{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:45:16Z","timestamp":1772163916138,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":59,"publisher":"ACM","license":[{"start":{"date-parts":[[2004,8,30]],"date-time":"2004-08-30T00:00:00Z","timestamp":1093824000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,8,30]]},"DOI":"10.1145\/1015467.1015505","type":"proceedings-article","created":{"date-parts":[[2004,10,7]],"date-time":"2004-10-07T13:39:48Z","timestamp":1097156388000},"page":"343-352","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":134,"title":["A layered naming architecture for the internet"],"prefix":"10.1145","author":[{"given":"Hari","family":"Balakrishnan","sequence":"first","affiliation":[{"name":"MIT, Cambridge, MA"}]},{"given":"Karthik","family":"Lakshminarayanan","sequence":"additional","affiliation":[{"name":"UC Berkeley, Berkeley, CA"}]},{"given":"Sylvia","family":"Ratnasamy","sequence":"additional","affiliation":[{"name":"Intel Research, Berkeley, Berkeley, CA"}]},{"given":"Scott","family":"Shenker","sequence":"additional","affiliation":[{"name":"International Computer Science Institute (ICSI), Berkeley, CA"}]},{"given":"Ion","family":"Stoica","sequence":"additional","affiliation":[{"name":"UC Berkeley, Berkeley, CA"}]},{"given":"Michael","family":"Walfish","sequence":"additional","affiliation":[{"name":"MIT, Cambridge, MA"}]}],"member":"320","published-online":{"date-parts":[[2004,8,30]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"4th USENIX Symposium on Internet Technologies and Systems","author":"Andersen D. G.","year":"2003","unstructured":"D. G. Andersen . Mayday : Distributed filtering for Internet Services . In 4th USENIX Symposium on Internet Technologies and Systems , Seattle, WA , March 2003 .]] D. G. Andersen. Mayday: Distributed filtering for Internet Services. In 4th USENIX Symposium on Internet Technologies and Systems, Seattle, WA, March 2003.]]"},{"key":"e_1_3_2_1_2_1","volume-title":"2nd ACM Hotnets Workshop","author":"Anderson T.","year":"2003","unstructured":"T. Anderson , T. Roscoe , and D. Wetherall . Preventing Internet denial-of-service with capabilities . In 2nd ACM Hotnets Workshop , Cambridge, MA , Nov. 2003 .]] T. Anderson, T. Roscoe, and D. Wetherall. Preventing Internet denial-of-service with capabilities. In 2nd ACM Hotnets Workshop, Cambridge, MA, Nov. 2003.]]"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/606272.606299"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/4236.957891"},{"key":"e_1_3_2_1_5_1","volume-title":"1st ACM Hotnets Workshop","author":"Braden R.","year":"2002","unstructured":"R. Braden , T. Faber , and M. Handley . From protocol stack to protocol heap -- role-based architecture . In 1st ACM Hotnets Workshop , Princeton, NJ , Oct. 2002 .]] R. Braden, T. Faber, and M. Handley. From protocol stack to protocol heap -- role-based architecture. In 1st ACM Hotnets Workshop, Princeton, NJ, Oct. 2002.]]"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633051"},{"key":"e_1_3_2_1_7_1","volume-title":"RFC","author":"Castineyra I.","year":"1992","unstructured":"I. Castineyra , N. Chiappa , and M. Steenstrup . The Nimrod routing architecture, August 1996 . RFC 1992 .]] I. Castineyra, N. Chiappa, and M. Steenstrup. The Nimrod routing architecture, August 1996. RFC 1992.]]"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/944759.944770"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/944759.944761"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/99508.99553"},{"key":"e_1_3_2_1_11_1","volume-title":"June","author":"Daigle L.","year":"1999","unstructured":"L. Daigle , D. van Gulik , R. Iannella , and P. Faltstrom . URN namespace definition mechanisms , June 1999 . RFC 2611.]] L. Daigle, D. van Gulik, R. Iannella, and P. Faltstrom. URN namespace definition mechanisms, June 1999. RFC 2611.]]"},{"key":"e_1_3_2_1_12_1","volume-title":"Version 6 (IPv6)","author":"Deering S.","year":"1998","unstructured":"S. Deering and R. Hinden . Internet Protocol , Version 6 (IPv6) , Dec. 1998 . RFC 2460.]] S. Deering and R. Hinden. Internet Protocol, Version 6 (IPv6), Dec. 1998. RFC 2460.]]"