{"_id":"RRfqN7WfbGPbe3jsD","bibbaseid":"krishnaswamy-hardaker-mundy-dnssecinpracticeusingdnssectoolstodeploydnssec-2009","author_short":["Krishnaswamy, S.","Hardaker, W.","Mundy, R."],"bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Suresh"],"propositions":[],"lastnames":["Krishnaswamy"],"suffixes":[]},{"firstnames":["Wes"],"propositions":[],"lastnames":["Hardaker"],"suffixes":[]},{"firstnames":["Russ"],"propositions":[],"lastnames":["Mundy"],"suffixes":[]}],"title":"DNSSEC in Practice: Using DNSSEC-Tools to Deploy DNSSEC","journal":"Conference For Homeland Security, 2009. CATCH '09. Cybersecurity Applications & Technology","year":"2009","month":"03","day":"03","url":"http://ieeexplore.ieee.org/abstract/document/4804422/","myorganization":"PARSONS","abstract":"The Domain Name System (DNS) is one of the core infrastructure components of the Internet. DNS data is also trivial to spoof. The security extensions to DNS (DNSSEC) provide a mechanism for users to verify the origin authenticity and integrity of DNS data based on cryptographic signatures. DNSSEC as a technology has steadily matured over the past several years and a number of tools and services that facilitate performing DNSSEC-related operations have emerged during this period. This paper gives an overview of using existing tools and utilities from the DNSSEC-Tools 1 suite to build environments that support DNSSEC along the complete path from the authoritative name server where domain data resides to the end-application that uses DNS data.","bibtex":"@Article{wes:dnssecinpractice,\nauthor = \"Suresh Krishnaswamy and Wes Hardaker and Russ Mundy\",\ntitle = \"{DNSSEC} in Practice: Using {DNSSEC-Tools} to Deploy {DNSSEC}\",\njournal = \"Conference For Homeland Security, 2009. CATCH '09. Cybersecurity Applications \\& Technology\",\nyear = 2009,\nmonth = 03,\nday = 03,\nurl = \"http://ieeexplore.ieee.org/abstract/document/4804422/\",\nmyorganization = \"PARSONS\",\nabstract = \"The Domain Name System ({DNS}) is one of the core infrastructure components of the Internet. {DNS} data is also trivial to spoof. The security extensions to {DNS} ({DNSSEC}) provide a mechanism for users to verify the origin authenticity and integrity of {DNS} data based on cryptographic signatures. {DNSSEC} as a technology has steadily matured over the past several years and a number of tools and services that facilitate performing {DNSSEC}-related operations have emerged during this period. This paper gives an overview of using existing tools and utilities from the {DNSSEC-Tools} 1 suite to build environments that support {DNSSEC} along the complete path from the authoritative name server where domain data resides to the end-application that uses {DNS} data.\",\n}\n\n\n%%\n%% U. Lausanne\n%%\n\n","author_short":["Krishnaswamy, S.","Hardaker, W.","Mundy, R."],"bibbaseid":"krishnaswamy-hardaker-mundy-dnssecinpracticeusingdnssectoolstodeploydnssec-2009","role":"author","urls":{"Paper":"http://ieeexplore.ieee.org/abstract/document/4804422/"},"metadata":{"authorlinks":{}}},"bibtype":"article","biburl":"https://bibbase.org/f/XfejDj2FvhPWRRfbR/hardaker-2023.bib","dataSources":["Nsku3kYfcFpYyqu9a","tvsqNFk5TtbQJY2wo","b6BAndrcxvv6AyYZN"],"keywords":[],"search_terms":["dnssec","practice","using","dnssec","tools","deploy","dnssec","krishnaswamy","hardaker","mundy"],"title":"DNSSEC in Practice: Using DNSSEC-Tools to Deploy DNSSEC","year":2009}