Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
RFC1035: Domain names - implementation and specification1987 RFC
Publisher:
  • RFC Editor
  • United States
Published:01 November 1987
RFC Status
Updated by:
Reflects downloads up to 16 Oct 2024Bibliometrics
Abstract

No abstract available.

RFC Downloads

Cited By

  1. ACM
    Strachanski F, Petrov D, Schmidbauer T and Wendzel S A Comprehensive Pattern-based Overview of Stegomalware Proceedings of the 19th International Conference on Availability, Reliability and Security, (1-10)
  2. ACM
    Heftrig E, Schulmann H, Vogel N and Waidner M Protocol Fixes for KeyTrap Vulnerabilities Proceedings of the 2024 Applied Networking Research Workshop, (74-80)
  3. ACM
    Drichel A, Meyer M and Meyer U Towards Robust Domain Generation Algorithm Classification Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, (2-18)
  4. Sengupta J, Kosek M, Fries J, Ferlin-Reiter S and Bajpai V (2024). On Cross-Layer Interactions of QUIC, Encrypted DNS and HTTP/3: Design, Evaluation, and Dataset, IEEE Transactions on Network and Service Management, 21:3, (2992-3007), Online publication date: 1-Jun-2024.
  5. Jerabek K, Hynek K and Rysavy O (2024). Comparative analysis of DNS over HTTPS detectors, Computer Networks: The International Journal of Computer and Telecommunications Networking, 247:C, Online publication date: 1-Jun-2024.
  6. Fernandez S, Hureau O, Duda A and Korczynski M WHOIS Right? An Analysis of WHOIS and RDAP Consistency Passive and Active Measurement, (206-231)
  7. Gao G, Niu W, Gong J, Gu D, Li S, Zhang M and Zhang X (2024). GraphTunnel: Robust DNS Tunnel Detection Based on DNS Recursive Resolution Graph, IEEE Transactions on Information Forensics and Security, 19, (7705-7719), Online publication date: 1-Jan-2024.
  8. ACM
    Arouna A, Livadariu I, Van Rijswijk-Deij R and Jonker M Advancing in Reverse: A Comprehensive Characterization of IN-ADDR.ARPA Deployment Proceedings of the 18th Asian Internet Engineering Conference, (37-45)
  9. Hasegawa K, Kondo D, Osumi M and Tode H (2023). Collaborative Defense Framework Using FQDN-Based Allowlist Filter Against DNS Water Torture Attack, IEEE Transactions on Network and Service Management, 20:4, (3968-3983), Online publication date: 1-Dec-2023.
  10. ACM
    Gibb R, Madhavapeddy A and Crowcroft J Where on Earth is the Spatial Name System? Proceedings of the 22nd ACM Workshop on Hot Topics in Networks, (79-86)
  11. ACM
    Xu W, Li X, Lu C, Liu B, Duan H, Zhang J, Chen J and Wan T TsuKing: Coordinating DNS Resolvers and Queries into Potent DoS Amplifiers Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, (311-325)
  12. ACM
    Linker F and Basin D ADEM: An Authentic Digital EMblem Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, (2815-2829)
  13. ACM
    Liu S, Duan H, Heimes L, Bearzi M, Vieli J, Basin D and Perrig A A Formal Framework for End-to-End DNS Resolution Proceedings of the ACM SIGCOMM 2023 Conference, (932-949)
  14. ACM
    Lyu M, Gharakheili H and Sivaraman V (2022). A Survey on DNS Encryption: Current Development, Malware Misuse, and Inference Techniques, ACM Computing Surveys, 55:8, (1-28), Online publication date: 31-Aug-2023.
  15. Shi J, Wang Z, Feng Z, Lan Y, Qin S, You W, Zou W, Payer M and Zhang C AIFORE Proceedings of the 32nd USENIX Conference on Security Symposium, (4967-4984)
  16. ACM
    Fiebig T Crisis, Ethics, Reliability & a measurement.network Proceedings of the 2023 Applied Networking Research Workshop, (44-50)
  17. ACM
    Arouna A, Livadariu I and Jonker M Lowering the Barriers to Working with Public RIR-Level Data Proceedings of the 2023 Applied Networking Research Workshop, (24-26)
  18. ACM
    Lim S, Lee H, Kim H, Lee H and Kwon T ZTLS: A DNS-based Approach to Zero Round Trip Delay in TLS handshake Proceedings of the ACM Web Conference 2023, (2360-2370)
  19. ACM
    Xu C, Zhang Y, Shi F, Ma H, Ding W and Shan H Gushing Resolvers: Measuring Open Resolvers’ Recursive Behavior Proceedings of the 4th International Conference on Advanced Information Science and System, (1-6)
  20. ACM
    Moure-Garrido M, Campo C and Garcia-Rubio C Detecting Malicious Use of DoH Tunnels Using Statistical Traffic Analysis Proceedings of the 19th ACM International Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, & Ubiquitous Networks, (25-32)
  21. ACM
    Kosek M, Doan T, Huber S and Bajpai V (2022). Measuring DNS over TCP in the era of increasing DNS response sizes, ACM SIGCOMM Computer Communication Review, 52:2, (44-55), Online publication date: 30-Apr-2022.