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45172-3_25"},{"key":"e_1_3_2_1_14_1","volume-title":"2nd ACM Hotnets Workshop","author":"Ford B.","year":"2003","unstructured":"B. Ford . Unmanaged Internet Protocol: taming the edge network management crisis . In 2nd ACM Hotnets Workshop , Cambridge, MA , Nov. 2003 .]] B. Ford. Unmanaged Internet Protocol: taming the edge network management crisis. In 2nd ACM Hotnets Workshop, Cambridge, MA, Nov. 2003.]]"},{"key":"e_1_3_2_1_15_1","volume-title":"October","author":"Ford B.","year":"2003","unstructured":"B. Ford , P. Srisuresh , and D. Kegel . Peer-to-peer (P2P) communication across middleboxes , October 2003 . Internet draft draft-ford-midcom-p2p-01.txt (Work in progress).]] B. Ford, P. Srisuresh, and D. Kegel. Peer-to-peer (P2P) communication across middleboxes, October 2003. Internet draft draft-ford-midcom-p2p-01.txt (Work in progress).]]"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/65.224021"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383065"},{"key":"e_1_3_2_1_19_1","volume-title":"Feb.","author":"Gleeson B.","year":"2000","unstructured":"B. Gleeson , A. Lin , J. Heinanen , G. Armitage , and A. Malis . A framework for IP based virtual private networks , Feb. 2000 . RFC 2764.]] B. Gleeson, A. Lin, J. Heinanen, G. Armitage, and A. Malis. A framework for IP based virtual private networks, Feb. 2000. RFC 2764.]]"},{"key":"e_1_3_2_1_20_1","unstructured":"M. Gritter and D. R. Cheriton. TRIAD: A new next-generation Internet architecture. http:\/\/www-dsg.stanford.edu\/triad\/ July 2000.]]  M. Gritter and D. R. Cheriton. TRIAD: A new next-generation Internet architecture. http:\/\/www-dsg.stanford.edu\/triad\/ July 2000.]]"},{"key":"e_1_3_2_1_21_1","volume-title":"1st USENIX\/ACM Symposium on Networked Systems Design and Implementation (NSDI '04)","author":"Gupta A.","year":"2004","unstructured":"A. Gupta , B. Liskov , and R. Rodrigues . Efficient routing for peer-to-peer overlays . In 1st USENIX\/ACM Symposium on Networked Systems Design and Implementation (NSDI '04) , San Francisco, CA , March 2004 .]] A. Gupta, B. Liskov, and R. Rodrigues. Efficient routing for peer-to-peer overlays. In 1st USENIX\/ACM Symposium on Networked Systems Design and Implementation (NSDI '04), San Francisco, CA, March 2004.]]"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45172-3_15"},{"key":"e_1_3_2_1_23_1","unstructured":"International DOI Foundation. http:\/\/www.doi.org\/.]]  International DOI Foundation. http:\/\/www.doi.org\/.]]"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379239"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633032"},{"key":"e_1_3_2_1_26_1","volume-title":"September","author":"Lear E.","year":"2003","unstructured":"E. Lear and R. Droms . What's in a name: Thoughts from the NSRG , September 2003 . draft-irtf-nsrg-report-10, IETF draft (Work in Progress) .]] E. Lear and R. Droms. What's in a name: Thoughts from the NSRG, September 2003. draft-irtf-nsrg-report-10, IETF draft (Work in Progress).]]"},{"key":"e_1_3_2_1_27_1","volume-title":"IETF","author":"Lynn C.","year":"1995","unstructured":"C. Lynn . Endpoint Identifier Destination Option. Internet Draft , IETF , Nov. 1995 . (expired).]] C. Lynn. Endpoint Identifier Destination Option. Internet Draft, IETF, Nov. 1995. (expired).]]"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/319151.319160"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30183-7_16"},{"key":"e_1_3_2_1_30_1","volume-title":"November","author":"Mockapetris P.","year":"1987","unstructured":"P. Mockapetris . Domain Names -- Implementation and Specification , November 1987 . RFC 1035.]] P. Mockapetris. Domain Names -- Implementation and Specification, November 1987. RFC 1035.]]"},{"key":"e_1_3_2_1_31_1","volume-title":"http:\/\/www.cs.utk.edu\/~moore\/opinions\/what-nats-break.html, as of","author":"Moore K.","year":"2004","unstructured":"K. Moore . Things that NATs break. http:\/\/www.cs.utk.edu\/~moore\/opinions\/what-nats-break.html, as of June 2004 .]] K. Moore. Things that NATs break. http:\/\/www.cs.utk.edu\/~moore\/opinions\/what-nats-break.html, as of June 2004.]]"},{"key":"e_1_3_2_1_32_1","volume-title":"September","author":"Moskowitz R.","year":"2003","unstructured":"R. Moskowitz and P. Nikander . Host identity protocol architecture , September 2003 . draft-moskowitz-hip-arch-05, IETF draft (Work in Progress) .]] R. Moskowitz and P. Nikander. Host identity protocol architecture, September 2003. draft-moskowitz-hip-arch-05, IETF draft (Work in Progress).]]"