{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:58:11Z","timestamp":1725559091232},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540253389"},{"type":"electronic","value":"9783540319573"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-31957-3_95","type":"book-chapter","created":{"date-parts":[[2010,7,7]],"date-time":"2010-07-07T21:26:19Z","timestamp":1278537979000},"page":"844-851","source":"Crossref","is-referenced-by-count":0,"title":["GDS Resource Record: Generalization ofthe Delegation Signer Model"],"prefix":"10.1007","author":[{"given":"Gilles","family":"Guette","sequence":"first","affiliation":[]},{"given":"Bernard","family":"Cousin","sequence":"additional","affiliation":[]},{"given":"David","family":"Fort","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"95_CR1","doi-asserted-by":"crossref","unstructured":"Mockapetris, P.: Domain Names - Concept and Facilities. RFC 1034 (1987)","DOI":"10.17487\/rfc1034"},{"key":"95_CR2","doi-asserted-by":"crossref","unstructured":"Mockapetris, P.: Domain Names - Implementation and Specification. RFC 1035 (1987)","DOI":"10.17487\/rfc1035"},{"key":"95_CR3","volume-title":"DNS and BIND","author":"P. Albitz","year":"2002","unstructured":"Albitz, P., Liu, C.: DNS and BIND, 4th edn. O\u2019Reilly & Associates, Inc, Sebastopol (2002)","edition":"4"},{"key":"95_CR4","unstructured":"Bellovin, S.M.: Using the Domain Name System for System Break-Ins. In: Proceedings of the fifth Usenix UNIX Security Symposium, Salt Lake City, UT, pp. 199\u2013208 (1995)"},{"key":"95_CR5","unstructured":"Schuba, C.L.: Addressing Weaknesses in the Domain Name System. Master\u2019s Thesis, Purdue University, Department of Computer Sciences (1993)"},{"key":"95_CR6","doi-asserted-by":"crossref","unstructured":"Atkins, D., Austein, R.: Threat Analysis Of The Domain Name System. RFC 3833 (2004)","DOI":"10.17487\/rfc3833"},{"key":"95_CR7","doi-asserted-by":"crossref","unstructured":"Eastlake, D.: Domain Name System Security Extensions. RFC 2535 (1999)","DOI":"10.17487\/rfc2535"},{"key":"95_CR8","doi-asserted-by":"crossref","unstructured":"Arends, R., Larson, M., Massey, D., Rose, S.: DNS Security Introduction and Requirements. Draft IETF, work in progress (2004)","DOI":"10.17487\/rfc4033"},{"key":"95_CR9","doi-asserted-by":"crossref","unstructured":"Arends, R., Austein, R., Larson, M., Massey, D., Rose, S.: Protocol Modifications for the DNS Security Extensions. Draft IETF, work in progress (2004)","DOI":"10.17487\/rfc4035"},{"key":"95_CR10","doi-asserted-by":"crossref","unstructured":"Arends, R., Austein, R., Larson, M., Massey, D., Rose, S.: Resource Records for the DNS Security Extensions. Draft IETF, work in progress (2004)","DOI":"10.17487\/rfc4034"},{"key":"95_CR11","unstructured":"Gieben, R.: Chain of Trust. Master\u2019s Thesis, NLnet Labs (2001)"},{"key":"95_CR12","doi-asserted-by":"crossref","unstructured":"Kolkman, O., Schlyter, J., Lewis, E.: Domain Name System KEY (DNSKEY) Resource Record (RR) Secure Entry Point (Flag. In: RFC 3757 (2004)","DOI":"10.17487\/rfc3757"},{"key":"95_CR13","doi-asserted-by":"crossref","unstructured":"Gundmundsson, O.: Delegation Signer Resource Record. RFC 3658 (2003)","DOI":"10.17487\/rfc3658"},{"key":"95_CR14","unstructured":"Guette, G., Courtay, O.: KRO: A Key RollOver Algorithm for DNSSEC. In: International Conference on Information and Communication, ICICT 2003 (2003)"},{"key":"95_CR15","unstructured":"IDsA: Infrastructure DNSSEC et ses Applications (2004), http:\/\/www.idsa.prd.fr"},{"key":"95_CR16","unstructured":"ISC: Berkeley Internet Naming Daemon (2004), http:\/\/www.isc.org"}],"container-title":["Lecture Notes in Computer Science","Networking - ICN 2005"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-31957-3_95.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:31:42Z","timestamp":1605760302000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-31957-3_95"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540253389","9783540319573"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-31957-3_95","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}