{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:38:38Z","timestamp":1750307918518,"version":"3.41.0"},"reference-count":12,"publisher":"Association for Computing Machinery (ACM)","issue":"6","license":[{"start":{"date-parts":[[2007,6,1]],"date-time":"2007-06-01T00:00:00Z","timestamp":1180656000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2007,6]]},"abstract":"<jats:p>DNSSEC is properly understood as a component in an ecology of security protocols and measures.<\/jats:p>","DOI":"10.1145\/1247001.1247004","type":"journal-article","created":{"date-parts":[[2007,6,6]],"date-time":"2007-06-06T14:37:11Z","timestamp":1181140631000},"page":"44-50","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["DNSSEC"],"prefix":"10.1145","volume":"50","author":[{"given":"Amy","family":"Friedlander","sequence":"first","affiliation":[{"name":"Shinkuro, Inc., Washington, D.C"}]},{"given":"Allison","family":"Mankin","sequence":"additional","affiliation":[{"name":"National Science Foundation, Arlington, VA"}]},{"given":"W. Douglas","family":"Maughan","sequence":"additional","affiliation":[{"name":"U.S. Department of Homeland Security, Science and Technology Directorate, Washington, D.C"}]},{"given":"Stephen D.","family":"Crocker","sequence":"additional","affiliation":[{"name":"DNSSEC Deployment Coordination Project, Shinkuro, Inc., Washington, D.C"}]}],"member":"320","published-online":{"date-parts":[[2007,6]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Oct. 10","author":"Arends R.","year":"2004","unstructured":"Arends , R. , Austein , R. , Larson , M. , Massey , D. , and Rose , S . DNS Security Introduction and Requirements. RFC 4035 , Oct. 10 , 2004 ; www.ietf.org\/rfc\/rfc4033.txt. Arends, R., Austein, R., Larson, M., Massey, D., and Rose, S. DNS Security Introduction and Requirements. RFC 4035, Oct. 10, 2004; www.ietf.org\/rfc\/rfc4033.txt."},{"key":"e_1_2_1_2_1","volume-title":"Oct. 10","author":"Arends R.","year":"2004","unstructured":"Arends , R. , Austein , R. , Larson , M. , Massey , D. , and Rose , S . Resource Records for the DNS Security Extensions. RFC 4034 , Oct. 10 , 2004 ; www.ietf.org\/rfc\/rfc4034.txt. Arends, R., Austein, R., Larson, M., Massey, D., and Rose, S. Resource Records for the DNS Security Extensions. RFC 4034, Oct. 10, 2004; www.ietf.org\/rfc\/rfc4034.txt."},{"key":"e_1_2_1_3_1","volume-title":"Oct. 10","author":"Arends R.","year":"2004","unstructured":"Arends , R. , Austein , R. , Larson , M. , Massey , D. , and Rose , S . Protocol Modifications for the DNS Security Extensions. RFC 4033 , Oct. 10 , 2004 ; www.ietf.org\/rfc\/rfc4035.txt. Arends, R., Austein, R., Larson, M., Massey, D., and Rose, S. Protocol Modifications for the DNS Security Extensions. RFC 4033, Oct. 10, 2004; www.ietf.org\/rfc\/rfc4035.txt."},{"key":"e_1_2_1_4_1","volume-title":"Threat Analysis of the Domain Name System. RFC","author":"Atkins D.","year":"2004","unstructured":"Atkins , D. and Austein , R . Threat Analysis of the Domain Name System. RFC 3833, Aug. 2004 ; www.ietf.org\/rfc\/rfc3833.txt. Atkins, D. and Austein, R. Threat Analysis of the Domain Name System. RFC 3833, Aug. 2004; www.ietf.org\/rfc\/rfc3833.txt."},{"key":"e_1_2_1_5_1","volume-title":"NIST","author":"Chandramouli R.","year":"2006","unstructured":"Chandramouli , R. and Rose , S . Secure Domain Name System Deployment Guide: Recommendations of the National Institute of Standards and Technology, Special Publication 800-81. U.S. Department of Commerce, Technology Administration , NIST , Gaithersburg, MD , May 2006 ; csrc.nist.gov\/publications\/nistpubs\/800-81\/SP800-81.pdf. Chandramouli, R. and Rose, S. Secure Domain Name System Deployment Guide: Recommendations of the National Institute of Standards and Technology, Special Publication 800-81. U.S. Department of Commerce, Technology Administration, NIST, Gaithersburg, MD, May 2006; csrc.nist.gov\/publications\/nistpubs\/800-81\/SP800-81.pdf."},{"key":"e_1_2_1_6_1","volume-title":"Year 3","author":"Cole J.","year":"2003","unstructured":"Cole , J. et al. The UCLA Internet Report: Surveying the Digital Future , Year 3 . UCLA Center for Communication Policy , Los Angeles , Feb. 2003 ; www.digitalcenter.org\/pdf\/InternetReportYearThree.pdf. Cole, J. et al. The UCLA Internet Report: Surveying the Digital Future, Year 3. UCLA Center for Communication Policy, Los Angeles, Feb. 2003; www.digitalcenter.org\/pdf\/InternetReportYearThree.pdf."