Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Bibliometrics
Skip Abstract Section
Abstract

This document specifies a Uniform Resource Locator (URL), the syntax and semantics of formalized information for location and access of resources via the Internet.

RFC Downloads

Cited By

  1. ACM
    Almashor M, Ahmed E, Pick B, Xue J, Abuadbba S, Gaire R, Wang S, Camtepe S and Nepal S Unraveling Threat Intelligence Through the Lens of Malicious URL Campaigns Proceedings of the 18th Asian Internet Engineering Conference, (78-86)
  2. Valentim R, Drago I, Trevisan M and Mellia M (2023). URLGEN—Toward Automatic URL Generation Using GANs, IEEE Transactions on Network and Service Management, 20:3, (3734-3746), Online publication date: 1-Sep-2023.
  3. ACM
    Albakry S, Vaniea K and Wolters M What is this URL's Destination? Empirical Evaluation of Users' URL Reading Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, (1-12)
  4. ACM
    Helland P (2019). Identity by any other name, Communications of the ACM, 62:4, (80-80), Online publication date: 20-Mar-2019.
  5. ACM
    Helland P (2018). Identity by Any Other Name, Queue, 16:6, (58-85), Online publication date: 1-Dec-2018.
  6. ACM
    Tenorio-Fornés A, Hassan S and Pavón J Open Peer-to-Peer Systems over Blockchain and IPFS Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems, (19-24)
  7. Wang D, Zhang X, Ming J, Chen T, Wang C, Niu W and Liu X (2018). Resetting Your Password Is Vulnerable, Wireless Communications & Mobile Computing, 2018, Online publication date: 1-Jan-2018.
  8. ACM
    Venkatakrishnan R and Vouk M (2016). Using Redundancy to Detect Security Anomalies: Towards IoT security attack detectors, Ubiquity, 2016:January, (1-19), Online publication date: 20-Jan-2016.
  9. ACM
    Qu Y, Kerne A, Lupfer N, Linder R and Jain A Metadata type system Proceedings of the 2014 ACM SIGCHI symposium on Engineering interactive computing systems, (107-116)
  10. ACM
    Weiher M and Hirschfeld R (2013). Polymorphic identifiers, ACM SIGPLAN Notices, 49:2, (61-72), Online publication date: 5-Feb-2014.
  11. ACM
    Weiher M and Hirschfeld R Polymorphic identifiers Proceedings of the 9th symposium on Dynamic languages, (61-72)
  12. ACM
    Sollins K Pervasive persistent identification for information centric networking Proceedings of the second edition of the ICN workshop on Information-centric networking, (1-6)
  13. ACM
    Szymanski C and Schreier S Case Study: Extracting a resource model from an object-oriented legacy application Proceedings of the Third International Workshop on RESTful Design, (19-24)
  14. Park S, Zo H, Ciganek A and Lim G (2011). Examining success factors in the adoption of digital object identifier systems, Electronic Commerce Research and Applications, 10:6, (626-636), Online publication date: 1-Nov-2011.
  15. ACM
    Callahan T, Allman M, Rabinovich M and Bell O (2011). On grappling with meta-information in the internet, ACM SIGCOMM Computer Communication Review, 41:5, (13-23), Online publication date: 22-Oct-2011.
  16. Oh J, Lee S and Lee S (2011). Advanced evidence collection and analysis of web browser activity, Digital Investigation: The International Journal of Digital Forensics & Incident Response, 8, (S62-S70), Online publication date: 1-Aug-2011.
  17. Xu X, Zhu L, Kannengiesser U and Liu Y An Architectural Style for Process-Intensive Web Information Systems 11th International Conference on Web Information Systems Engineering --- WISE 2010 - Volume 6488, (534-547)
  18. ACM
    Brabrand C and Thomsen J Typed and unambiguous pattern matching on strings using regular expressions Proceedings of the 12th international ACM SIGPLAN symposium on Principles and practice of declarative programming, (243-254)
  19. ACM
    Havemann S, Settgast V, Berndt R, Eide Ø and Fellner D (2009). The arrigo showcase reloaded—towards a sustainable link between 3D and semantics, Journal on Computing and Cultural Heritage , 2:1, (1-13), Online publication date: 1-Jul-2009.
  20. Yang X, Moore P and Chong S (2009). Intelligent products, Computers in Industry, 60:3, (184-194), Online publication date: 1-Apr-2009.
  21. ACM
    Raman T (2009). Toward 2, beyond web 2.0, Communications of the ACM, 52:2, (52-59), Online publication date: 1-Feb-2009.
  22. ACM
    Antonatos S, Akritidis P, Lam V and Anagnostakis K (2008). Puppetnets, ACM Transactions on Information and System Security, 12:2, (1-38), Online publication date: 1-Dec-2008.
  23. ACM
    Dunne C, Candebat T and Gray D A three-party architecture and protocol that supports users with multiple identities for use with location based services Proceedings of the 5th international conference on Pervasive services, (1-10)
  24. ACM
    Lee A, Winslett M, Basney J and Welch V (2008). The Traust Authorization Service, ACM Transactions on Information and System Security, 11:1, (1-33), Online publication date: 1-Feb-2008.
  25. ACM
    Yeo C, Lee B and Zhong F A mobile SIP Proceedings of the 2nd international conference on Ubiquitous information management and communication, (125-129)
