{"id":"https://openalex.org/W2063819748","doi":"https://doi.org/10.1109/sncc.2014.6866524","title":"Policy exchange and management for Policy Compliance and Change Detection System in managed service in data networks","display_name":"Policy exchange and management for Policy Compliance and Change Detection System in managed service in data networks","publication_year":2014,"publication_date":"2014-06-01","ids":{"openalex":"https://openalex.org/W2063819748","doi":"https://doi.org/10.1109/sncc.2014.6866524","mag":"2063819748"},"language":"en","primary_location":{"id":"doi:10.1109/sncc.2014.6866524","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sncc.2014.6866524","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 2014 International Symposium on Networks, Computers and Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5056275173","display_name":"Saeed M. Agbariah","orcid":null},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Saeed M. Agbariah","raw_affiliation_strings":["Department of Electrical and Computer Engineering, George Mason University, Fairfax, Virginia, USA","Dept. of Electr. & Comput. Eng., George Mason Univ., Fairfax, VA, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, George Mason University, Fairfax, Virginia, USA","institution_ids":["https://openalex.org/I162714631"]},{"raw_affiliation_string":"Dept. of Electr. & Comput. Eng., George Mason Univ., Fairfax, VA, USA#TAB#","institution_ids":["https://openalex.org/I162714631"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5056275173"],"corresponding_institution_ids":["https://openalex.org/I162714631"],"apc_list":null,"apc_paid":null,"fwci":0.6896,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.74899188,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10138","display_name":"Network Traffic and Congestion Control","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10138","display_name":"Network Traffic and Congestion Control","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9930999875068665,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/compliance","display_name":"Compliance (psychology)","score":0.6132380962371826},{"id":"https://openalex.org/keywords/data-exchange","display_name":"Data exchange","score":0.48647090792655945},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.45265287160873413},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.440338134765625},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.43193864822387695},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4155488610267639},{"id":"https://openalex.org/keywords/data-management","display_name":"Data management","score":0.4112327992916107},{"id":"https://openalex.org/keywords/process-management","display_name":"Process management","score":0.35856932401657104},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.1657838523387909},{"id":"https://openalex.org/keywords/marketing","display_name":"Marketing","score":0.11541783809661865}],"concepts":[{"id":"https://openalex.org/C2781460075","wikidata":"https://www.wikidata.org/wiki/Q1399332","display_name":"Compliance (psychology)","level":2,"score":0.6132380962371826},{"id":"https://openalex.org/C15845906","wikidata":"https://www.wikidata.org/wiki/Q1172338","display_name":"Data exchange","level":2,"score":0.48647090792655945},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.45265287160873413},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.440338134765625},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.43193864822387695},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4155488610267639},{"id":"https://openalex.org/C1668388","wikidata":"https://www.wikidata.org/wiki/Q1149776","display_name":"Data management","level":2,"score":0.4112327992916107},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.35856932401657104},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.1657838523387909},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.11541783809661865},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/sncc.2014.6866524","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sncc.2014.6866524","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 2014 International Symposium on Networks, Computers and Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4300000071525574,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1618082515","https://openalex.org/W1641348075","https://openalex.org/W1845538469","https://openalex.org/W1982515874","https://openalex.org/W2024154294","https://openalex.org/W2103243421","https://openalex.org/W2154698619","https://openalex.org/W2156570922","https://openalex.org/W2236523039","https://openalex.org/W2254581461","https://openalex.org/W2258757581","https://openalex.org/W2259657230","https://openalex.org/W2296263254","https://openalex.org/W2477141338","https://openalex.org/W4300599526","https://openalex.org/W6636686359","https://openalex.org/W6638909175","https://openalex.org/W6691840444"],"related_works":["https://openalex.org/W2410395228","https://openalex.org/W3125941065","https://openalex.org/W2484615095","https://openalex.org/W4366449942","https://openalex.org/W4366371796","https://openalex.org/W4366371752","https://openalex.org/W4205440829","https://openalex.org/W1489027086","https://openalex.org/W2339265919","https://openalex.org/W1558088855"],"abstract_inverted_index":{"Greater":[0],"frequencies":[1],"of":[2],"change":[3],"to":[4,24,58,112],"network":[5,163],"devices":[6],"configuration":[7,26],"is":[8,50,92,110],"a":[9],"potentially":[10],"disruptive":[11],"factor":[12],"in":[13,51,81,160],"an":[14,55],"already":[15],"complex":[16],"and":[17,33,60,72,78,88,102,115,118,130,138,142,154],"challenging":[18],"networked":[19],"universe.":[20],"Changes":[21],"may":[22],"lead":[23],"potential":[25],"errors,":[27],"policy":[28,128,149],"violations,":[29],"inefficiencies,":[30],"vulnerable":[31],"states,":[32],"security":[34],"threats":[35],"that":[36],"are":[37],"\u201callowed":[38],"in\u201d":[39],"through":[40],"faulty":[41],"or":[42,68],"non-compliant":[43],"configurations.":[44],"The":[45,97,108],"current":[46],"Network":[47],"Management":[48],"landscape":[49],"dire":[52],"need":[53],"for":[54,76,127,146],"automated":[56],"process":[57],"prioritize":[59],"manage":[61],"risks,":[62],"audit":[63],"configurations":[64],"against":[65],"internal":[66],"policies":[67],"external":[69],"best":[70],"practices,":[71],"provide":[73],"centralized":[74],"reporting":[75],"monitoring":[77],"regulatory":[79],"purposes":[80],"real":[82],"time.":[83],"Our":[84],"proposed":[85],"Policy":[86,105,134,140,152,156],"Compliance":[87,99],"Change":[89],"Detection":[90],"System":[91],"implemented":[93],"using":[94],"two":[95],"modules:":[96],"Runtime":[98],"Manager":[100],"(RCM),":[101],"the":[103,124,133,139,144,148,151,155],"Common":[104],"Language":[106],"(CPL).":[107],"CPL":[109],"used":[111],"express":[113],"device":[114],"organizational":[116],"policies,":[117],"was":[119],"detailed.":[120],"This":[121],"paper":[122],"describes":[123,143],"design":[125],"requirements":[126],"exchange":[129],"management":[131],"between":[132,150],"Decision":[135,157],"Control":[136,158],"Server":[137,159],"Clients,":[141],"methods":[145],"keeping":[147],"Client":[153],"sync":[161],"despite":[162],"interruptions.":[164]},"counts_by_year":[{"year":2016,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
