{"id":"https://openalex.org/W2096812729","doi":"https://doi.org/10.1109/noms.2008.4575112","title":"Application domain independent policy conflict analysis using information models","display_name":"Application domain independent policy conflict analysis using information models","publication_year":2008,"publication_date":"2008-01-01","ids":{"openalex":"https://openalex.org/W2096812729","doi":"https://doi.org/10.1109/noms.2008.4575112","mag":"2096812729"},"language":"en","primary_location":{"id":"doi:10.1109/noms.2008.4575112","is_oa":false,"landing_page_url":"https://doi.org/10.1109/noms.2008.4575112","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047327377","display_name":"Steven Davy","orcid":"https://orcid.org/0000-0002-3300-1152"},"institutions":[{"id":"https://openalex.org/I7478328","display_name":"Waterford Institute of Technology","ror":"https://ror.org/03ypxwh20","country_code":"IE","type":"nonprofit","lineage":["https://openalex.org/I7478328"]}],"countries":["IE"],"is_corresponding":true,"raw_author_name":"Steven Davy","raw_affiliation_strings":["Telecommunication Software & Systems Group, Waterford Institute of Technology, Waterford, Ireland","Telecommun. Software & Syst. Group, Waterford Inst. of Technol., Waterford"],"affiliations":[{"raw_affiliation_string":"Telecommunication Software & Systems Group, Waterford Institute of Technology, Waterford, Ireland","institution_ids":["https://openalex.org/I7478328"]},{"raw_affiliation_string":"Telecommun. Software & Syst. Group, Waterford Inst. of Technol., Waterford","institution_ids":["https://openalex.org/I7478328"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042486447","display_name":"Brendan Jennings","orcid":"https://orcid.org/0000-0002-4945-7031"},"institutions":[{"id":"https://openalex.org/I7478328","display_name":"Waterford Institute of Technology","ror":"https://ror.org/03ypxwh20","country_code":"IE","type":"nonprofit","lineage":["https://openalex.org/I7478328"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"Brendan Jennings","raw_affiliation_strings":["Telecommunication Software & Systems Group, Waterford Institute of Technology, Waterford, Ireland","Telecommun. Software & Syst. Group, Waterford Inst. of Technol., Waterford"],"affiliations":[{"raw_affiliation_string":"Telecommunication Software & Systems Group, Waterford Institute of Technology, Waterford, Ireland","institution_ids":["https://openalex.org/I7478328"]},{"raw_affiliation_string":"Telecommun. Software & Syst. Group, Waterford Inst. of Technol., Waterford","institution_ids":["https://openalex.org/I7478328"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077118181","display_name":"John Strassner","orcid":null},"institutions":[{"id":"https://openalex.org/I1333370159","display_name":"Motorola (United States)","ror":"https://ror.org/01hafxd32","country_code":"US","type":"company","lineage":["https://openalex.org/I1333370159"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"John Strassner","raw_affiliation_strings":["Motorola Research Laboratories, Schaumburg, IL, USA","Motorola Labs, Schaumburg, IL, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Motorola Research Laboratories, Schaumburg, IL, USA","institution_ids":["https://openalex.org/I1333370159"]},{"raw_affiliation_string":"Motorola Labs, Schaumburg, IL, USA#TAB#","institution_ids":["https://openalex.org/I1333370159"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5047327377"],"corresponding_institution_ids":["https://openalex.org/I7478328"],"apc_list":null,"apc_paid":null,"fwci":12.4388,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.98119401,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"17","last_page":"24"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9907000064849854,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7957996129989624},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5398776531219482},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5301065444946289},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5262395739555359},{"id":"https://openalex.org/keywords/firewall","display_name":"Firewall (physics)","score":0.4968116581439972},{"id":"https://openalex.org/keywords/conflict-analysis","display_name":"Conflict analysis","score":0.49552667140960693},{"id":"https://openalex.org/keywords/policy-analysis","display_name":"Policy analysis","score":0.474069744348526},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.42158204317092896},{"id":"https://openalex.org/keywords/security-policy","display_name":"Security policy","score":0.411632776260376},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3533584475517273},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3077325224876404},{"id":"https://openalex.org/keywords/conflict-resolution","display_name":"Conflict