{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T10:27:59Z","timestamp":1744194479762},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030017033"},{"type":"electronic","value":"9783030017040"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-01704-0_9","type":"book-chapter","created":{"date-parts":[[2018,12,28]],"date-time":"2018-12-28T16:02:50Z","timestamp":1546012970000},"page":"155-170","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Metapolicy Framework for Enhancing Domain Expressiveness on the Internet"],"prefix":"10.1007","author":[{"given":"Gaurav","family":"Varshney","sequence":"first","affiliation":[]},{"given":"Pawel","family":"Szalachowski","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,29]]},"reference":[{"key":"9_CR1","unstructured":"Alexa. Alexa Top 1 Million Websites (2017). http:\/\/s3.amazonaws.com\/alexa-static\/top-1m.csv.zip"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Amann, J., Gasser, O., Scheitle, Q., Brent, L., Carle, G., Holz, R.: Mission accomplished?: Https security after diginotar. In: Proceedings of the 2017 Internet Measurement Conference, pp. 325\u2013340. ACM (2017)","DOI":"10.1145\/3131365.3131401"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Crocker, D., Hansen, T., Kucherawy, M.: DomainKeys Identified Mail (DKIM) Signatures. RFC 6376 (Internet Standard), September 2011","DOI":"10.17487\/rfc6376"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Egelman, S., Cranor, L.F., Hong, J.: You\u2019ve been warned: an empirical study of the effectiveness of web browser phishing warnings. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1065\u20131074. ACM (2008)","DOI":"10.1145\/1357054.1357219"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Evans, C., Palmer, C., Sleevi, R.: Public Key Pinning Extension for HTTP. RFC 7469 (Proposed Standard), April 2015","DOI":"10.17487\/RFC7469"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Hallam-Baker, P., Stradling, R.: DNS Certification Authority Authorization (CAA) Resource Record. RFC 6844 (Proposed Standard), January 2013","DOI":"10.17487\/rfc6844"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Hodges, J., Jackson, C., Barth, A.: HTTP Strict Transport Security (HSTS). RFC 6797 (Proposed Standard), November 2012","DOI":"10.17487\/rfc6797"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Hoffman, P., Schlyter, J.: The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA. RFC 6698 (Proposed Standard), August 2012. Updated by RFCs 7218, 7671","DOI":"10.17487\/rfc6698"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Housley, R., Polk, W., Ford, W., Solo, D.: Internet x. 509 public key infrastructure certificate and certificate revocation list (crl) profile. Technical report (2002)","DOI":"10.17487\/rfc3280"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Kitterman, S.: Sender Policy Framework (SPF) for Authorizing Use of Domains in Email, Version 1. RFC 7208 (Proposed Standard), April 2014. Updated by RFC 7372","DOI":"10.17487\/rfc7208"},{"key":"9_CR11","unstructured":"Kommareddi, A.: Modify Headers for Google Chrome (2017). https:\/\/chrome.google.com\/webstore\/detail\/modify-headers-for-google\/innpjfdalfhpcoinfnehdnbkglpmogdi"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Kranch, M., Bonneau, J.: Upgrading https in mid-air: an empirical study of strict transport security and key pinning. In: NDSS (2015)","DOI":"10.14722\/ndss.2015.23162"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Kucherawy, M., Zwicky, E.: Domain-based Message Authentication, Reporting, and Conformance (DMARC). RFC 7489 (Informational), March 2015","DOI":"10.17487\/rfc7489"},{"key":"9_CR14","unstructured":"Larson, M., Massey, D., Rose, S., Arends, R., Austein, R.: Dns security introduction and requirements (2005)"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Mockapetris, P.V.: Domain names: Implementation specification (1983)","DOI":"10.17487\/rfc0883"},{"key":"9_CR16","unstructured":"Pokeinthe.io. Analysis of the Alexa Top 1M sites, June 2017 (2017). https:\/\/pokeinthe.io\/2017\/06\/13\/state-of-security-alexa-top-one-million-2017-06\/"},{"key":"9_CR17","unstructured":"Security Sauce. tls-scan (2017). https:\/\/github.com\/prbinu\/tls-scan"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Szalachowski, P., Matsumoto, S., Perrig, A.: Policert: secure and flexible TLS certificate management. In: Proceedings of the ACM Conference on Computer and Communications Security (CCS), pp. 406\u2013417, November 2014","DOI":"10.1145\/2660267.2660355"},{"key":"9_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"424","DOI":"10.1007\/978-3-319-70972-7_24","volume-title":"Financial Cryptography and Data Security","author":"P Szalachowski","year":"2017","unstructured":"Szalachowski, P., Perrig, A.: Short paper: on deployment of DNS-based security enhancements. In: Kiayias, A. (ed.) FC 2017. LNCS, vol. 10322, pp. 424\u2013433. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70972-7_24"},{"key":"9_CR20","unstructured":"US-CERT. SSL 3.0 Protocol Vulnerability and POODLE Attack (2014). https:\/\/www.us-cert.gov\/ncas\/alerts\/TA14-290A"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-01704-0_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,13]],"date-time":"2019-11-13T06:02:43Z","timestamp":1573624963000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-01704-0_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030017033","9783030017040"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-01704-0_9","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"SecureComm","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Communication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 August 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 August 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"securecomm2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/securecomm.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}