  22. Park J, Jang R, Mohaisen M and Mohaisen D (2021). A Large-Scale Behavioral Analysis of the Open DNS Resolvers on the Internet, IEEE/ACM Transactions on Networking, 30:1, (76-89), Online publication date: 1-Feb-2022.
  23. ACM
    Nawrocki M, Koch M, Schmidt T and Wählisch M Transparent forwarders Proceedings of the 17th International Conference on emerging Networking EXperiments and Technologies, (454-462)
  24. ACM
    Kakarla S, Beckett R, Millstein T and Varghese G How Complex is DNS? Proceedings of the 20th ACM Workshop on Hot Topics in Networks, (116-122)
  25. ACM
    Chhabra R, Murley P, Kumar D, Bailey M and Wang G Measuring DNS-over-HTTPS performance around the world Proceedings of the 21st ACM Internet Measurement Conference, (351-365)
  26. ACM
    Nawrocki M, Hiesgen R, Schmidt T and Wählisch M QUICsand Proceedings of the 21st ACM Internet Measurement Conference, (283-291)
  27. Wang Z and Guo Y (2021). Neural networks based domain name generation, Journal of Information Security and Applications, 61:C, Online publication date: 1-Sep-2021.
  28. ACM
    Shimayoshi T, Kasahara Y and Fujimura N Challenge for Consolidation of Individual Email Services into a Cloud Service Proceedings of the 2021 ACM SIGUCCS Annual Conference, (26-29)
  29. ACM
    Li H, Zhang X, Cao S, He L and Zhang H Active Measurement of Open Resolver Service Nodes Proceedings of the 4th International Conference on Computer Science and Application Engineering, (1-8)
  30. ACM
    Li H, He L, Zhang H, Zhang K, Li X and He C CDN-hosted Domain Detection with Supervised Machine Learning through DNS Records Proceedings of the 3rd International Conference on Information Science and Systems, (144-149)
  31. ACM
    Li H, Zhang H, He L, Zhang K, He C and Wei B Role Identification of Domain Name Server Using Machine Learning based on DNS Response Features Proceedings of the 3rd International Conference on Information Science and Systems, (133-137)
  32. ACM
    Nakatsuka Y, Paverd A and Tsudik G PDoT Proceedings of the 35th Annual Computer Security Applications Conference, (489-499)
  33. Ghali C, Tsudik G and Uzun E (2019). In Content We Trust, IEEE/ACM Transactions on Networking, 27:5, (1787-1800), Online publication date: 1-Oct-2019.
  34. ACM
    Zhauniarovich Y, Khalil I, Yu T and Dacier M (2018). A Survey on Malicious Domains Detection through DNS Data Analysis, ACM Computing Surveys, 51:4, (1-36), Online publication date: 31-Jul-2019.
  35. ACM
    Delaware B, Suriyakarn S, Pit-Claudel C, Ye Q and Chlipala A (2019). Narcissus: correct-by-construction derivation of decoders and encoders from binary formats, Proceedings of the ACM on Programming Languages, 3:ICFP, (1-29), Online publication date: 26-Jul-2019.
  36. Tomic D, Zagar D and Martinovic G (2019). Implementation and efficiency analysis of composite DNS-metric for dynamic server selection, Telecommunications Systems, 71:1, (1-18), Online publication date: 1-May-2019.
  37. ACM
    Ye Q and Delaware B A verified protocol buffer compiler Proceedings of the 8th ACM SIGPLAN International Conference on Certified Programs and Proofs, (222-233)
  38. Chiba D, Yagi T, Akiyama M, Shibahara T, Mori T and Goto S (2018). DomainProfiler, International Journal of Information Security, 17:6, (661-680), Online publication date: 1-Nov-2018.
  39. ACM
    Moura G, Heidemann J, Müller M, de O. Schmidt R and Davids M When the Dike Breaks Proceedings of the Internet Measurement Conference 2018, (8-21)
  40. ACM
    Mwangi X and Sollins K MNDN Proceedings of the 5th ACM Conference on Information-Centric Networking, (117-124)
  41. ACM
    Messabi K, Aldwairi M, Yousif A, Thoban A and Belqasmi F Malware detection using DNS records and domain name features Proceedings of the 2nd International Conference on Future Networks and Distributed Systems, (1-7)
  42. ACM
    Carrez S (2018). IP Network Stack in Ada 2012 and the Ravenscar Profile, ACM SIGAda Ada Letters, 37:2, (51-58), Online publication date: 13-Jun-2018.
