Policy Specification and Analysis"],"prefix":"10.1007","author":[{"given":"Arosha K.","family":"Bandara","sequence":"first","affiliation":[]},{"given":"Antonis","family":"Kakas","sequence":"additional","affiliation":[]},{"given":"Emil C.","family":"Lupu","sequence":"additional","affiliation":[]},{"given":"Alessandra","family":"Russo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","volume-title":"Proceedings of 8th IFIP\/IEEE International Symposium on Integrated Network Management","author":"E.S. Al-Shaer","year":"2003","unstructured":"Al-Shaer, E.S., Hamed, H.H.: Firewall Policy Advisor for Anomaly Doscovery and Rule Editing. In: Proceedings of 8th IFIP\/IEEE International Symposium on Integrated Network Management, Colarado Springs, CO. IEEE, Los Alamitos (2003)"},{"key":"16_CR2","unstructured":"Cisco. Cisco PIX Firewall Configuration White Paper (DOCID: 68815), Cisco Inc. (2006), \n                    \n                      http:\/\/www.cisco.com\/warp\/public\/707\/ezvpn-asa-svr-871-rem.pdf"},{"key":"16_CR3","volume-title":"Proceedings of 23rd IEEE Communications Society Conference (INFOCOM)","author":"E.S. Al-Shaer","year":"2004","unstructured":"Al-Shaer, E.S., Hamed, H.H.: Discovery of Policy Anomalies in Distributed Firewalls. In: Proceedings of 23rd IEEE Communications Society Conference (INFOCOM), Hong Kong. IEEE, Los Alamitos (2004)"},{"key":"16_CR4","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1016\/0004-3702(94)00041-X","volume":"77","author":"P.M. Dung","year":"1995","unstructured":"Dung, P.M.: On the acceptability of arguments and its fundamental role in nonmonotonic reasoning, logic programming and n-person games. Artificial Intelligence\u00a0(77), 321\u2013357 (1995)","journal-title":"Artificial Intelligence"},{"key":"16_CR5","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1016\/S0004-3702(97)00015-5","volume":"93","author":"A. Bondarenko","year":"1997","unstructured":"Bondarenko, A., Dung, P.M., Kowalski, R.A., Toni, F.: An abstract argumentation theoretic approach to default reasoning. Artificial Intelligence\u00a093, 63\u2013101 (1997)","journal-title":"Artificial Intelligence"},{"key":"16_CR6","unstructured":"Kakas, A., Mancerella, P., Dung, P.M.: The acceptability semantics for logic programs. In: Proceedings of 11th International Conference on Logic Programming, Santa Marherita Ligure, Italy (1994)"},{"key":"16_CR7","series-title":"LNAI","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-61313-7_97","volume-title":"Practical Reasoning","author":"H. Prakken","year":"1996","unstructured":"Prakken, H., Sartor, G.: A system for defeasible argumentation, with defeasible priorities. In: Gabbay, D.M., Ohlbach, H.J. (eds.) FAPR 1996. LNCS (LNAI), vol.\u00a01085. Springer, Heidelberg (1996)"},{"key":"16_CR8","unstructured":"Gorgias. Argumentation and Abduction, \n                    \n                      http:\/\/www2.cs.ucy.ac.cy\/~nkd\/gorgias\/"},{"key":"16_CR9","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/S0004-3702(02)00245-X","volume":"141","author":"Y. Dimopoulos","year":"2002","unstructured":"Dimopoulos, Y., Nebel, B., Toni, F.: On the Computational Complexity of Assumption-based Argumentation for Default Reasoning. Artificial Intelligence\u00a0141, 57\u201378 (2002)","journal-title":"Artificial Intelligence"},{"issue":"3","key":"16_CR10","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/s10207-005-0074-z","volume":"5","author":"A. Mayer","year":"2006","unstructured":"Mayer, A., Wool, A., Ziskind, E.: Offline firewall analysis. International Journal on Information Security\u00a05(3), 125\u2013144 (2006)","journal-title":"International Journal on Information Security"},{"key":"16_CR11","volume-title":"Proceedings of ACM Workshop on Formal Methods in Security Engineering","author":"T.E. Uribe","year":"2004","unstructured":"Uribe, T.E., Cheung, S.: Automatic Analysis of Firewall and Network Intrusion Detection System Configurations. In: Proceedings of ACM Workshop on Formal Methods in Security Engineering, Washington, DC. ACM Press, New York (2004)"},{"key":"16_CR12","unstructured":"Yuan, L., Mai, J., Su, Z., Chen, H., Chuah, C.-N., Mohapatra, P.: FIREMAN: a toolkit for FIREwall Modeling and ANalysis. In: Proceedings of IEEE Symposium on Security and Privacy, Oakland, CA (May 2006)"}],"container-title":["Lecture Notes in Computer Science","Large Scale Management of Distributed Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11907466_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,10,12]],"date-time":"2018-10-12T09:06:26Z","timestamp":1539335186000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11907466_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540476597","9783540476627"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/11907466_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}