Recommendation for key management part 3: Application-specific key management guidance E Barker, W Burr, A Jones, T Polk, S Rose, M Smid, Q Dang NIST special publication 800, 57, 2009 | 1665* | 2009 |
DNS security introduction and requirements R Arends, R Austein, M Larson, D Massey, S Rose RFC 4033 (Proposed Standard), 2005 | 1460 | 2005 |
Zero trust architecture S Rose, O Borchert, S Mitchell, S Connelly National Institute of Standards and Technology, 2019 | 873* | 2019 |
Protocol modifications for the DNS security extensions M Larson, D Massey, S Rose, R Arends, R Austein | 753* | 2005 |
Resource records for the DNS security extensions M Larson, D Massey, S Rose, R Arends, R Austein Resource, 2005 | 664* | 2005 |
[Project Description] Implementing a Zero Trust Architecture A Kerman, O Borchert, S Rose, A Tan National Institute of Standards and Technology, 2020 | 70 | 2020 |
Secure domain name system (DNS) deployment guide R Chandramouli, S Rose NIST Special Publication 800, 81-2, 2006 | 55 | 2006 |
DNAME Redirection in the DNS S Rose, W Wijngaards | 54 | 2012 |
Challenges in securing the domain name system R Chandramouli, S Rose IEEE Security & Privacy 4 (1), 84-87, 2006 | 40 | 2006 |
DNS resource records for the identifier-locator network protocol (ILNP) RJ Atkinson, SN Bhatti, S Rose | 30 | 2012 |
Limiting the scope of the KEY Resource Record (RR) D Massey, S Rose | 30 | 2002 |
An autonomic failure-detection algorithm K Mills, S Rose, S Quirolgico, M Britton, C Tan ACM SIGSOFT Software Engineering Notes 29 (1), 79-83, 2004 | 29 | 2004 |
Evolution and challenges of DNS-Based CDNs Z Wang, J Huang, S Rose Digital Communications and Networks, 2017 | 24 | 2017 |
Self-adaptive leasing for jini K Bowers, K Mills, S Rose Pervasive Computing and Communications, 2003.(PerCom 2003). Proceedings of …, 2003 | 19 | 2003 |
Minimizing information leakage in the DNS S Rose, A Nakassis IEEE network 22 (2), 2008 | 15 | 2008 |
Information leakage through the domain name system S Rose, R Chandramouli, A Nakassis Conference For Homeland Security, 2009. CATCH'09. Cybersecurity Applications …, 2009 | 14 | 2009 |
An integrity verification scheme for DNS zone file based on security impact analysis R Chandramouli, S Rose Computer Security Applications Conference, 21st Annual, 10 pp.-321, 2005 | 13 | 2005 |
SECOND DRAFT NIST Special Publication 800-177 R Chandramouli, S Garfinkel, S Nightingale, S Rose | 12* | |
Open issues in secure DNS deployment R Chandramouli, S Rose IEEE Security & Privacy 7 (5), 2009 | 11 | 2009 |
Trustworthy Email R Chandramouli, SL Garfinkel, SJ Nightingale, SW Rose Special Publication (NIST SP)-800-177, 2016 | 9 | 2016 |