  43. Casleton E, Osthus D and VanźBuren K (2018). Imputation for multisource data with comparison and assessment techniques, Applied Stochastic Models in Business and Industry, 34:1, (44-60), Online publication date: 1-Jan-2018.
  44. ACM
    Chen S, Jeng T, Huang C, Chen C and Chou K Doctrina Proceedings of the 2017 7th International Conference on Communication and Network Security, (67-75)
  45. ACM
    Müller M, Moura G, de O. Schmidt R and Heidemann J Recursives in the wild Proceedings of the 2017 Internet Measurement Conference, (489-495)
  46. Chen Y, Kintis P, Antonakakis M, Nadji Y, Dagon D and Farrell M (2017). Measuring lower bounds of the financial abuse to online advertisers, Computers and Security, 67:C, (164-180), Online publication date: 1-Jun-2017.
  47. Azodi A, Cheng F and Meinel C (2017). Event Driven Network Topology Discovery and Inventory Listing Using REAMS, Wireless Personal Communications: An International Journal, 94:3, (415-430), Online publication date: 1-Jun-2017.
  48. Kalim U, Gardner M, Brown E and Feng W SLIM Proceedings of the Symposium on Architectures for Networking and Communications Systems, (165-177)
  49. ACM
    Chen C, Lehri H, Kuan Loh L, Alur A, Jia L, Loo B and Zhou W Distributed Provenance Compression Proceedings of the 2017 ACM International Conference on Management of Data, (203-218)
  50. ACM
    Radwan M and Heckel R Prediction of the domain name system (DNS) quality attributes Proceedings of the Symposium on Applied Computing, (578-585)
  51. Stevanovic M, Pedersen J, D'alconzo A and Ruehrup S (2017). A method for identifying compromised clients based on DNS traffic analysis, International Journal of Information Security, 16:2, (115-132), Online publication date: 1-Apr-2017.
  52. Hubballi N and Tripathi N (2017). A closer look into DHCP starvation attack in wireless networks, Computers and Security, 65:C, (387-404), Online publication date: 1-Mar-2017.
  53. ACM
    Korczyński M, Król M and van Eeten M Zone Poisoning Proceedings of the 2016 Internet Measurement Conference, (271-278)
  54. ACM
    Moura G, Schmidt R, Heidemann J, de Vries W, Muller M, Wei L and Hesselman C Anycast vs. DDoS Proceedings of the 2016 Internet Measurement Conference, (255-270)
  55. ACM
    Kirchler M, Herrmann D, Lindemann J and Kloft M Tracked Without a Trace Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, (23-34)
  56. ACM
    Yu D, Ranganathan A, Masti R, Soriente C and Capkun S SALVE Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, (401-414)
  57. ACM
    D'Urso C (2016). EXPERIENCE, Journal of Data and Information Quality, 7:3, (1-22), Online publication date: 27-Sep-2016.
  58. ACM
    Ghali C, Tsudik G and Wood C Network Names in Content-Centric Networking Proceedings of the 3rd ACM Conference on Information-Centric Networking, (132-141)
  59. Martínez-Herrera A, Mancillas-López C and Mex-Perera C (2016). GCM implementations of Camellia-128 and SMS4 by optimizing the polynomial multiplier, Microprocessors & Microsystems, 45:PA, (129-140), Online publication date: 1-Aug-2016.
  60. Kintis P, Nadji Y, Dagon D, Farrell M and Antonakakis M Understanding the Privacy Implications of ECS Proceedings of the 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment - Volume 9721, (343-353)
  61. Chen Y, Kintis P, Antonakakis M, Nadji Y, Dagon D, Lee W and Farrell M Financial Lower Bounds of Online Advertising Abuse Proceedings of the 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment - Volume 9721, (231-254)
  62. Gao H, Yegneswaran V, Jiang J, Chen Y, Porras P, Ghosh S and Duan H (2016). Reexamining DNS from a global recursive resolver perspective, IEEE/ACM Transactions on Networking, 24:1, (43-57), Online publication date: 1-Feb-2016.
  63. Weitl F, Sebih N, Artho C, Hagiya M, Tanabe Y, Yamagata Y and Yamamoto M Cardinality of UDP Transmission Outcomes Proceedings of the First International Symposium on Dependable Software Engineering: Theories, Tools, and Applications - Volume 9409, (120-134)
  64. ACM
    Danielis P, Altmann V, Skodzik J, Wegner T, Koerner A and Timmermann D (2015). P-DONAS, ACM Transactions on Internet Technology, 15:3, (1-21), Online publication date: 28-Sep-2015.
