{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T05:28:08Z","timestamp":1747805288484},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"1-2","license":[{"start":{"date-parts":[[2009,2,18]],"date-time":"2009-02-18T00:00:00Z","timestamp":1234915200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Netw Syst Manage"],"published-print":{"date-parts":[[2009,6]]},"DOI":"10.1007\/s10922-009-9119-3","type":"journal-article","created":{"date-parts":[[2009,2,17]],"date-time":"2009-02-17T19:12:34Z","timestamp":1234897954000},"page":"5-32","source":"Crossref","is-referenced-by-count":33,"title":["The Design of a New Policy Model to Support Ontology-Driven Reasoning for Autonomic Networking"],"prefix":"10.1007","volume":"17","author":[{"given":"John","family":"Strassner","sequence":"first","affiliation":[]},{"given":"Jos\u00e9 Neuman","family":"de Souza","sequence":"additional","affiliation":[]},{"given":"Sven","family":"van der Meer","sequence":"additional","affiliation":[]},{"given":"Steven","family":"Davy","sequence":"additional","affiliation":[]},{"given":"Keara","family":"Barrett","sequence":"additional","affiliation":[]},{"given":"David","family":"Raymer","sequence":"additional","affiliation":[]},{"given":"Srini","family":"Samudrala","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,2,18]]},"reference":[{"key":"9119_CR1","doi-asserted-by":"crossref","unstructured":"Strassner, J.: Autonomic Networks and Systems: Theory and Practice. IM 2007 Tutorial, April (2006)","DOI":"10.1109\/NOMS.2006.1687596"},{"key":"9119_CR2","unstructured":"Strassner, J.: Policy Based Network Management. Morgan Kaufman, San Francisco, CA, ISBN 1-55860-859-1 (2003)"},{"key":"9119_CR3","unstructured":"Strassner, J., Agoulmine, N., Lehtihet, E.: FOCALE \u2013 A Novel Autonomic Networking Architecture. ITSSA J. 3(1), 64\u201379 (2007)"},{"key":"9119_CR4","doi-asserted-by":"crossref","unstructured":"Strassner, J.: Knowledge Management Issues for Autonomic Systems. TAKMA 2005 Conference","DOI":"10.1109\/DEXA.2005.126"},{"key":"9119_CR5","doi-asserted-by":"crossref","unstructured":"Damianou, N., Dulay, N., Lupu, E.C., Sloman, M.: The ponder policy specification language. LNCS Proceedings, IEEE 2nd International Workshop on Policies for Distributed Systems and Networks, pp. 18\u201338 (2001)","DOI":"10.1007\/3-540-44569-2_2"},{"key":"9119_CR6","doi-asserted-by":"crossref","unstructured":"Ovesj\u00f6, F., Dahlman, E., Ojanper\u00e4, T., Toskala, A., Klein, A.: FRAMES Multiple Access Mode 2\u2014Wideband CDMA. PIMRC (1997)","DOI":"10.1109\/PIMRC.1997.624360"},{"key":"9119_CR7","doi-asserted-by":"crossref","unstructured":"Mitola, J.: Cognitive Radio Architecture: The Engineering Foundations of Radio XML. Wiley-Interscience, Hoboken, NJ, ISBN 0471742449 (2006)","DOI":"10.1002\/0471773735"},{"key":"9119_CR8","doi-asserted-by":"crossref","unstructured":"Kephart, J.O., Chess, D.M.: The vision of autonomic computing. IEEE Comput. 36(1), 41\u201350 (2003) https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/research.ibm.com\/autonomic\/research\/papers\/","DOI":"10.1109\/MC.2003.1160055"},{"key":"9119_CR9","unstructured":"IBM: An Architectural Blueprint for Autonomic Computing, vol. 7, June (2005) https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/www-01.ibm.com\/software\/tivoli\/autonomic\/"},{"key":"9119_CR10","doi-asserted-by":"crossref","unstructured":"Prehofer, C., Bettstetter, C.: Self-organization in communication networks: principles and paradigms. IEEE Commun. Mag. 43(7), 78\u201385 (2005)","DOI":"10.1109\/MCOM.2005.1470824"},{"key":"9119_CR11","unstructured":"Damianou, N., Bandara, A., Sloman, M., Lupu, E.C. A Survey of Policy Specification Approaches. Department of Computing, Imperial College of Science Technology and Medicine, London (2002)"},{"key":"9119_CR12","unstructured":"Kagal, L., Finin, T. Joshi, A.: A policy language for a pervasive computing environmnet. In: Proceedings IEEE 4th International Workshop on Policies for Distributed Systems and Networks, June (2003)"},{"key":"9119_CR13","doi-asserted-by":"crossref","unstructured":"Toninelli, A., Montanari, R., Kagal, L., Lassila, O.: A semantic context-aware access control framework for secure collaborations in pervasive computing environments. In: Proceedings 5th International Semantic Web Conference (ISWC), pp. 473\u2013486. November (2006)","DOI":"10.1007\/11926078_34"},{"key":"9119_CR14","unstructured":"Fowler, M.: Analysis Patterns\u2014Reusable Object Models. Addison-Wesley, ISBN 0-201-89542-0 (1996)"},{"key":"9119_CR15","unstructured":"Strassner, J., Fu, J.: Policy-Based Enforcement of Ubiquitous Role-Based Access Control. Paper Accepted for Autonomic and Trusted Computing Conference (2007)"},{"issue":"10","key":"9119_CR16","doi-asserted-by":"crossref","first-page":"2058","DOI":"10.1109\/JSAC.2005.854130","volume":"23","author":"A Wong","year":"2005","unstructured":"Wong, A., Ray, P., Parameswaran, N., Strassner, J.: Ontology mapping for the interoperability problem in network management. J Select. Area. Commun. 