{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:16Z","timestamp":1750220896279,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,9,24]],"date-time":"2019-09-24T00:00:00Z","timestamp":1569283200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Bundesministerium f\u00fcr Bildung und Forschung"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,9,24]]},"DOI":"10.1145\/3357150.3357401","type":"proceedings-article","created":{"date-parts":[[2019,10,7]],"date-time":"2019-10-07T12:21:06Z","timestamp":1570450866000},"page":"37-43","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["The Missing Piece"],"prefix":"10.1145","author":[{"given":"Pouyan Fotouhi","family":"Tehrani","sequence":"first","affiliation":[{"name":"Weizenbaum Institute \/ Fraunhofer FOKUS"}]},{"given":"Eric","family":"Osterweil","sequence":"additional","affiliation":[{"name":"George Mason University"}]},{"given":"Jochen H.","family":"Schiller","sequence":"additional","affiliation":[{"name":"Freie Universit\u00e4t Berlin"}]},{"given":"Thomas C.","family":"Schmidt","sequence":"additional","affiliation":[{"name":"HAW Hamburg"}]},{"given":"Matthias","family":"W\u00e4hlisch","sequence":"additional","affiliation":[{"name":"Freie Universit\u00e4t Berlin"}]}],"member":"320","published-online":{"date-parts":[[2019,9,24]]},"reference":[{"key":"e_1_3_2_1_2_1","volume-title":"NDNS: A DNS-Like Name Service for NDN. In 2017 26th International Conference on Computer Communication and Networks (ICCCN). IEEE, 1--9.","author":"Afanasyev Alexander","year":"2017","unstructured":"Alexander Afanasyev , Xiaoke Jiang , Yingdi Yu , Jiewen Tan , Yumin Xia , Allison Mankin , and Lixia Zhang . 2017 . NDNS: A DNS-Like Name Service for NDN. In 2017 26th International Conference on Computer Communication and Networks (ICCCN). IEEE, 1--9. Alexander Afanasyev, Xiaoke Jiang, Yingdi Yu, Jiewen Tan, Yumin Xia, Allison Mankin, and Lixia Zhang. 2017. NDNS: A DNS-Like Name Service for NDN. In 2017 26th International Conference on Computer Communication and Networks (ICCCN). IEEE, 1--9."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502679"},{"key":"e_1_3_2_1_4_1","unstructured":"Sharon Boeyen Stefan Santesson Tim Polk Russ Housley Stephen Farrell and Dave Cooper. 2008. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 5280.  Sharon Boeyen Stefan Santesson Tim Polk Russ Housley Stephen Farrell and Dave Cooper. 2008. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 5280."},{"volume-title":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. 941--956","author":"Chen Qi Alfred","key":"e_1_3_2_1_5_1","unstructured":"Qi Alfred Chen , Matthew Thomas , Eric Osterweil , Yulong Cao , Jie You , and Z. Morley Mao . 2017. Client-side Name Collision Vulnerability in the New gTLD Era: A Systematic Study . In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. 941--956 . Qi Alfred Chen, Matthew Thomas, Eric Osterweil, Yulong Cao, Jie You, and Z. Morley Mao. 2017. Client-side Name Collision Vulnerability in the New gTLD Era: A Systematic Study. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. 941--956."},{"key":"e_1_3_2_1_6_1","unstructured":"NDN Consortium. 2019. Named Data Networking: Motivation & Details. https:\/\/web.archive.org\/web\/20190408131300\/https:\/\/named-data.net\/project\/archoverview\/  NDN Consortium. 2019. Named Data Networking: Motivation & Details. https:\/\/web.archive.org\/web\/20190408131300\/https:\/\/named-data.net\/project\/archoverview\/"},{"key":"e_1_3_2_1_7_1","unstructured":"NDN Consortium. 2019. ndn-cxx: NDN C++ library with eXperimental eXtensions 0.6.5. https:\/\/web.archive.org\/web\/20190325105322\/http:\/\/named-data.net\/doc\/ndn-cxx\/0.6.5\/release-notes\/release-notes-0.6.5.html  NDN Consortium. 