  65. Madhavapeddy A, Leonard T, Skjegstad M, Gazagnaire T, Sheets D, Scott D, Mortier R, Chaudhry A, Singh B, Ludlam J, Crowcroft J and Leslie I Jitsu Proceedings of the 12th USENIX Conference on Networked Systems Design and Implementation, (559-573)
  66. Flavel A, Mani P, Maltz D, Holt N, Liu J, Chen Y and Surmachev O FastRoute Proceedings of the 12th USENIX Conference on Networked Systems Design and Implementation, (381-394)
  67. ACM
    van Rijswijk-Deij R, Sperotto A and Pras A DNSSEC and its potential for DDoS attacks Proceedings of the 2014 Conference on Internet Measurement Conference, (449-460)
  68. Wachs M, Schanzenbach M and Grothoff C A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System Proceedings of the 13th International Conference on Cryptology and Network Security - Volume 8813, (127-142)
  69. Bangert J and Zeldovich N Nail Proceedings of the 11th USENIX conference on Operating Systems Design and Implementation, (615-628)
  70. ACM
    Carpenter B (2014). IP addresses considered harmful, ACM SIGCOMM Computer Communication Review, 44:2, (65-69), Online publication date: 8-Apr-2014.
  71. ACM
    Thomas M and Mohaisen A Kindred domains Proceedings of the 23rd International Conference on World Wide Web, (707-712)
  72. Gran E, Dreibholz T and Kvalbein A (2014). NorNet Core - A multi-homed research testbed, Computer Networks: The International Journal of Computer and Telecommunications Networking, 61:C, (75-87), Online publication date: 14-Mar-2014.
  73. Schomp K, Callahan T, Rabinovich M and Allman M Assessing DNS Vulnerability to Record Injection Proceedings of the 15th International Conference on Passive and Active Measurement - Volume 8362, (214-223)
  74. Sargent M, Blanton E and Allman M Modern Application Layer Transmission Patterns from a Transport Perspective Proceedings of the 15th International Conference on Passive and Active Measurement - Volume 8362, (141-150)
  75. Jayarathna D, Tupakula U and Varadharajan V Hypervisor-based security architecture for validating DNS services (poster) Proceedings of the Twelfth Australasian Information Security Conference - Volume 149, (83-86)
  76. ACM
    Rafiee H, Mueller C, Niemeier L, Streek J, Sterz C and Meinel C A flexible framework for detecting IPv6 vulnerabilities Proceedings of the 6th International Conference on Security of Information and Networks, (196-202)
  77. ACM
    López J, Maag S and Morales G A formal distributed network monitoring approach for enhancing trust management systems Proceedings of the Fifth International Conference on Management of Emergent Digital EcoSystems, (76-83)
  78. ACM
    Berger A, Weaver N, Beverly R and Campbell L Internet nameserver IPv4 and IPv6 address relationships Proceedings of the 2013 conference on Internet measurement conference, (91-104)
  79. ACM
    Gao H, Yegneswaran V, Chen Y, Porras P, Ghosh S, Jiang J and Duan H (2013). An empirical reexamination of global DNS behavior, ACM SIGCOMM Computer Communication Review, 43:4, (267-278), Online publication date: 19-Sep-2013.
  80. ACM
    Gao H, Yegneswaran V, Chen Y, Porras P, Ghosh S, Jiang J and Duan H An empirical reexamination of global DNS behavior Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM, (267-278)
  81. Yevseyeva I, Basto-Fernandes V, Ruano-OrdáS D and MéNdez J (2013). Optimising anti-spam filters with evolutionary algorithms, Expert Systems with Applications: An International Journal, 40:10, (4010-4021), Online publication date: 1-Aug-2013.
  82. ACM
    Callahan T, Allman M and Rabinovich M (2013). On modern DNS behavior and properties, ACM SIGCOMM Computer Communication Review, 43:3, (7-15), Online publication date: 1-Jul-2013.
  83. ACM
    Shue C and Kalafut A (2013). Resolvers Revealed, ACM Transactions on Internet Technology, 12:4, (1-17), Online publication date: 1-Jul-2013.
  84. Rose S Progress of DNS security deployment in the federal government Proceedings of the 26th international conference on Large Installation System Administration: strategies, tools, and techniques, (223-228)
  85. Dolberg L, François J and Engel T Efficient multidimensional aggregation for large scale monitoring Proceedings of the 26th international conference on Large Installation System Administration: strategies, tools, and techniques, (163-180)
  86. ACM
    Alves R, Campista M, Costa L and Duarte O Towards a pluralist internet using a virtual machine server for network customization Proceedings of the 8th Asian Internet Engineering Conference, (9-16)
  87. ACM
    Dagon D Large-scale DNS data analysis Proceedings of the 2012 ACM conference on Computer and communications security, (1054-1055)
  88. Marchal S, François J, State R and Engel T Proactive discovery of phishing related domain names Proceedings of the 15th international conference on Research in Attacks, Intrusions, and Defenses, (190-209)
  89. ACM
    Sollins K Pervasive persistent identification for information centric networking Proceedings of the second edition of the ICN workshop on Information-centric networking, (1-6)
  90. ACM
    Anonymous (2012). The collateral damage of internet censorship by DNS injection, ACM SIGCOMM Computer Communication Review, 42:3, (21-27), Online publication date: 26-Jun-2012.
