Skip Abstract Section
Abstract
This document specifies a Uniform Resource Locator (URL), the syntax and semantics of formalized information for location and access of resources via the Internet.
RFC Downloads
ZIP
Cited By
- Almashor M, Ahmed E, Pick B, Xue J, Abuadbba S, Gaire R, Wang S, Camtepe S and Nepal S Unraveling Threat Intelligence Through the Lens of Malicious URL Campaigns Proceedings of the 18th Asian Internet Engineering Conference, (78-86)
- Valentim R, Drago I, Trevisan M and Mellia M (2023).
URLGEN —Toward Automatic URL Generation Using GANs, IEEE Transactions on Network and Service Management, 20:3, (3734-3746), Online publication date: 1-Sep-2023. - Albakry S, Vaniea K and Wolters M What is this URL's Destination? Empirical Evaluation of Users' URL Reading Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, (1-12)
- Helland P (2019). Identity by any other name, Communications of the ACM, 62:4, (80-80), Online publication date: 20-Mar-2019.
- Helland P (2018). Identity by Any Other Name, Queue, 16:6, (58-85), Online publication date: 1-Dec-2018.
- Tenorio-Fornés A, Hassan S and Pavón J Open Peer-to-Peer Systems over Blockchain and IPFS Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems, (19-24)
- Wang D, Zhang X, Ming J, Chen T, Wang C, Niu W and Liu X (2018). Resetting Your Password Is Vulnerable, Wireless Communications & Mobile Computing, 2018, Online publication date: 1-Jan-2018.
- Venkatakrishnan R and Vouk M (2016). Using Redundancy to Detect Security Anomalies: Towards IoT security attack detectors, Ubiquity, 2016:January, (1-19), Online publication date: 20-Jan-2016.
- Qu Y, Kerne A, Lupfer N, Linder R and Jain A Metadata type system Proceedings of the 2014 ACM SIGCHI symposium on Engineering interactive computing systems, (107-116)
- Weiher M and Hirschfeld R (2013). Polymorphic identifiers, ACM SIGPLAN Notices, 49:2, (61-72), Online publication date: 5-Feb-2014.
- Weiher M and Hirschfeld R Polymorphic identifiers Proceedings of the 9th symposium on Dynamic languages, (61-72)
- Sollins K Pervasive persistent identification for information centric networking Proceedings of the second edition of the ICN workshop on Information-centric networking, (1-6)
- Szymanski C and Schreier S Case Study: Extracting a resource model from an object-oriented legacy application Proceedings of the Third International Workshop on RESTful Design, (19-24)
- Park S, Zo H, Ciganek A and Lim G (2011). Examining success factors in the adoption of digital object identifier systems, Electronic Commerce Research and Applications, 10:6, (626-636), Online publication date: 1-Nov-2011.
- Callahan T, Allman M, Rabinovich M and Bell O (2011). On grappling with meta-information in the internet, ACM SIGCOMM Computer Communication Review, 41:5, (13-23), Online publication date: 22-Oct-2011.
- Oh J, Lee S and Lee S (2011). Advanced evidence collection and analysis of web browser activity, Digital Investigation: The International Journal of Digital Forensics & Incident Response, 8, (S62-S70), Online publication date: 1-Aug-2011.
- Xu X, Zhu L, Kannengiesser U and Liu Y An Architectural Style for Process-Intensive Web Information Systems 11th International Conference on Web Information Systems Engineering --- WISE 2010 - Volume 6488, (534-547)
- Brabrand C and Thomsen J Typed and unambiguous pattern matching on strings using regular expressions Proceedings of the 12th international ACM SIGPLAN symposium on Principles and practice of declarative programming, (243-254)
- Havemann S, Settgast V, Berndt R, Eide Ø and Fellner D (2009). The arrigo showcase reloaded—towards a sustainable link between 3D and semantics, Journal on Computing and Cultural Heritage , 2:1, (1-13), Online publication date: 1-Jul-2009.
- Yang X, Moore P and Chong S (2009). Intelligent products, Computers in Industry, 60:3, (184-194), Online publication date: 1-Apr-2009.
- Raman T (2009). Toward 2, beyond web 2.0, Communications of the ACM, 52:2, (52-59), Online publication date: 1-Feb-2009.
- Antonatos S, Akritidis P, Lam V and Anagnostakis K (2008). Puppetnets, ACM Transactions on Information and System Security, 12:2, (1-38), Online publication date: 1-Dec-2008.
- Dunne C, Candebat T and Gray D A three-party architecture and protocol that supports users with multiple identities for use with location based services Proceedings of the 5th international conference on Pervasive services, (1-10)
- Lee A, Winslett M, Basney J and Welch V (2008). The Traust Authorization Service, ACM Transactions on Information and System Security, 11:1, (1-33), Online publication date: 1-Feb-2008.