2019. ndn-cxx: NDN C++ library with eXperimental eXtensions 0.6.5. https:\/\/web.archive.org\/web\/20190325105322\/http:\/\/named-data.net\/doc\/ndn-cxx\/0.6.5\/release-notes\/release-notes-0.6.5.html"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2010.5466661"},{"key":"e_1_3_2_1_9_1","unstructured":"J. Day. 2007. Patterns in Network Architecture: A Return to Fundamentals. Pearson Education.  J. Day. 2007. Patterns in Network Architecture: A Return to Fundamentals. Pearson Education."},{"key":"e_1_3_2_1_10_1","volume-title":"CONET. In Proceedings of the ACM SIGCOMM workshop on Information-centric networking - ICN '11","author":"Detti Andrea","year":"2011","unstructured":"Andrea Detti , Nicola Blefari Melazzi , Stefano Salsano , and Matteo Pomposini . 2011 . CONET. In Proceedings of the ACM SIGCOMM workshop on Information-centric networking - ICN '11 . ACM Press, New York, New York, USA, 50--55. Andrea Detti, Nicola Blefari Melazzi, Stefano Salsano, and Matteo Pomposini. 2011. CONET. In Proceedings of the ACM SIGCOMM workshop on Information-centric networking - ICN '11. ACM Press, New York, New York, USA, 50--55."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2016.7562065"},{"key":"e_1_3_2_1_12_1","unstructured":"Robert Elz and Randy Bush. 1997. Clarifications to the DNS Specification. RFC 2181.  Robert Elz and Randy Bush. 1997. Clarifications to the DNS Specification. RFC 2181."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Stephen Farrell Dirk Kutscher Christian Dannewitz B\u00f6rje Ohlman Ari Ker\u00e4nen and Phillip Hallam-Baker. 2013. Naming Things with Hashes. RFC 6920.  Stephen Farrell Dirk Kutscher Christian Dannewitz B\u00f6rje Ohlman Ari Ker\u00e4nen and Phillip Hallam-Baker. 2013. Naming Things with Hashes. RFC 6920.","DOI":"10.17487\/rfc6920"},{"volume-title":"Measuring Update Performance and Consistency Anomalies in Managed DNS Services. In IEEE INFOCOM 2019 - IEEE Conference on Computer Communications. 2206--2214","author":"Gao Z.","key":"e_1_3_2_1_14_1","unstructured":"Z. Gao and A. Venkataramani . 2019 . Measuring Update Performance and Consistency Anomalies in Managed DNS Services. In IEEE INFOCOM 2019 - IEEE Conference on Computer Communications. 2206--2214 . Z. Gao and A. Venkataramani. 2019. Measuring Update Performance and Consistency Anomalies in Managed DNS Services. In IEEE INFOCOM 2019 - IEEE Conference on Computer Communications. 2206--2214."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018584.2018586"},{"key":"e_1_3_2_1_16_1","volume-title":"Mohamed Elhoucine Elhdhili, and Sihem Guemara El Fatmi","author":"Hamdane Balkis","year":"2017","unstructured":"Balkis Hamdane , Rihab Boussada , Mohamed Elhoucine Elhdhili, and Sihem Guemara El Fatmi . 2017 . Hierarchical Identity Based Cryptography for Security and Trust in Named Data Networking. In 2017 IEEE 26th International Conference on Enabling Technologies : Infrastructure for Collaborative Enterprises (WETICE). IEEE , 226--231. Balkis Hamdane, Rihab Boussada, Mohamed Elhoucine Elhdhili, and Sihem Guemara El Fatmi. 2017. Hierarchical Identity Based Cryptography for Security and Trust in Named Data Networking. In 2017 IEEE 26th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE). IEEE, 226--231."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Paul E. Hoffman Andrew Sullivan and Kazunori Fujiwara. 2019. DNS Terminology. RFC 8499.  Paul E. Hoffman Andrew Sullivan and Kazunori Fujiwara. 2019. DNS Terminology. RFC 8499.","DOI":"10.17487\/RFC8499"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282402"},{"key":"e_1_3_2_1_19_1","first-page":"139","article-title":"Domain Names, Globalization, and Internet Governance","volume":"6","author":"Leaffer Marshall","year":"1998","unstructured":"Marshall Leaffer . 