  91. ACM
    Yu Y, Wessels D, Larson M and Zhang L (2012). Authority server selection in DNS caching resolvers, ACM SIGCOMM Computer Communication Review, 42:2, (80-86), Online publication date: 29-Mar-2012.
  92. ACM
    Deri L, Trombacchi L, Martinelli M and Vannozzi D Towards a passive DNS monitoring system Proceedings of the 27th Annual ACM Symposium on Applied Computing, (629-630)
  93. Deccio C, Sedayao J, Kant K and Mohapatra P (2012). Quantifying DNS namespace influence, Computer Networks: The International Journal of Computer and Telecommunications Networking, 56:2, (780-794), Online publication date: 1-Feb-2012.
  94. Rafetseder A, Metzger F, Stezenbach D and Tutschku K Exploring YouTube's content distribution network through distributed application-layer measurements Proceedings of the 2011 International Workshop on Modeling, Analysis, and Control of Complex Networks, (31-36)
  95. Xu Q, Migault D, Sénécal S and Francfort S K-means and adaptive k-means algorithms for clustering DNS traffic Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools, (281-290)
  96. ACM
    Antunes J and Neves N Automatically complementing protocol specifications from network traces Proceedings of the 13th European Workshop on Dependable Computing, (87-92)
  97. ACM
    Borkar G, Pund M and Jawade P Implementation of round robin policy in DNS for thresholding of distributed web server system Proceedings of the International Conference & Workshop on Emerging Trends in Technology, (198-201)
  98. Shue C and Gupta M (2010). An Internet without the Internet protocol, Computer Networks: The International Journal of Computer and Telecommunications Networking, 54:18, (3232-3245), Online publication date: 1-Dec-2010.
  99. ACM
    Khosrowshahi B and Graham P Component placement and location for a dynamic software composition system Proceedings of the 2nd Canadian Conference on Computer Science and Software Engineering, (127-130)
  100. ACM
    Zhang R, Wang X, Farley R, Yang X and Jiang X On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, (61-69)
  101. ACM
    Jackson C, Barth A, Bortz A, Shao W and Boneh D (2009). Protecting browsers from DNS rebinding attacks, ACM Transactions on the Web, 3:1, (1-26), Online publication date: 1-Jan-2009.
  102. ACM
    Cui W, Peinado M, Chen K, Wang H and Irun-Briz L Tupni Proceedings of the 15th ACM conference on Computer and communications security, (391-402)
  103. ACM
    Dagon D, Antonakakis M, Vixie P, Jinmei T and Lee W Increased DNS forgery resistance through 0x20-bit encoding Proceedings of the 15th ACM conference on Computer and communications security, (211-222)
  104. ACM
    Ballani H and Francis P Mitigating DNS DoS attacks Proceedings of the 15th ACM conference on Computer and communications security, (189-198)
  105. ACM
    Luckie M, Hyun Y and Huffaker B Traceroute probe method and forward IP path inference Proceedings of the 8th ACM SIGCOMM conference on Internet measurement, (311-324)
  106. ACM
    Plonka D and Barford P Context-aware clustering of DNS query traffic Proceedings of the 8th ACM SIGCOMM conference on Internet measurement, (217-230)
  107. ACM
    Elz R and Kamolphiwong S Towards universal mobile-IP Proceedings of the International Conference on Mobile Technology, Applications, and Systems, (1-6)
  108. Rikitake K, Nakao K, Shimojo S and Nogawa H (2008). UDP Large-Payload Capability Detection for DNSSEC, IEICE - Transactions on Information and Systems, E91-D:5, (1261-1273), Online publication date: 1-May-2008.
  109. ACM
    Akcan H, Suel T and Brönnimann H Geographic web usage estimation by monitoring DNS caches Proceedings of the first international workshop on Location and the web, (85-92)
  110. Khoury J, Jerez H and De Cicco L Design and implementation of a framework for persistent identification and communication in emerging networks Proceedings of the 4th International Conference on Testbeds and research infrastructures for the development of networks & communities, (1-8)
  111. ACM
    Jin S, Gyeong G and Eom Y Design and implementation of VoIP device management scheme in SOHO environments Proceedings of the 2nd international conference on Ubiquitous information management and communication, (580-584)
  112. ACM
    Jackson C, Barth A, Bortz A, Shao W and Boneh D Protecting browsers from dns rebinding attacks Proceedings of the 14th ACM conference on Computer and communications security, (421-431)
  113. ACM
    Caballero J, Yin H, Liang Z and Song D Polyglot Proceedings of the 14th ACM conference on Computer and communications security, (317-329)
  114. Chen X, Wang H, Ren S and Zhang X (2007). Maintaining Strong Cache Consistency for the Domain Name System, IEEE Transactions on Knowledge and Data Engineering, 19:8, (1057-1071), Online publication date: 1-Aug-2007.
