ABSTRACT
The deployment of DNS Security (DNSSEC) can only succeed if there is an effective mechanism for DNS public key validation. This paper compares three potential approaches to DNS key validation. A tree based approach utilizes the existing structure of the DNS tree to form highly structured key signing rules. This makes following chains of trust simple, but it allows no flexibility for individual zones and makes incremental deployment impossible. A pure web of trust based approach imposes no structure what so ever on the key signing process. This lack of structure provides a high degree of local control, but also makes it difficult to find trusted chains or specify security policies.
The third approach is a new proposal based on the concept of a fault-tolerant mesh of trust. The mesh approach utilizes some structured elements from the tree-based approach while maintaining the local flexibility found in the web of trust. Our analysis shows the hybrid mesh approach has the best chance of succeeding in the Internet.
TABLE OF CONTENT
TITLE PAGE
CERTIFICATION
APPROVAL
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENT
CHAPTER ONE
1.0 INTRODUCTION
1.1 STATEMENT OF PROBLEM
1.2 PURPOSE OF STUDY
1.3 AIMS AND OBJECTIVES
1.4 SCOPE/DELIMITATIONS
1.5 LIMITATIONS/CONSTRAINTS
1.6 DEFINITION OF TERMS
CHAPTER TWO
2.0 LITERATURE REVIEW
CHAPTER THREE
3.0 METHODS FOR FACT FINDING AND DETAILED DISCUSSIONS OF THE SYSTEM
3.1 METHODOLOGIES FOR FACT-FINDING
3.2 DISCUSSIONS
CHAPTER FOUR
4.0 FUTURES, IMPLICATIONS AND CHALLENGES OF THE SYSTEM
4.1 FUTURES
4.2 IMPLICATIONS
4.3 CHALLENGES
CHAPTER FIVE
5.0 RECOMMENDATIONS, SUMMARY AND CONCLUSION
5.1 RECOMMENDATION
5.2 SUMMARY
5.3 CONCLUSION
5.4 REFERENCES
Disclaimer: Note this academic material is intended as a guide for your academic research work. Do not copy word for word. Note: For Computer or Programming related works, some works might not contain source codes
CITE THIS WORK
(2014, 08). Public Key Validation For Dns Security Extensions.. ProjectStoc.com. Retrieved 08, 2014, from https://projectstoc.com/read/2783/public-key-validation-for-dns-security-extensions-6192
"Public Key Validation For Dns Security Extensions." ProjectStoc.com. 08 2014. 2014. 08 2014 <https://projectstoc.com/read/2783/public-key-validation-for-dns-security-extensions-6192>.
"Public Key Validation For Dns Security Extensions.." ProjectStoc.com. ProjectStoc.com, 08 2014. Web. 08 2014. <https://projectstoc.com/read/2783/public-key-validation-for-dns-security-extensions-6192>.
"Public Key Validation For Dns Security Extensions.." ProjectStoc.com. 08, 2014. Accessed 08, 2014. https://projectstoc.com/read/2783/public-key-validation-for-dns-security-extensions-6192.
- Related Works
- E-mail Server Using Threaded Sockets
- Prospects Of Cloud Computing In Nigeria
- Combating Data Input Errors In Programming
- Design And Implementation Of Computerized Banking Monitor Information System (a Case Study Of Central Bank Plc Enugu).
- Design And Implementation Of A Case Filling System For A Drug Monitoring Agency (a Case Study Of Ndlea Area Office Enugu)
- Design And Implementation Of A Web-based E-learning System For Continuing Education (case Study Of Rivers State Polytechnic, Bori)
- Design And Implementation Of E-sales Processing System
- Design And Implementation Of A Computerised Quality Control System For A Manufacturing Organisation (a Case Study Of S.e.d.i Enugu)
- Design And Implementation Of A Computerized Accounting System Of An Academics System (a Case Study Of Imt Enugu)
- Application Of Mobile Agent In Distributed Multimedia Database System