The DNSSECbis data model has key introduction follow the delegation chain, thus requiring a zone's parent to become secure before a zone itself can be secured. Ultimately this leads to non-deployability since the root zone will probably not be secured any time soon. We describe an early deployment aid for DNSSECbis whereby key introduction can be done via cooperating third parties.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Paul VIXIE, "Preventing Child Neglect in DNSSECbis Using Lookaside Validation (DLV)" in IEICE TRANSACTIONS on Communications,
vol. E88-B, no. 4, pp. 1326-1330, April 2005, doi: 10.1093/ietcom/e88-b.4.1326.
Abstract: The DNSSECbis data model has key introduction follow the delegation chain, thus requiring a zone's parent to become secure before a zone itself can be secured. Ultimately this leads to non-deployability since the root zone will probably not be secured any time soon. We describe an early deployment aid for DNSSECbis whereby key introduction can be done via cooperating third parties.
URL: https://global.ieice.org/en_transactions/communications/10.1093/ietcom/e88-b.4.1326/_p
Copy
@ARTICLE{e88-b_4_1326,
author={Paul VIXIE, },
journal={IEICE TRANSACTIONS on Communications},
title={Preventing Child Neglect in DNSSECbis Using Lookaside Validation (DLV)},
year={2005},
volume={E88-B},
number={4},
pages={1326-1330},
abstract={The DNSSECbis data model has key introduction follow the delegation chain, thus requiring a zone's parent to become secure before a zone itself can be secured. Ultimately this leads to non-deployability since the root zone will probably not be secured any time soon. We describe an early deployment aid for DNSSECbis whereby key introduction can be done via cooperating third parties.},
keywords={},
doi={10.1093/ietcom/e88-b.4.1326},
ISSN={},
month={April},}
Copy
TY - JOUR
TI - Preventing Child Neglect in DNSSECbis Using Lookaside Validation (DLV)
T2 - IEICE TRANSACTIONS on Communications
SP - 1326
EP - 1330
AU - Paul VIXIE
PY - 2005
DO - 10.1093/ietcom/e88-b.4.1326
JO - IEICE TRANSACTIONS on Communications
SN -
VL - E88-B
IS - 4
JA - IEICE TRANSACTIONS on Communications
Y1 - April 2005
AB - The DNSSECbis data model has key introduction follow the delegation chain, thus requiring a zone's parent to become secure before a zone itself can be secured. Ultimately this leads to non-deployability since the root zone will probably not be secured any time soon. We describe an early deployment aid for DNSSECbis whereby key introduction can be done via cooperating third parties.
ER -