  115. ACM
    Zhang G, Ehlert S, Magedanz T and Sisalem D Denial of service attack and prevention on SIP VoIP infrastructures using DNS flooding Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications, (57-66)
  116. Zeinalipour-Yazti D, Kalogeraki V and Gunopulos D (2007). pFusion, IEEE Transactions on Parallel and Distributed Systems, 18:6, (804-817), Online publication date: 1-Jun-2007.
  117. ACM
    Zhang J and Honeyman P NFSv4 replication for grid storage middleware Proceedings of the 4th international workshop on Middleware for grid computing
  118. ACM
    Pang R, Paxson V, Sommer R and Peterson L binpac Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, (289-300)
  119. ACM
    Castro M, O'Shea G and Rowstron A Zero servers with zero broadcasts Proceedings of the 1st international workshop on Decentralized resource sharing in mobile computing and networking, (36-41)
  120. ACM
    Lutz P NetDev Proceedings of the 6th conference on Information technology education, (113-119)
  121. Ramasubramanian V and Sirer E Perils of transitive trust in the domain name system Proceedings of the 5th ACM SIGCOMM conference on Internet measurement, (35-35)
  122. ACM
    Ishibashi K, Toyono T, Toyama K, Ishino M, Ohshima H and Mizukoshi I Detecting mass-mailing worm infected hosts by mining DNS traffic data Proceedings of the 2005 ACM SIGCOMM workshop on Mining network data, (159-164)
  123. ACM
    Saito Y and Shapiro M (2005). Optimistic replication, ACM Computing Surveys, 37:1, (42-81), Online publication date: 1-Mar-2005.
  124. Cohen E, Halperin E and Kaplan H (2005). Performance aspects of distributed caches using, TTL-based consistency, Theoretical Computer Science, 331:1, (73-96), Online publication date: 15-Feb-2005.
  125. Giordano M DNS-Based discovery system in service oriented programming Proceedings of the 2005 European conference on Advances in Grid Computing, (840-850)
  126. Park K, Pai V, Peterson L and Wang Z CoDNS Proceedings of the 6th conference on Symposium on Operating Systems Design & Implementation - Volume 6, (14-14)
  127. ACM
    Malone D The root of the matter Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, (15-20)
  128. ACM
    Pappas V, Fältström P, Massey D and Zhang L Distributed DNS troubleshooting Proceedings of the ACM SIGCOMM workshop on Network troubleshooting: research, theory and operations practice meet malfunctioning reality, (265-270)
  129. ACM
    Balakrishnan H, Lakshminarayanan K, Ratnasamy S, Shenker S, Stoica I and Walfish M (2004). A layered naming architecture for the internet, ACM SIGCOMM Computer Communication Review, 34:4, (343-352), Online publication date: 30-Aug-2004.
  130. ACM
    Ramasubramanian V and Sirer E (2004). The design and implementation of a next generation name service for the internet, ACM SIGCOMM Computer Communication Review, 34:4, (331-342), Online publication date: 30-Aug-2004.
  131. ACM
    Argyraki K and Cheriton D Loose source routing as a mechanism for traffic policies Proceedings of the ACM SIGCOMM workshop on Future directions in network architecture, (57-64)
  132. ACM
    Balakrishnan H, Lakshminarayanan K, Ratnasamy S, Shenker S, Stoica I and Walfish M A layered naming architecture for the internet Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications, (343-352)
  133. ACM
    Ramasubramanian V and Sirer E The design and implementation of a next generation name service for the internet Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications, (331-342)
  134. Preechaveerakul L and Bhattarakosol P One name—many objects—one result Proceedings of the 2004 international symposium on Information and communication technologies, (63-67)
  135. ACM
    Wills C, Mikhailov M and Shang H Inferring relative popularity of internet applications by actively querying DNS caches Proceedings of the 3rd ACM SIGCOMM conference on Internet measurement, (78-90)
  136. ACM
    Sollins K (2003). Designing for scale and differentiation, ACM SIGCOMM Computer Communication Review, 33:4, (267-276), Online publication date: 1-Oct-2003.
  137. ACM
    Clark D, Sollins K, Wroclawski J and Faber T (2003). Addressing reality, ACM SIGCOMM Computer Communication Review, 33:4, (247-257), Online publication date: 1-Oct-2003.