resolution","score":0.28471893072128296}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7957996129989624},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5398776531219482},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5301065444946289},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5262395739555359},{"id":"https://openalex.org/C77714075","wikidata":"https://www.wikidata.org/wiki/Q5452017","display_name":"Firewall (physics)","level":5,"score":0.4968116581439972},{"id":"https://openalex.org/C138232368","wikidata":"https://www.wikidata.org/wiki/Q5160175","display_name":"Conflict analysis","level":3,"score":0.49552667140960693},{"id":"https://openalex.org/C123587114","wikidata":"https://www.wikidata.org/wiki/Q2101508","display_name":"Policy analysis","level":2,"score":0.474069744348526},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.42158204317092896},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.411632776260376},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3533584475517273},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3077325224876404},{"id":"https://openalex.org/C21711469","wikidata":"https://www.wikidata.org/wiki/Q1194317","display_name":"Conflict resolution","level":2,"score":0.28471893072128296},{"id":"https://openalex.org/C74650414","wikidata":"https://www.wikidata.org/wiki/Q11397","display_name":"Classical mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C124017977","wikidata":"https://www.wikidata.org/wiki/Q11412","display_name":"Gravitation","level":2,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C183915046","wikidata":"https://www.wikidata.org/wiki/Q1316152","display_name":"Charged black hole","level":4,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C115304011","wikidata":"https://www.wikidata.org/wiki/Q72755","display_name":"Schwarzschild radius","level":3,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/noms.2008.4575112","is_oa":false,"landing_page_url":"https://doi.org/10.1109/noms.2008.4575112","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7200000286102295,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320320847","display_name":"Science Foundation Ireland","ror":"https://ror.org/0271asj38"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1982255089","https://openalex.org/W1991493530","https://openalex.org/W2000203817","https://openalex.org/W2012419258","https://openalex.org/W2048056473","https://openalex.org/W2083506022","https://openalex.org/W2117826841","https://openalex.org/W2144338762","https://openalex.org/W2148004493","https://openalex.org/W2148656332","https://openalex.org/W2162737732","https://openalex.org/W2164441047","https://openalex.org/W2165892480","https://openalex.org/W2168884369","https://openalex.org/W2295769861"],"related_works":["https://openalex.org/W2052627535","https://openalex.org/W7781076","https://openalex.org/W2124658384","https://openalex.org/W2304523314","https://openalex.org/W2026466961","https://openalex.org/W2375183403","https://openalex.org/W160083106","https://openalex.org/W3013802070","https://openalex.org/W2159944478","https://openalex.org/W1983535948"],"abstract_inverted_index":{"A":[0],"key":[1],"part":[2],"of":[3,10,84,128],"the":[4,11,56,61,66,79,82,96,109,119,131,146,150],"policy":[5,30,62,132],"authoring":[6],"process":[7],"is":[8,68,106,116,161],"analysis":[9,32],"potential":[12,53,165],"for":[13,29,167],"newly":[14,38],"created":[15,39],"or":[16,40],"modified":[17],"policies":[18,36,57,85,97],"to":[19,60,65,93,136,163],"conflict":[20,31,91],"with":[21,48,52],"already":[22,49],"deployed":[23,50],"policies.":[24,174],"We":[25],"propose":[26],"an":[27,74,89,156],"approach":[28,67],"in":[33,108,118,141,158],"which":[34,159],"candidate":[35],"(either":[37],"modified)":[41],"are":[42,134],"analyzed":[43],"on":[44],"a":[45,69,125],"pair-wise":[46],"basis":[47],"policies,":[51],"conflicts":[54,166],"between":[55,81],"being":[58],"notified":[59],"author.":[63],"Central":[64],"two-phase":[70],"algorithm":[71,105,153],"which,":[72],"querying":[73],"information":[75,115,120],"model,":[76],"firstly":[77],"determines":[78],"relationships":[80],"pair":[83],"and,":[86],"secondly,":[87],"applies":[88],"application-specific":[90],"pattern":[92],"determine":[94],"if":[95],"should":[98],"be":[99,139],"flagged":[100],"as":[101,122,124],"potentially":[102],"conflicting.":[103],"The":[104],"generic":[107],"sense":[110],"that":[111],"all":[112],"application":[113,143],"specific":[114],"encoded":[117],"model;":[121],"long":[123],"minimal":[126],"set":[127],"assumptions":[129],"regarding":[130],"model":[133],"adhered":[135],"it":[137,160],"can":[138],"applied":[140],"arbitrary":[142],"domains.":[144],"In":[145],"paper":[147],"we":[148],"present":[149],"two":[151],"phase":[152],"and":[154,171],"describe":[155],"implementation":[157],"used":[162],"detect":[164],"both":[168],"access":[169],"control":[170],"filtering":[172],"(firewall)":[173]},"counts_by_year":[{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