1998 . Domain Names, Globalization, and Internet Governance . Indiana Journal of Global Legal Studies 6 , 1 (1998), 139 -- 165 . Marshall Leaffer. 1998. Domain Names, Globalization, and Internet Governance. Indiana Journal of Global Legal Studies 6, 1 (1998), 139--165.","journal-title":"Indiana Journal of Global Legal Studies"},{"key":"e_1_3_2_1_20_1","unstructured":"LG Ansbach. 1997. 2 O 99\/97 - Verletzung des Namensrechts durch Internet-Adresse - ansbach.de.  LG Ansbach. 1997. 2 O 99\/97 - Verletzung des Namensrechts durch Internet-Adresse - ansbach.de."},{"key":"e_1_3_2_1_21_1","unstructured":"LG K\u00f6ln. 1996. 3 O 507-96 - Verwendung von Domain-Namen - Pulheim.de.  LG K\u00f6ln. 1996. 3 O 507-96 - Verwendung von Domain-Namen - Pulheim.de."},{"key":"e_1_3_2_1_22_1","volume-title":"CCN-KRS. In Proceedings of the 1st international conference on Information-centric networking - INC '14","volume":"94304","author":"Mahadevan Priya","unstructured":"Priya Mahadevan , Ersin Uzun , Spencer Sevilla , and J. J. Garcia-Luna-Aceves . 2014 . CCN-KRS. In Proceedings of the 1st international conference on Information-centric networking - INC '14 , Vol. 94304 . ACM Press, New York, New York, USA, 97--106. Priya Mahadevan, Ersin Uzun, Spencer Sevilla, and J. J. Garcia-Luna-Aceves. 2014. CCN-KRS. In Proceedings of the 1st international conference on Information-centric networking - INC '14, Vol. 94304. ACM Press, New York, New York, USA, 97--106."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"D. L. Mills. 1981. Internet name domains. RFC 799.  D. L. Mills. 1981. Internet name domains. RFC 799.","DOI":"10.17487\/rfc0799"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"P. Mockapetris. 1983. Domain names: Concepts and facilities. RFC 882.  P. Mockapetris. 1983. Domain names: Concepts and facilities. RFC 882.","DOI":"10.17487\/rfc0882"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/52325.52338"},{"key":"e_1_3_2_1_26_1","volume-title":"Improvement of Technical Management of Internet Names and Addresses. Federal Register 63, 34 (20 02","author":"National Telecommunications and Information Administration. 1998.","year":"1998","unstructured":"National Telecommunications and Information Administration. 1998. Improvement of Technical Management of Internet Names and Addresses. Federal Register 63, 34 (20 02 1998 ), 8826--8833. National Telecommunications and Information Administration. 1998. Improvement of Technical Management of Internet Names and Addresses. Federal Register 63, 34 (20 02 1998), 8826--8833."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"J. Postel and J. Reynolds. 1984. Domain requirements. RFC 920.  J. Postel and J. Reynolds. 1984. Domain requirements. RFC 920.","DOI":"10.17487\/rfc0920"},{"key":"e_1_3_2_1_28_1","unstructured":"Scott Rose Matt Larson Dan Massey Rob Austein and Roy Arends. 2005. DNS Security Introduction and Requirements. RFC 4033.  Scott Rose Matt Larson Dan Massey Rob Austein and Roy Arends. 2005. DNS Security Introduction and Requirements. RFC 4033."},{"key":"e_1_3_2_1_29_1","unstructured":"Scott Rose Matt Larson Dan Massey Rob Austein and Roy Arends. 2005. Resource Records for the DNS Security Extensions. RFC 4034.  Scott Rose Matt Larson Dan Massey Rob Austein and Roy Arends. 2005. Resource Records for the DNS Security Extensions. RFC 4034."},{"volume-title":"Operating Systems - An Advanced Course","author":"Saltzer J. H.","key":"e_1_3_2_1_30_1","unstructured":"J. H. Saltzer . 1978. Naming and Binding of Objects . In Operating Systems - An Advanced Course . Springer , Berlin, Heidelberg , 99--208. J. H. Saltzer. 1978. Naming and Binding of Objects. In Operating Systems - An Advanced Course. Springer, Berlin, Heidelberg, 99--208."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39568-7_5"},{"key":"e_1_3_2_1_32_1","unstructured":"Melinda Shore Richard Barnes Shumon Huque and Willem Toorop. 