  138. ACM
    Carter C, Yi S, Ratanchandani P and Kravets R Manycast Proceedings of the 9th annual international conference on Mobile computing and networking, (273-285)
  139. Huebsch R, Hellerstein J, Lanham N, Loo B, Shenker S and Stoica I Querying the internet with PIER Proceedings of the 29th international conference on Very large data bases - Volume 29, (321-332)
  140. ACM
    Sollins K Designing for scale and differentiation Proceedings of the ACM SIGCOMM workshop on Future directions in network architecture, (267-276)
  141. ACM
    Clark D, Sollins K, Wroclawski J and Faber T Addressing reality Proceedings of the ACM SIGCOMM workshop on Future directions in network architecture, (247-257)
  142. ACM
    Krishnamurthy B, Liston R and Rabinovich M DEW Proceedings of the 12th international conference on World Wide Web, (310-320)
  143. Li H and Wang Y Public-key infrastructure Payment technologies for E-commerce, (39-70)
  144. ACM
    Liston R, Srinivasan S and Zegura E Diversity in DNS performance measures Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment, (19-31)
  145. Banerjee S, Agarwal S, Kamel K, Kochut A, Kommareddy C, Nadeem T, Thakkar P, Trinh B, Youssef A, Youssef M, Larsen R, Shankar A and Agrawala A (2002). Rover, Computer, 35:10, (46-53), Online publication date: 1-Oct-2002.
  146. ACM
    Balzarotti D, Ghezzi C and Monga M Supporting configuration management for virtual workgroups in a peer-to-peer setting Proceedings of the 14th international conference on Software engineering and knowledge engineering, (507-511)
  147. ACM
    Bayardo Jr. R, Agrawal R, Gruhl D and Somani A YouServ Proceedings of the 11th international conference on World Wide Web, (345-354)
  148. ACM
    Ateniese G and Mangard S A new approach to DNS security (DNSSEC) Proceedings of the 8th ACM conference on Computer and Communications Security, (86-95)
  149. ACM
    Jung J, Sit E, Balakrishnan H and Morris R DNS performance and the effectiveness of caching Proceedings of the 1st ACM SIGCOMM Workshop on Internet measurement, (153-167)
  150. ACM
    Paxson V (2001). An analysis of using reflectors for distributed denial-of-service attacks, ACM SIGCOMM Computer Communication Review, 31:3, (38-47), Online publication date: 1-Jul-2001.
  151. Carpenter T, Carter R, Cochinwala M and Eiger M (2001). Client-Server Caching with Expiration Timestamps, Distributed and Parallel Databases, 10:1, (5-22), Online publication date: 1-Jul-2001.
  152. ACM
    Tzagarakis M, Karousos N, Christodoulakis D and Reich S Naming as a fundamental concept of open hypermedia systems Proceedings of the eleventh ACM on Hypertext and hypermedia, (103-112)
  153. Iyengar A, Challenger J, Dias D and Dantzig P (2000). High-Performance Web Site Design Techniques, IEEE Internet Computing, 4:2, (17-26), Online publication date: 1-Mar-2000.
  154. LeFebvre W and Craig K Rapid reverse DNS lookups for web servers Proceedings of the 2nd conference on USENIX Symposium on Internet Technologies and Systems - Volume 2, (21-21)
  155. ACM
    Raman S and McCanne S (1999). A model, analysis, and protocol framework for soft state-based communication, ACM SIGCOMM Computer Communication Review, 29:4, (15-25), Online publication date: 1-Oct-1999.
  156. ACM
    Raman S and McCanne S A model, analysis, and protocol framework for soft state-based communication Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication, (15-25)
  157. Guttman E (1999). Service Location Protocol, IEEE Internet Computing, 3:4, (71-80), Online publication date: 1-Jul-1999.
  158. ACM
    Hutchins R, Camp T and Enslow P (1999). A novel approach to mobility management, ACM SIGCOMM Computer Communication Review, 29:1, (86-96), Online publication date: 1-Jan-1999.
  159. Grubb M and Carter R Single Sign-On and the System Administrator Proceedings of the 12th USENIX conference on System administration, (63-86)
  160. Belaïd D, Provenzano N and Taconet C Dynamic management of CORBA trader federation Proceedings of the 4th conference on USENIX Conference on Object-Oriented Technologies and Systems - Volume 4, (4-4)
  161. ACM
    Maltzahn C, Richardson K and Grunwald D (1997). Performance issues of enterprise level web proxies, ACM SIGMETRICS Performance Evaluation Review, 25:1, (13-23), Online publication date: 1-Jun-1997.
