ABSTRACT
The deployment of DNS Security (DNSSEC) can only succeed if there is an effective mechanism for DNS public key validation. This paper compares three potential approaches to DNS key validation. A tree based approach utilizes the existing structure of the DNS tree to form highly structured key signing rules. This makes following chains of trust simple, but it allows no flexibility for individual zones and makes incremental deployment impossible. A pure web of trust based approach imposes no structure what so ever on the key signing process. This lack of structure provides a high degree of local control, but also makes it difficult to find trusted chains or specify security policies.
The third approach is a new proposal based on the concept of a fault-tolerant mesh of trust. The mesh approach utilizes some structured elements from the tree-based approach while maintaining the local flexibility found in the web of trust. Our analysis shows the hybrid mesh approach has the best chance of succeeding in the Internet.
TABLE OF CONTENT
TITLE PAGE
CERTIFICATION
APPROVAL
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENT
CHAPTER ONE
1.0 INTRODUCTION
1.1 STATEMENT OF PROBLEM
1.2 PURPOSE OF STUDY
1.3 AIMS AND OBJECTIVES
1.4 SCOPE/DELIMITATIONS
1.5 LIMITATIONS/CONSTRAINTS
1.6 DEFINITION OF TERMS
CHAPTER TWO
2.0 LITERATURE REVIEW
CHAPTER THREE
3.0 METHODS FOR FACT FINDING AND DETAILED DISCUSSIONS OF THE SYSTEM
3.1 METHODOLOGIES FOR FACT-FINDING
3.2 DISCUSSIONS
CHAPTER FOUR
4.0 FUTURES, IMPLICATIONS AND CHALLENGES OF THE SYSTEM
4.1 FUTURES
4.2 IMPLICATIONS
4.3 CHALLENGES
CHAPTER FIVE
5.0 RECOMMENDATIONS, SUMMARY AND CONCLUSION
5.1 RECOMMENDATION
5.2 SUMMARY
5.3 CONCLUSION
5.4 REFERENCES
Disclaimer: Note this academic material is intended as a guide for your academic research work. Do not copy word for word. Note: For Computer or Programming related works, some works might not contain source codes
CITE THIS WORK
(2014, 08). Public Key Validation For Dns Security Extensions.. ProjectStoc.com. Retrieved 08, 2014, from https://projectstoc.com/read/2783/public-key-validation-for-dns-security-extensions-6192
"Public Key Validation For Dns Security Extensions." ProjectStoc.com. 08 2014. 2014. 08 2014 <https://projectstoc.com/read/2783/public-key-validation-for-dns-security-extensions-6192>.
"Public Key Validation For Dns Security Extensions.." ProjectStoc.com. ProjectStoc.com, 08 2014. Web. 08 2014. <https://projectstoc.com/read/2783/public-key-validation-for-dns-security-extensions-6192>.
"Public Key Validation For Dns Security Extensions.." ProjectStoc.com. 08, 2014. Accessed 08, 2014. https://projectstoc.com/read/2783/public-key-validation-for-dns-security-extensions-6192.
- Related Works
- Design And Implementation Of A Computerized Procedure For Privatization Of A Corporate Enterprise (a Case Study Of Nitel Ltd Enugu)
- Design And Implementation Of A Computerized Bill Of Quantity System For Quantity Surveyors (a Case Study Of Okolo, Okolo & Co. Enugu)
- Micro Computer Based Robot
- Design And Implementation Of Data And Video Streaming System
- Design And Implementation Of Online Banking System (a Case Study Of All States Trust Bank Plc Enugu)
- Design And Implementation Of An Automated Diagnosis System For Patients
- Design And Implementation Of A Computer Software For The Solution Of Linear Equation
- Design And Implementation Of A Crime Management And Tracking Information System (a Case Study Of Fiib Headquarters Ogbor-hill Aba)
- Design And Implementation Of A Computerized Personnel Database For A Tertiary Institution (a Case Study Of Imt, Enugu)
- Survey Of Wireless Power Transfer Techniques In Charging Mobile Devices
