ABSTRACT
The deployment of DNS Security (DNSSEC) can only succeed if there is an effective mechanism for DNS public key validation. This paper compares three potential approaches to DNS key validation. A tree based approach utilizes the existing structure of the DNS tree to form highly structured key signing rules. This makes following chains of trust simple, but it allows no flexibility for individual zones and makes incremental deployment impossible. A pure web of trust based approach imposes no structure what so ever on the key signing process. This lack of structure provides a high degree of local control, but also makes it difficult to find trusted chains or specify security policies.
The third approach is a new proposal based on the concept of a fault-tolerant mesh of trust. The mesh approach utilizes some structured elements from the tree-based approach while maintaining the local flexibility found in the web of trust. Our analysis shows the hybrid mesh approach has the best chance of succeeding in the Internet.
TABLE OF CONTENT
TITLE PAGE
CERTIFICATION
APPROVAL
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENT
CHAPTER ONE
1.0 INTRODUCTION
1.1 STATEMENT OF PROBLEM
1.2 PURPOSE OF STUDY
1.3 AIMS AND OBJECTIVES
1.4 SCOPE/DELIMITATIONS
1.5 LIMITATIONS/CONSTRAINTS
1.6 DEFINITION OF TERMS
CHAPTER TWO
2.0 LITERATURE REVIEW
CHAPTER THREE
3.0 METHODS FOR FACT FINDING AND DETAILED DISCUSSIONS OF THE SYSTEM
3.1 METHODOLOGIES FOR FACT-FINDING
3.2 DISCUSSIONS
CHAPTER FOUR
4.0 FUTURES, IMPLICATIONS AND CHALLENGES OF THE SYSTEM
4.1 FUTURES
4.2 IMPLICATIONS
4.3 CHALLENGES
CHAPTER FIVE
5.0 RECOMMENDATIONS, SUMMARY AND CONCLUSION
5.1 RECOMMENDATION
5.2 SUMMARY
5.3 CONCLUSION
5.4 REFERENCES
Disclaimer: Note this academic material is intended as a guide for your academic research work. Do not copy word for word. Note: For Computer or Programming related works, some works might not contain source codes
CITE THIS WORK
(2014, 08). Public Key Validation For Dns Security Extensions.. ProjectStoc.com. Retrieved 08, 2014, from https://projectstoc.com/read/2783/public-key-validation-for-dns-security-extensions-6192
"Public Key Validation For Dns Security Extensions." ProjectStoc.com. 08 2014. 2014. 08 2014 <https://projectstoc.com/read/2783/public-key-validation-for-dns-security-extensions-6192>.
"Public Key Validation For Dns Security Extensions.." ProjectStoc.com. ProjectStoc.com, 08 2014. Web. 08 2014. <https://projectstoc.com/read/2783/public-key-validation-for-dns-security-extensions-6192>.
"Public Key Validation For Dns Security Extensions.." ProjectStoc.com. 08, 2014. Accessed 08, 2014. https://projectstoc.com/read/2783/public-key-validation-for-dns-security-extensions-6192.
- Related Works
- Time Synchronization System Using Java
- Ip Spoofing: A Network Threat
- Design And Implementation Of A Product Distribution Management System A Case Study Fo Nigeria Breweries Limited 9th Mile Corner Enugu
- Design And Implementation Of E-payment System For A Business Organisation
- Design And Implementation Of Computer Based Marketing Information System (a Case Study Of Guniess Nig. Plc)
- The Design And Implementation Of A Software For Automobile Insurance Scheme In Nigeria. A Case Study Of Motor Insurance Departmetn Of Universal Insurance Company Ltd Enugu.
- Design And Implementation Of Code Optimization: Implementation Of Scalar Optimization
- Location Aided Routing For Mobile Ad-hoc Networks (case Study Of Easy Link Cafee)
- An Evaluation Of Multimedia Systems
- Stack Ip: New Packet Marketing And Filtering Mechanics For Ddos And Ip Spoofing Defense