  162. ACM
    Maltzahn C, Richardson K and Grunwald D Performance issues of enterprise level web proxies Proceedings of the 1997 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, (13-23)
  163. ACM
    Mansfield G, Jayanthi K, Ika T, Ohta K, Nemoto Y and Kato N Network cartographer Proceedings of the fourth ACM international conference on Multimedia, (439-440)
  164. Galvin J Public Key distribution with secure DNS Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6, (16-16)
  165. Chankhunthod A, Danzig P, Neerdaels C, Schwartz M and Worrell K A hierarchical internet object cache Proceedings of the 1996 annual conference on USENIX Annual Technical Conference, (13-13)
  166. ACM
    Sollins K and Van Dyke J Linking in a Global Information Architecture Proceedings of the Fourth International Conference on World Wide Web, (493-508)
  167. Bellovin S Using the domain name system for system break-ins Proceedings of the 5th conference on USENIX UNIX Security Symposium - Volume 5, (18-18)
  168. Blackwell T, Chan K, Chang K, Charuhas T, Gwertzman J, Karp B, Kung H, Li W, Lin D, Morris R, Polansky R, Tang D, Young C and Zao J Secure short-cut routing for mobile IP Proceedings of the USENIX Summer 1994 Technical Conference on USENIX Summer 1994 Technical Conference - Volume 1, (21-21)
  169. Rao H and Peterson L (1993). Accessing Files in an Internet, IEEE Transactions on Software Engineering, 19:6, (613-624), Online publication date: 1-Jun-1993.
  170. Neufeld G and Brachman B A transactional API for the EAN X.500 directory service Proceedings of the 1992 conference of the Centre for Advanced Studies on Collaborative research - Volume 2, (81-91)
  171. ACM
    Danzig P, Obraczka K and Kumar A (1992). An analysis of wide-area name server traffic, ACM SIGCOMM Computer Communication Review, 22:4, (281-292), Online publication date: 1-Oct-1992.
  172. ACM
    Danzig P, Obraczka K and Kumar A An analysis of wide-area name server traffic Conference proceedings on Communications architectures & protocols, (281-292)
  173. ACM
    Shaheen-Gouda A and Loucks L Name borders Proceedings of the 5th workshop on ACM SIGOPS European workshop: Models and paradigms for distributed systems structuring, (1-6)
  174. Znati T and Molka J A simulation based analysis of naming schemes for distributed systems Proceedings of the 25th annual symposium on Simulation, (42-51)
  175. Chang R, Ravishankar C and Slonim J A service acquisition mechanism for the client/service model in cygnus Proceedings of the 1991 conference of the Centre for Advanced Studies on Collaborative research, (323-345)
  176. ACM
    Tsuchiya P (1991). Efficient and robust policy routing using multiple hierarchical addresses, ACM SIGCOMM Computer Communication Review, 21:4, (53-65), Online publication date: 1-Aug-1991.
  177. ACM
    Tsuchiya P Efficient and robust policy routing using multiple hierarchical addresses Proceedings of the conference on Communications architecture & protocols, (53-65)
  178. Hutchinson N and Peterson L (1991). The X-Kernel, IEEE Transactions on Software Engineering, 17:1, (64-76), Online publication date: 1-Jan-1991.
  179. ACM
    Comer D and Droms R (1990). Uniform access to Internet directory services, ACM SIGCOMM Computer Communication Review, 20:4, (50-59), Online publication date: 1-Aug-1990.
  180. ACM
    Comer D and Droms R Uniform access to Internet directory services Proceedings of the ACM symposium on Communications architectures & protocols, (50-59)
  181. ACM
    Peterson L, Hutchinson N, O'Malley S and Abbott M (1989). RPC in the x-Kernel: evaluating new design techniques, ACM SIGOPS Operating Systems Review, 23:5, (91-101), Online publication date: 1-Nov-1989.
  182. ACM
    Peterson L, Hutchinson N, O'Malley S and Abbott M RPC in the x-Kernel: evaluating new design techniques Proceedings of the twelfth ACM symposium on Operating systems principles, (91-101)
  183. ACM
    Mockapetris P and Dunlap K (1988). Development of the domain name system, ACM SIGCOMM Computer Communication Review, 18:4, (123-133), Online publication date: 1-Aug-1988.
  184. ACM
    Mills D (1988). The fuzzball, ACM SIGCOMM Computer Communication Review, 18:4, (115-122), Online publication date: 1-Aug-1988.
  185. ACM
    Hutchinson N and Peterson L (1988). Design of the x-kernel, ACM SIGCOMM Computer Communication Review, 18:4, (65-75), Online publication date: 1-Aug-1988.
  186. ACM
    Mockapetris P and Dunlap K Development of the domain name system Symposium proceedings on Communications architectures and protocols, (123-133)
  187. ACM
    Mills D The fuzzball Symposium proceedings on Communications architectures and protocols, (115-122)
  188. ACM
    Hutchinson N and Peterson L Design of the x-kernel Symposium proceedings on Communications architectures and protocols, (65-75)
Contributors
  • Information Sciences Institute

Recommendations