ABSTRACT
The deployment of DNS Security (DNSSEC) can only succeed if there is an effective mechanism for DNS public key validation. This paper compares three potential approaches to DNS key validation. A tree based approach utilizes the existing structure of the DNS tree to form highly structured key signing rules. This makes following chains of trust simple, but it allows no flexibility for individual zones and makes incremental deployment impossible. A pure web of trust based approach imposes no structure what so ever on the key signing process. This lack of structure provides a high degree of local control, but also makes it difficult to find trusted chains or specify security policies.
The third approach is a new proposal based on the concept of a fault-tolerant mesh of trust. The mesh approach utilizes some structured elements from the tree-based approach while maintaining the local flexibility found in the web of trust. Our analysis shows the hybrid mesh approach has the best chance of succeeding in the Internet.
TABLE OF CONTENT
TITLE PAGE
CERTIFICATION
APPROVAL
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENT
CHAPTER ONE
1.0 INTRODUCTION
1.1 STATEMENT OF PROBLEM
1.2 PURPOSE OF STUDY
1.3 AIMS AND OBJECTIVES
1.4 SCOPE/DELIMITATIONS
1.5 LIMITATIONS/CONSTRAINTS
1.6 DEFINITION OF TERMS
CHAPTER TWO
2.0 LITERATURE REVIEW
CHAPTER THREE
3.0 METHODS FOR FACT FINDING AND DETAILED DISCUSSIONS OF THE SYSTEM
3.1 METHODOLOGIES FOR FACT-FINDING
3.2 DISCUSSIONS
CHAPTER FOUR
4.0 FUTURES, IMPLICATIONS AND CHALLENGES OF THE SYSTEM
4.1 FUTURES
4.2 IMPLICATIONS
4.3 CHALLENGES
CHAPTER FIVE
5.0 RECOMMENDATIONS, SUMMARY AND CONCLUSION
5.1 RECOMMENDATION
5.2 SUMMARY
5.3 CONCLUSION
5.4 REFERENCES
Disclaimer: Note this academic material is intended as a guide for your academic research work. Do not copy word for word. Note: For Computer or Programming related works, some works might not contain source codes
CITE THIS WORK
(2014, 08). Public Key Validation For Dns Security Extensions.. ProjectStoc.com. Retrieved 08, 2014, from https://projectstoc.com/read/2783/public-key-validation-for-dns-security-extensions-6192
"Public Key Validation For Dns Security Extensions." ProjectStoc.com. 08 2014. 2014. 08 2014 <https://projectstoc.com/read/2783/public-key-validation-for-dns-security-extensions-6192>.
"Public Key Validation For Dns Security Extensions.." ProjectStoc.com. ProjectStoc.com, 08 2014. Web. 08 2014. <https://projectstoc.com/read/2783/public-key-validation-for-dns-security-extensions-6192>.
"Public Key Validation For Dns Security Extensions.." ProjectStoc.com. 08, 2014. Accessed 08, 2014. https://projectstoc.com/read/2783/public-key-validation-for-dns-security-extensions-6192.
- Related Works
- Design And Implementation Of Network-based Security Information System
- Design And Implementation Of Computer Based Marketing Information System (a Case Study Of Guniess Nig. Plc)
- Design And Implementation Of Online Voting System In Sug Elections
- Design And Implemention Of A Computerized Hotel Front Office Management System A Case Study Of Hotel Presidental Enugu.
- Design And Implementation Of A Computerized Database Updating System For A Transaction –drive/operation A Case Study Of Nigerian Stock Exchange (nse) Lagos
- Design And Implementation Of A Computerised Bill Of Material Processing System (a Case Study Of Anammco, Enugu)
- Distributed Metadata Management For Large Cluster-based Storage Systems
- Design And Implementation Of A Computerised Traffic Offence Documentation System. (case Study Of Federal Road Safety Commissioner, Enugu)
- Novel Information Security Framework For Automated Teller Machine Atm
- Design And Implementation Of A Computerised Market Survey Reporting System