},{"key":"e_1_3_2_1_33_1","volume-title":"October","author":"Moskowitz R.","year":"2003","unstructured":"R. Moskowitz , P. Nikander , P. Jokela , and T. Henderson . Host identity protocol , October 2003 . draft-moskowitz-hip-08, IETF draft (Work in Progress) .]] R. Moskowitz, P. Nikander, P. Jokela, and T. Henderson. Host identity protocol, October 2003. draft-moskowitz-hip-08, IETF draft (Work in Progress).]]"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.391750"},{"key":"e_1_3_2_1_35_1","first-page":"87","volume-title":"Network and Distributed Systems Security Symposium (NDSS '03)","author":"Nikander P.","year":"2003","unstructured":"P. Nikander , J. Ylitalo , and J. Wall . Integrating security, mobility, and multi-homing in a HIP way . In Network and Distributed Systems Security Symposium (NDSS '03) , pages 87 -- 99 , San Diego, CA , February 2003 .]] P. Nikander, J. Ylitalo, and J. Wall. Integrating security, mobility, and multi-homing in a HIP way. In Network and Distributed Systems Security Symposium (NDSS '03), pages 87--99, San Diego, CA, February 2003.]]"},{"key":"e_1_3_2_1_36_1","volume-title":"Sep.","author":"O'Donnell M.","year":"2002","unstructured":"M. O'Donnell . Open network handles implemented in DNS , Sep. 2002 . Internet Draft , draft-odonnell-onhs-imp-dns-00.txt.]] M. O'Donnell. Open network handles implemented in DNS, Sep. 2002. Internet Draft, draft-odonnell-onhs-imp-dns-00.txt.]]"},{"key":"e_1_3_2_1_37_1","unstructured":"M. O'Donnell. A proposal to separate Internet handles from names. http:\/\/people.cs.uchicago.edu\/~odonnell\/Citizen\/Network_Identifiers\/ February 2003. submitted for publication.]]  M. O'Donnell. A proposal to separate Internet handles from names. http:\/\/people.cs.uchicago.edu\/~odonnell\/Citizen\/Network_Identifiers\/ February 2003. submitted for publication.]]"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/128899.128901"},{"key":"e_1_3_2_1_39_1","volume-title":"1st USENIX\/ACM Symposium on Networked Systems Design and Implementation (NSDI '04)","author":"Ramasubramanian V.","year":"2004","unstructured":"V. Ramasubramanian and E. G. Sirer . Beehive: O(1) lookup performance for power-law query distributions in peer-to-peer overlays . In 1st USENIX\/ACM Symposium on Networked Systems Design and Implementation (NSDI '04) , San Francisco, CA , March 2004 .]] V. Ramasubramanian and E. G. Sirer. Beehive: O(1) lookup performance for power-law query distributions in peer-to-peer overlays. In 1st USENIX\/ACM Symposium on Networked Systems Design and Implementation (NSDI '04), San Francisco, CA, March 2004.]]"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383072"},{"key":"e_1_3_2_1_41_1","volume-title":"1st ACM Hotnets Workshop","author":"Roscoe T.","year":"2002","unstructured":"T. Roscoe , S. Hand , R. Isaacs , R. Mortier , and P. Jardetzky . Predicate routing: Enabling controlled networking . In 1st ACM Hotnets Workshop , Princeton, NJ , Oct. 2002 .]] T. Roscoe, S. Hand, R. Isaacs, R. Mortier, and P. Jardetzky. Predicate routing: Enabling controlled networking. In 1st ACM Hotnets Workshop, Princeton, NJ, Oct. 2002.]]"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.5555\/646591.697650"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502053"},{"key":"e_1_3_2_1_44_1","first-page":"311","volume-title":"P. Ravasio et al.","author":"Saltzer J.","year":"1982","unstructured":"J. Saltzer . On the naming and binding of network destinations . In P. Ravasio et al. , editor, Local Computer Networks, pages 311 -- 317 . North-Holland Publishing Company , Amsterdam, 1982 . Reprinted as RFC 1498, Aug 1993.]] J. Saltzer. On the naming and binding of network destinations. In P. Ravasio et al., editor, Local Computer Networks, pages 311--317. North-Holland Publishing Company, Amsterdam, 1982. Reprinted as RFC 1498, Aug 1993.]]"