},{"key":"e_1_2_1_7_1","volume-title":"Jan. 9","author":"Fox S.","year":"2005","unstructured":"Fox , S. , Quitney Anderson , J. , and Rainie , L . The Future of the Internet. Pew Internet & American Life Project , Jan. 9 , 2005 ; www.pewinternet.org\/pdfs\/PIP_Future_of_Internet.pdf. Fox, S., Quitney Anderson, J., and Rainie, L. The Future of the Internet. Pew Internet & American Life Project, Jan. 9, 2005; www.pewinternet.org\/pdfs\/PIP_Future_of_Internet.pdf."},{"key":"e_1_2_1_8_1","volume-title":"Version 2","author":"Haugsness K.","year":"2005","unstructured":"Haugsness , K. and the ISC Incident Handlers . DNS Cache Poisoning Detailed Analysis Report , Version 2 . Internet Storm Center , Mar. 2005 ; www.dshield.org\/presentations\/dnspoisoning.html. Haugsness, K. and the ISC Incident Handlers. DNS Cache Poisoning Detailed Analysis Report, Version 2. Internet Storm Center, Mar. 2005; www.dshield.org\/presentations\/dnspoisoning.html."},{"volume-title":"Transcript of DNSSec Mini Workshop, ICANN Meetings, Mar del Plata","author":"ICANN.","key":"e_1_2_1_9_1","unstructured":"ICANN. Transcript of DNSSec Mini Workshop, ICANN Meetings, Mar del Plata , Argentina , Apr. 5, 2005; www.icann.org\/ meetings\/mardelplata\/captioning-dnssec-05apr05.htm. ICANN. Transcript of DNSSec Mini Workshop, ICANN Meetings, Mar del Plata, Argentina, Apr. 5, 2005; www.icann.org\/ meetings\/mardelplata\/captioning-dnssec-05apr05.htm."},{"key":"e_1_2_1_10_1","volume-title":"Special Publication 800-53, Revision 1. U.S. Department of Commerce, Technology Administration","author":"Ross R.","year":"2006","unstructured":"Ross , R. , Katzke , S. , Johnson , A. , Swanson , M. , Stoneburner , G. , and Rogers , G . Information Security , Special Publication 800-53, Revision 1. U.S. Department of Commerce, Technology Administration , National Institute of Standards and Technology , Gaithersburg, MD , Dec. 2006 ; csrc.nist.gov\/publications\/nistpubs\/800-53-Rev1\/800-53-rev1-final-clean-sz.pdf; and the Federal Information Security Act Implementation Project: Protecting the National Critical Information Infrastructure. U.S. Department of Commerce, Technology Administration, National Institute of Standards and Technology, Gaithersburg, MD, May 8, 2006; csrc.nist.gov\/sec-cert\/. Ross, R., Katzke, S., Johnson, A., Swanson, M., Stoneburner, G., and Rogers, G. Information Security, Special Publication 800-53, Revision 1. U.S. Department of Commerce, Technology Administration, National Institute of Standards and Technology, Gaithersburg, MD, Dec. 2006; csrc.nist.gov\/publications\/nistpubs\/800-53-Rev1\/800-53-rev1-final-clean-sz.pdf; and the Federal Information Security Act Implementation Project: Protecting the National Critical Information Infrastructure. U.S. Department of Commerce, Technology Administration, National Institute of Standards and Technology, Gaithersburg, MD, May 8, 2006; csrc.nist.gov\/sec-cert\/."},{"key":"e_1_2_1_11_1","unstructured":"SecSpider Web site. DNSSEC Monitoring Project; secspider.cs.ucla.edu\/.  SecSpider Web site. DNSSEC Monitoring Project; secspider.cs.ucla.edu\/."},{"key":"e_1_2_1_12_1","volume-title":"Technology Administration","author":"Souppaya M.","year":"2005","unstructured":"Souppaya , M. , Wack , J. , Harris , A. , Johnson , P. , and Kent , K . Security Configuration Checklists Program for IT Products: Guidance for Checklist Users and Developers. Special Publication 800-70 (Draft). U.S. Department of Commerce , Technology Administration , National Institute of Standards and Technology , Gaithersburg, MD , May 2005 ; csrc.nist.gov\/checklists\/download_sp800-70.html. Souppaya, M., Wack, J., Harris, A., Johnson, P., and Kent, K. Security Configuration Checklists Program for IT Products: Guidance for Checklist Users and Developers. Special Publication 800-70 (Draft). U.S. Department of Commerce, Technology Administration, National Institute of Standards and Technology, Gaithersburg, MD, May 2005; csrc.nist.gov\/checklists\/download_sp800-70.html."}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1247001.1247004","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1247001.1247004","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:51:30Z","timestamp":1750258290000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1247001.1247004"}},"subtitle":["a protocol toward securing the internet infrastructure"],"short-title":[],"issued":{"date-parts":[[2007,6]]},"references-count":12,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2007,6]]}},"alternative-id":["10.1145\/1247001.1247004"],"URL":"https:\/\/doi.org\/10.1145\/1247001.1247004","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"type":"print","value":"0001-0782"},{"type":"electronic","value":"1557-7317"}],"subject":[],"published":{"date-parts":[[2007,6]]},"assertion":[{"value":"2007-06-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}