@misc { , title = {Evaluation of binary decision diagrams for redundancy, shadowing, generalisation and correlation in an Information sharing model.}, abstract = {This paper defines a structured methodology which is based on the foundational work of Al-Shaer et al. in [1] and that of Hamed and Al-Shaer in [2]. It defines a methodology for the declaration of policy field elements, through to the syntax, ontology and functional verification stages. In their works of [1] and [2] the authors concentrated on developing formal definitions of possible anomalies between rules in a network firewall rule set. Their work is considered as the foundation for further works on anomaly detection, including those of Fitzgerald et al. [3], Chen et al. [4], Hu et al. [5], among others. This paper extends this work by applying the methods to information sharing policies, and outlines the evaluation related to these.}, note = {School: iidi Listed on IIDI as not submitted Item type changed to Monograph - working paper LG 04/07/2016}, publicationstatus = {Unpublished}, url = {http://researchrepository.napier.ac.uk/id/eprint/6469}, keyword = {004.2 Systems analysis, design & performance, QA75 Electronic computers. Computer science, Cyber-security, Centre for Distributed Computing, Networking and Security, AI and Technologies, Policy field elements, network firewall, anomaly detection, binary decision diagrams;}, author = {Uthmani, Omair and Buchanan, William J and Fan, Lu and Lawson, Alistair} }