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/332799.332893"},{"key":"e_1_3_2_1_46_1","first-page":"72","volume-title":"17th IEEE Computer Society Conference (COMPCON '78)","author":"Shoch J. F.","year":"1978","unstructured":"J. F. Shoch . Inter-network naming, addressing, and routing . In 17th IEEE Computer Society Conference (COMPCON '78) , pages 72 -- 79 , Washington, DC , September 1978 .]] J. F. Shoch. Inter-network naming, addressing, and routing. In 17th IEEE Computer Society Conference (COMPCON '78), pages 72--79, Washington, DC, September 1978.]]"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345938"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.5555\/874075.876395"},{"key":"e_1_3_2_1_50_1","volume-title":"January","author":"Sollins K.","year":"1998","unstructured":"K. Sollins . Architectural principles of uniform resource name resolution , January 1998 . RFC 2276.]] K. Sollins. Architectural principles of uniform resource name resolution, January 1998. RFC 2276.]]"},{"key":"e_1_3_2_1_51_1","volume-title":"December","author":"Sollins K.","year":"1994","unstructured":"K. Sollins and L. Masinter . Functional requirements for Uniform Resource Names , December 1994 . RFC 1737.]] K. Sollins and L. Masinter. Functional requirements for Uniform Resource Names, December 1994. RFC 1737.]]"},{"key":"e_1_3_2_1_52_1","volume-title":"January","author":"Srisuresh P.","year":"2001","unstructured":"P. Srisuresh and K. Egevang . Traditional IP network address translator (Traditional NAT) , January 2001 . RFC 3022.]] P. Srisuresh and K. Egevang. Traditional IP network address translator (Traditional NAT), January 2001. RFC 3022.]]"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633033"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2002.808407"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/35.568214"},{"key":"e_1_3_2_1_56_1","volume-title":"Network Pointers. In 1st ACM Hotnets Workshop","author":"Tschudin C.","year":"2002","unstructured":"C. Tschudin and R. Gold . Network Pointers. In 1st ACM Hotnets Workshop , Princeton, NJ , October 2002 .]] C. Tschudin and R. Gold. Network Pointers. In 1st ACM Hotnets Workshop, Princeton, NJ, October 2002.]]"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30183-7_8"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/35.649334"},{"key":"e_1_3_2_1_59_1","volume-title":"1st USENIX\/ACM Symposium on Networked Systems Design and Implementation (NSDI '04)","author":"Walfish M.","year":"2004","unstructured":"M. Walfish , H. Balakrishnan , and S. Shenker . Untangling the Web from DNS . In 1st USENIX\/ACM Symposium on Networked Systems Design and Implementation (NSDI '04) , San Francisco, CA , March 2004 .]] M. Walfish, H. Balakrishnan, and S. Shenker. Untangling the Web from DNS. In 1st USENIX\/ACM Symposium on Networked Systems Design and Implementation (NSDI '04), San Francisco, CA, March 2004.]]"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2003.818784"},{"key":"e_1_3_2_1_62_1","volume-title":"Workshop on Reliable Peer-to-Peer Distributed Systems, 21st IEEE Symposium on Reliable Distributed Systems (SRDS '02)","author":"Zhou L.","year":"2002","unstructured":"L. Zhou , R. van Renesse , and M. Marsh . Implementing IPv6 as a peer-to-peer overlay network . In Workshop on Reliable Peer-to-Peer Distributed Systems, 21st IEEE Symposium on Reliable Distributed Systems (SRDS '02) , Suita, Japan , Oct. 2002 .]] L. Zhou, R. van Renesse, and M. Marsh. Implementing IPv6 as a peer-to-peer overlay network. In Workshop on Reliable Peer-to-Peer Distributed Systems, 21st IEEE Symposium on Reliable Distributed Systems (SRDS '02), Suita, Japan, Oct. 2002.]]"}],"event":{"name":"SIGCOMM04: ACM SIGCOMM 2004 Conference","location":"Portland Oregon USA","acronym":"SIGCOMM04","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1015467.1015505","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1015467.1015505","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:23:45Z","timestamp":1750253025000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1015467.1015505"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,8,30]]},"references-count":59,"alternative-id":["10.1145\/1015467.1015505","10.1145\/1015467"],"URL":"https:\/\/doi.org\/10.1145\/1015467.1015505","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1030194.1015505","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2004,8,30]]},"assertion":[{"value":"2004-08-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}