23(10), 2058\u20132068 (2005)","journal-title":"J Select. Area. Commun."},{"key":"9119_CR17","unstructured":"Strassner, J., Menich, B.: Philosophy and Methodology for Knowledge Discovery in Autonomic Computing Systems. PMKD 2005 Conference"},{"key":"9119_CR18","doi-asserted-by":"crossref","unstructured":"Kephart, J., Walsh, W.: An AI Perspective on Autonomic Computing Policies. Policy (2004)","DOI":"10.1109\/POLICY.2004.1309145"},{"issue":"1","key":"9119_CR19","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1145\/300830.300834","volume":"2","author":"D Ferraiolo","year":"1999","unstructured":"Ferraiolo, D., Barkley, J., Kuhn, D.: A role-based access control model and reference implementation within a corporate Intranet. ACM Trans. Inform. Syst. Security (TISSEC) 2(1), 34\u201364 (1999)","journal-title":"ACM Trans. Inform. Syst. Security (TISSEC)"},{"key":"9119_CR20","unstructured":"Ferraiolo, D., Cugini, J., Kuhn, D.: Role based access control: features and motivations. In: Proceedings of the 11th Annual Conference on Computer Security Applications, pp. 241\u2013248. IEEE Computer Society Press, Los Alamitos, CA (1995)"},{"key":"9119_CR21","doi-asserted-by":"crossref","unstructured":"Sandhu, R., Coyne, E., Feinstein, H., Youman, C. Role-based access control models. IEEE Comput. 29(2), 38\u201347 (1996)","DOI":"10.1109\/2.485845"},{"key":"9119_CR22","doi-asserted-by":"crossref","unstructured":"Sandhu, R., Ferraiolo, D., Kuhn, D.: The NIST model for role based access control: towards a unified standard. Postscript PDF Proceedings, 5th ACM Workshop on Role Based Access Control, July 26\u201327, 2000\u2014first public draft of proposal for an RBAC standard","DOI":"10.1145\/344287.344301"},{"key":"9119_CR23","unstructured":"Strassner, J., Raymer, D., Lehtihet, E., Van der Meer, S.: End-to-end model-driven policy based network management. In: Policy 2006 Conference"},{"key":"9119_CR24","doi-asserted-by":"crossref","unstructured":"Strassner, J., Raymer, D.: Implementing Next Generation Services Using Policy-Based Management and Autonomic Computing Principles. NOMS (2006)","DOI":"10.1109\/NOMS.2006.1687611"},{"key":"9119_CR25","unstructured":"Strassner, J.: Seamless mobility\u2014a compelling blend of ubiquitous computing and autonomic computing. In: Dagstuhl Workshop on Autonomic Networking, Jan (2006)"},{"key":"9119_CR26","doi-asserted-by":"crossref","unstructured":"Sahai, A., Singhal, V., Machiraju, V., Joshi, R.: Automated Policy-based Resource Construction in Utility Computing Environments. NOMS (2004)","DOI":"10.1109\/NOMS.2004.1317677"},{"key":"9119_CR27","unstructured":"DMTF: CIM Simplified Policy Language. DSP0231, Version 1.0.0a, January 10 (2007)"}],"container-title":["Journal of Network and Systems Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/link.springer.com\/content\/pdf\/10.1007\/s10922-009-9119-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/link.springer.com\/article\/10.1007\/s10922-009-9119-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/link.springer.com\/content\/pdf\/10.1007\/s10922-009-9119-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T08:55:33Z","timestamp":1559465733000},"score":1,"resource":{"primary":{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/link.springer.com\/10.1007\/s10922-009-9119-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,2,18]]},"references-count":27,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2009,6]]}},"alternative-id":["9119"],"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1007\/s10922-009-9119-3","relation":{},"ISSN":["1064-7570","1573-7705"],"issn-type":[{"value":"1064-7570","type":"print"},{"value":"1573-7705","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,2,18]]}}}