  26. ACM
    Recordon D and Reed D OpenID 2.0 Proceedings of the second ACM workshop on Digital identity management, (11-16)
  27. ACM
    Krammer V Phishing defense against IDN address spoofing attacks Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, (1-9)
  28. ACM
    Lam V, Antonatos S, Akritidis P and Anagnostakis K Puppetnets Proceedings of the 13th ACM conference on Computer and communications security, (221-234)
  29. ACM
    Rotondi G and Guerrera G (2006). A consistent history authentication protocol, ACM SIGSOFT Software Engineering Notes, 31:3, (1-7), Online publication date: 1-May-2006.
  30. ACM
    Elias G, Schuenck M, Negócio Y, Dias J and Filho S X-ARM Proceedings of the 2006 ACM symposium on Applied computing, (1690-1694)
  31. Handley M, Kohler E, Ghosh A, Hodson O and Radoslavov P Designing extensible IP router software Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2, (189-202)
  32. ACM
    Ahmedi L Making XPath reach for the web-wide links Proceedings of the 2005 ACM symposium on Applied computing, (1714-1721)
  33. Khare R and Taylor R Extending the Representational State Transfer (REST) Architectural Style for Decentralized Systems Proceedings of the 26th International Conference on Software Engineering, (428-437)
  34. ACM
    Bauer M New covert channels in HTTP Proceedings of the 2003 ACM workshop on Privacy in the electronic society, (72-78)
  35. Curcio I Multimedia streaming over mobile networks Wireless internet handbook, (77-104)
  36. ACM
    Spinellis D (2003). The decay and failures of web references, Communications of the ACM, 46:1, (71-77), Online publication date: 1-Jan-2003.
  37. ACM
    Evans M and Furnell S A web-based resource migration protocol using WebDAV Proceedings of the 11th international conference on World Wide Web, (263-271)
  38. Ju H, Choi M and Hong J (2000). An efficient and lightweight embedded Web server for Web-based network element management, International Journal of Network Management, 10:5, (261-275), Online publication date: 18-Sep-2000.
  39. Deri L (1999). Desktop versus web-based network management, International Journal of Network Management, 9:6, (371-378), Online publication date: 6-Dec-1999.
  40. ACM
    Fraser B, Roberts J, Pianosi G, Alencar P, Cowan D, German D and Nova L Dynamic views of SGML tagged documents Proceedings of the 17th annual international conference on Computer documentation, (93-98)
  41. ACM
    English J (1999). Building self-contained websites on CD-ROM, ACM SIGCSE Bulletin, 31:3, (159-162), Online publication date: 1-Sep-1999.
  42. ACM
    English J Building self-contained websites on CD-ROM Proceedings of the 4th annual SIGCSE/SIGCUE ITiCSE conference on Innovation and technology in computer science education, (159-162)
  43. Kavi K, Browne J and Tripathi A (1999). Computer Systems Research, Computer, 32:1, (30-39), Online publication date: 1-Jan-1999.
  44. Belaïd D, Provenzano N and Taconet C Dynamic management of CORBA trader federation Proceedings of the 4th conference on USENIX Conference on Object-Oriented Technologies and Systems - Volume 4, (4-4)
  45. ACM
    Sánchez J, Leggett J and Schnase J AGS Proceedings of the second ACM international conference on Digital libraries, (75-82)
  46. Yuwono B and Lee D (1996). WISE, IEEE Transactions on Knowledge and Data Engineering, 8:4, (548-554), Online publication date: 1-Aug-1996.
  47. ACM
    Crovella M and Bestavros A Self-similarity in World Wide Web traffic Proceedings of the 1996 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, (160-169)
  48. ACM
    Arlitt M and Williamson C Web server workload characterization Proceedings of the 1996 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, (126-137)
  49. ACM
    Crovella M and Bestavros A (1996). Self-similarity in World Wide Web traffic, ACM SIGMETRICS Performance Evaluation Review, 24:1, (160-169), Online publication date: 15-May-1996.
  50. ACM
    Arlitt M and Williamson C (1996). Web server workload characterization, ACM SIGMETRICS Performance Evaluation Review, 24:1, (126-137), Online publication date: 15-May-1996.
  51. ACM
    Topol S, Smith M and Schluederberg S Where campus meets the Internet Proceedings of the 13th annual international conference on Systems documentation: emerging from chaos: solutions for the growing complexity of our jobs, (181-188)
  52. Schönwälder J and Langendörfer H Tcl extensions for network management applications Proceedings of the 3rd Annual USENIX Workshop on Tcl/Tk - Volume 3, (30-30)
  53. ACM
    Curtis P, Dixon M, Frederick R and Nichols D The Jupiter audio/video architecture Proceedings of the third ACM international conference on Multimedia, (79-90)
  54. Summit S Filesystem daemons as a unifying mechanism for network information access Proceedings of the USENIX Winter 1994 Technical Conference on USENIX Winter 1994 Technical Conference, (7-7)
Contributors
  • Palo Alto Research Center Incorporated
  • University of Minnesota Twin Cities

Recommendations