2018. A DANE Record and DNSSEC Authentication Chain Extension for TLS. Internet-Draft draft-ietf-tls-dnssec-chain-extension-07. Internet Engineering Task Force. Work in Progress.  Melinda Shore Richard Barnes Shumon Huque and Willem Toorop. 2018. A DANE Record and DNSSEC Authentication Chain Extension for TLS. Internet-Draft draft-ietf-tls-dnssec-chain-extension-07. Internet Engineering Task Force. Work in Progress."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Z. Su. 1982. Distributed system for Internet name service. RFC 830.  Z. Su. 1982. Distributed system for Internet name service. RFC 830.","DOI":"10.17487\/rfc0830"},{"volume-title":"The Domain Naming Convention for Internet User Applications. RFC 819","author":"Su Z.","key":"e_1_3_2_1_34_1","unstructured":"Z. Su and J. Postel . 1982 . The Domain Naming Convention for Internet User Applications. RFC 819 . Z. Su and J. Postel. 1982. The Domain Naming Convention for Internet User Applications. RFC 819."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"H.C.A. van Tilborg and S. Jajodia. 2011. Encyclopedia of Cryptography and Security. Springer US.  H.C.A. van Tilborg and S. Jajodia. 2011. Encyclopedia of Cryptography and Security. Springer US.","DOI":"10.1007\/978-1-4419-5906-5"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656888"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"Samuel Weiler and Johan Ihren. 2006. Minimally Covering NSEC Records and DNSSEC On-line Signing. RFC 4470.  Samuel Weiler and Johan Ihren. 2006. Minimally Covering NSEC Records and DNSSEC On-line Signing. RFC 4470.","DOI":"10.17487\/rfc4470"},{"key":"e_1_3_2_1_38_1","unstructured":"Bastiaan Wissingh Christopher A. Wood Alex Afanasyev Lixia Zhang David R. Oran and Christian Tschudin. 2019. Information-Centric Networking (ICN): CCN and NDN Terminology. Internet-Draft draft-irtf-icnrg-terminology-04. Internet Engineering Task Force. Work in Progress.  Bastiaan Wissingh Christopher A. Wood Alex Afanasyev Lixia Zhang David R. Oran and Christian Tschudin. 2019. Information-Centric Networking (ICN): CCN and NDN Terminology. Internet-Draft draft-irtf-icnrg-terminology-04. Internet Engineering Task Force. Work in Progress."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1921233.1921248"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810156.2810170"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656887"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2011.6089053"},{"volume-title":"The Official PGP User's Guide","author":"Zimmermann Philip R.","key":"e_1_3_2_1_44_1","unstructured":"Philip R. Zimmermann . 1995. The Official PGP User's Guide . MIT Press , Cambridge, MA, USA . Philip R. Zimmermann. 1995. The Official PGP User's Guide. MIT Press, Cambridge, MA, USA."}],"event":{"name":"ICN '19: 6th ACM Conference on Information-Centric Networking","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Macao China","acronym":"ICN '19"},"container-title":["Proceedings of the 6th ACM Conference on Information-Centric Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3357150.3357401","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3357150.3357401","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:38Z","timestamp":1750203878000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3357150.3357401"}},"subtitle":["On Namespace Management in NDN and How DNSSEC Might Help"],"short-title":[],"issued":{"date-parts":[[2019,9,24]]},"references-count":42,"alternative-id":["10.1145\/3357150.3357401","10.1145\/3357150"],"URL":"https:\/\/doi.org\/10.1145\/3357150.3357401","relation":{},"subject":[],"published":{"date-parts":[[2019,9,24]]},"assertion":[{"value":"2019-09-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}