- Yeo C, Lee B and Zhong F A mobile SIP Proceedings of the 2nd international conference on Ubiquitous information management and communication, (125-129)
- Recordon D and Reed D OpenID 2.0 Proceedings of the second ACM workshop on Digital identity management, (11-16)
- Krammer V Phishing defense against IDN address spoofing attacks Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, (1-9)
- Lam V, Antonatos S, Akritidis P and Anagnostakis K Puppetnets Proceedings of the 13th ACM conference on Computer and communications security, (221-234)
- Rotondi G and Guerrera G (2006). A consistent history authentication protocol, ACM SIGSOFT Software Engineering Notes, 31:3, (1-7), Online publication date: 1-May-2006.
- Elias G, Schuenck M, Negócio Y, Dias J and Filho S X-ARM Proceedings of the 2006 ACM symposium on Applied computing, (1690-1694)
- Handley M, Kohler E, Ghosh A, Hodson O and Radoslavov P Designing extensible IP router software Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2, (189-202)
- Ahmedi L Making XPath reach for the web-wide links Proceedings of the 2005 ACM symposium on Applied computing, (1714-1721)
- Khare R and Taylor R Extending the Representational State Transfer (REST) Architectural Style for Decentralized Systems Proceedings of the 26th International Conference on Software Engineering, (428-437)
- Bauer M New covert channels in HTTP Proceedings of the 2003 ACM workshop on Privacy in the electronic society, (72-78)
- Curcio I Multimedia streaming over mobile networks Wireless internet handbook, (77-104)
- Spinellis D (2003). The decay and failures of web references, Communications of the ACM, 46:1, (71-77), Online publication date: 1-Jan-2003.
- Evans M and Furnell S A web-based resource migration protocol using WebDAV Proceedings of the 11th international conference on World Wide Web, (263-271)
- Ju H, Choi M and Hong J (2000). An efficient and lightweight embedded Web server for Web-based network element management, International Journal of Network Management, 10:5, (261-275), Online publication date: 18-Sep-2000.
- Deri L (1999). Desktop versus web-based network management, International Journal of Network Management, 9:6, (371-378), Online publication date: 6-Dec-1999.
- Fraser B, Roberts J, Pianosi G, Alencar P, Cowan D, German D and Nova L Dynamic views of SGML tagged documents Proceedings of the 17th annual international conference on Computer documentation, (93-98)
- English J (1999). Building self-contained websites on CD-ROM, ACM SIGCSE Bulletin, 31:3, (159-162), Online publication date: 1-Sep-1999.
- English J Building self-contained websites on CD-ROM Proceedings of the 4th annual SIGCSE/SIGCUE ITiCSE conference on Innovation and technology in computer science education, (159-162)
- Kavi K, Browne J and Tripathi A (1999). Computer Systems Research, Computer, 32:1, (30-39), Online publication date: 1-Jan-1999.
- Belaïd D, Provenzano N and Taconet C Dynamic management of CORBA trader federation Proceedings of the 4th conference on USENIX Conference on Object-Oriented Technologies and Systems - Volume 4, (4-4)
- Sánchez J, Leggett J and Schnase J AGS Proceedings of the second ACM international conference on Digital libraries, (75-82)
- Yuwono B and Lee D (1996). WISE, IEEE Transactions on Knowledge and Data Engineering, 8:4, (548-554), Online publication date: 1-Aug-1996.
- Crovella M and Bestavros A Self-similarity in World Wide Web traffic Proceedings of the 1996 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, (160-169)
- Arlitt M and Williamson C Web server workload characterization Proceedings of the 1996 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, (126-137)
- Crovella M and Bestavros A (1996). Self-similarity in World Wide Web traffic, ACM SIGMETRICS Performance Evaluation Review, 24:1, (160-169), Online publication date: 15-May-1996.
- Arlitt M and Williamson C (1996). Web server workload characterization, ACM SIGMETRICS Performance Evaluation Review, 24:1, (126-137), Online publication date: 15-May-1996.
- Topol S, Smith M and Schluederberg S Where campus meets the Internet Proceedings of the 13th annual international conference on Systems documentation: emerging from chaos: solutions for the growing complexity of our jobs, (181-188)
- Schönwälder J and Langendörfer H Tcl extensions for network management applications Proceedings of the 3rd Annual USENIX Workshop on Tcl/Tk - Volume 3, (30-30)
- Curtis P, Dixon M, Frederick R and Nichols D The Jupiter audio/video architecture Proceedings of the third ACM international conference on Multimedia, (79-90)
- Summit S Filesystem daemons as a unifying mechanism for network information access Proceedings of the USENIX Winter 1994 Technical Conference on USENIX Winter 1994 Technical Conference, (7-7)
Recommendations
Measuring Identity Confusion with Uniform Resource Locators
CHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing SystemsUniform Resource Locators (URLs) unambiguously specify host identity on the web. URLs are syntactically complex, and although software can accurately parse identity from URLs, users are frequently exposed to URLs and expected to do the same. ...