ABSTRACT
The deployment of DNS Security (DNSSEC) can only succeed if there is an effective mechanism for DNS public key validation. This paper compares three potential approaches to DNS key validation. A tree based approach utilizes the existing structure of the DNS tree to form highly structured key signing rules. This makes following chains of trust simple, but it allows no flexibility for individual zones and makes incremental deployment impossible. A pure web of trust based approach imposes no structure what so ever on the key signing process. This lack of structure provides a high degree of local control, but also makes it difficult to find trusted chains or specify security policies.
The third approach is a new proposal based on the concept of a fault-tolerant mesh of trust. The mesh approach utilizes some structured elements from the tree-based approach while maintaining the local flexibility found in the web of trust. Our analysis shows the hybrid mesh approach has the best chance of succeeding in the Internet.
TABLE OF CONTENT
TITLE PAGE
CERTIFICATION
APPROVAL
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENT
CHAPTER ONE
1.0 INTRODUCTION
1.1 STATEMENT OF PROBLEM
1.2 PURPOSE OF STUDY
1.3 AIMS AND OBJECTIVES
1.4 SCOPE/DELIMITATIONS
1.5 LIMITATIONS/CONSTRAINTS
1.6 DEFINITION OF TERMS
CHAPTER TWO
2.0 LITERATURE REVIEW
CHAPTER THREE
3.0 METHODS FOR FACT FINDING AND DETAILED DISCUSSIONS OF THE SYSTEM
3.1 METHODOLOGIES FOR FACT-FINDING
3.2 DISCUSSIONS
CHAPTER FOUR
4.0 FUTURES, IMPLICATIONS AND CHALLENGES OF THE SYSTEM
4.1 FUTURES
4.2 IMPLICATIONS
4.3 CHALLENGES
CHAPTER FIVE
5.0 RECOMMENDATIONS, SUMMARY AND CONCLUSION
5.1 RECOMMENDATION
5.2 SUMMARY
5.3 CONCLUSION
5.4 REFERENCES
Disclaimer: Note this academic material is intended as a guide for your academic research work. Do not copy word for word. Note: For Computer or Programming related works, some works might not contain source codes
CITE THIS WORK
(2014, 08). Public Key Validation For Dns Security Extensions.. ProjectStoc.com. Retrieved 08, 2014, from https://projectstoc.com/read/2783/public-key-validation-for-dns-security-extensions-6192
"Public Key Validation For Dns Security Extensions." ProjectStoc.com. 08 2014. 2014. 08 2014 <https://projectstoc.com/read/2783/public-key-validation-for-dns-security-extensions-6192>.
"Public Key Validation For Dns Security Extensions.." ProjectStoc.com. ProjectStoc.com, 08 2014. Web. 08 2014. <https://projectstoc.com/read/2783/public-key-validation-for-dns-security-extensions-6192>.
"Public Key Validation For Dns Security Extensions.." ProjectStoc.com. 08, 2014. Accessed 08, 2014. https://projectstoc.com/read/2783/public-key-validation-for-dns-security-extensions-6192.
- Related Works
- Image Stream Transfer Using Real Time Transmission Protocol
- Design And Implementation Of A Computerized Hotel Business Billing System. (a Case Study Of Modotel Hotel Limited Enugu)
- Design And Implementation Of Online Student Registration System (case Study Of Imt Enugu)
- Design And Implementation Of A Computerised Traffic Offence Documentation System. (case Study Of Federal Road Safety Commissioner, Enugu)
- Automated Database System For Government Establishment (a Case Study Of Phcn)
- Design And Implementation Of Virtual Classroom
- Retrieving Files Using Content Based Search
- Design And Implementation Of Patient Care System
- Optimal Cryptographic Techniques
- Design And Implementation Of A Computerized Personnel Auditing System Of A Local Government Administeration