{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T02:51:29Z","timestamp":1769914289918,"version":"3.49.0"},"reference-count":48,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Commonwealth Cyber Initiative, an investment in the advancement of cyber R&D, innovation and workforce development"},{"DOI":"10.13039\/501100002347","name":"German Federal Ministry of Education and Research (BMBF) within the projects Deutsches Internet-Institut","doi-asserted-by":"publisher","award":["16DII111"],"award-info":[{"award-number":["16DII111"]}],"id":[{"id":"10.13039\/501100002347","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002347","name":"German Federal Ministry of Education and Research (BMBF) within the projects Deutsches Internet-Institut","doi-asserted-by":"publisher","award":["PRIMEnet"],"award-info":[{"award-number":["PRIMEnet"]}],"id":[{"id":"10.13039\/501100002347","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1109\/tnsm.2022.3195406","type":"journal-article","created":{"date-parts":[[2022,8,5]],"date-time":"2022-08-05T00:24:01Z","timestamp":1659659041000},"page":"5265-5283","source":"Crossref","is-referenced-by-count":7,"title":["From the Beginning: Key Transitions in the First 15 Years of DNSSEC"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1446-5602","authenticated-orcid":false,"given":"Eric","family":"Osterweil","sequence":"first","affiliation":[{"name":"Department of Computer Science, George Mason University, Fairfax, VA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3668-9335","authenticated-orcid":false,"given":"Pouyan","family":"Fotouhi Tehrani","sequence":"additional","affiliation":[{"name":"Weizenbaum Institute and Fraunhofer FOKUS, Berlin, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0956-7885","authenticated-orcid":false,"given":"Thomas C.","family":"Schmidt","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Hamburg University of Applied Sciences, Hamburg, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3825-2807","authenticated-orcid":false,"given":"Matthias","family":"Wahlisch","sequence":"additional","affiliation":[{"name":"Institute of Computer Science, Freie Universit&#x00E4;t Berlin, Berlin, Germany"}]}],"member":"263","reference":[{"key":"ref13","first-page":"1307","article-title":"A longitudinal, end-to-end view of the DNSSEC ecosystem","author":"chung","year":"2017","journal-title":"Proc 26th USENIX Security Symp"},{"key":"ref35","author":"hardaker","year":"2018","journal-title":"Security considerations for RFC5011 publishers"},{"key":"ref12","first-page":"573","article-title":"Measuring the practical impact of DNSSEC deployment","author":"lian","year":"2013","journal-title":"Proc 22nd USENIX Security Symp"},{"key":"ref34","author":"leiba","year":"2017","journal-title":"Ambiguity of uppercase vs lowercase in RFC 2119 key words"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3123878.3131987"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2009-0343"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2019.2916176"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30582-8_71"},{"key":"ref31","article-title":"Black ops 2008: It&#x2019;s the end of the cache as we know it","author":"kaminsky","year":"0"},{"key":"ref30","year":"2020","journal-title":"Cisco Umbrella 1 Million"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2011.11.005"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4641"},{"key":"ref10","first-page":"231","article-title":"Status of the DNSSEC deployment","author":"osterweil","year":"2008","journal-title":"Proc ACM IMC"},{"key":"ref32","year":"2008","journal-title":"Vulnerability Note VU#800113 Multiple DNS Implementations Vulnerable to Cache Poisoning"},{"key":"ref2","author":"kolkman","year":"2013","journal-title":"DNSSEC DANE and Diginotar APNIC 35 Conference"},{"key":"ref1","author":"langley","year":"2013","journal-title":"Enhancing digital certificate security"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2014.76"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3423638"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355570"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3487552.3487835"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3833"},{"key":"ref18","first-page":"18","article-title":"Using the domain name system for system break-ins","author":"bellovin","year":"1995","journal-title":"Proc 5th USENIX Security Symp"},{"key":"ref24","author":"osterweil","year":"2021","journal-title":"SecSpider"},{"key":"ref46","author":"deming","year":"1982","journal-title":"Out of the Crisis"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6781"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/JRPROC.1949.232969"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8901"},{"key":"ref48","year":"2020","journal-title":"Web PKI Ops (WPKOPS)"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.47"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1108\/00251740510597761"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4033"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467088"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2975591"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4035"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/T-AIEE.1928.5055024"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4034"},{"key":"ref43","author":"andress","year":"2014","journal-title":"The Basics of Information Security Understanding the Fundamentals of InfoSec in Theory and Practice"},{"key":"ref28","year":"2021","journal-title":"Alexa Top Sites"},{"key":"ref27","author":"kolkman","year":"2010","journal-title":"DNSSEC HOWTO A Tutorial in Disguise"},{"key":"ref29","year":"2021","journal-title":"Majestic million"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6480"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7583"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-57p1r2007"},{"key":"ref4","author":"trenaman","year":"2020","journal-title":"Lessons Learned on Improving RPKI"},{"key":"ref3","author":"prince","year":"2016","journal-title":"How the Consumer Product Safety Commission is (Inadvertently) Behind the Internet&#x2019;s Largest DDoS Attacks"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5011"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/52324.52338"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2019.8935025"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4275028\/10034788\/09845707.pdf?arnumber=9845707","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T23:12:41Z","timestamp":1676934761000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9845707\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12]]},"references-count":48,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2022.3195406","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"value":"1932-4537","type":"electronic"},{"value":"2373-7379","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12]]}}}