Seguir
Scott Rose
Scott Rose
E-mail confirmado em nist.gov - Página inicial
Título
Citado por
Citado por
Ano
Recommendation for key management part 3: Application-specific key management guidance
E Barker, W Burr, A Jones, T Polk, S Rose, M Smid, Q Dang
NIST special publication 800, 57, 2009
1665*2009
DNS security introduction and requirements
R Arends, R Austein, M Larson, D Massey, S Rose
RFC 4033 (Proposed Standard), 2005
14602005
Zero trust architecture
S Rose, O Borchert, S Mitchell, S Connelly
National Institute of Standards and Technology, 2019
873*2019
Protocol modifications for the DNS security extensions
M Larson, D Massey, S Rose, R Arends, R Austein
753*2005
Resource records for the DNS security extensions
M Larson, D Massey, S Rose, R Arends, R Austein
Resource, 2005
664*2005
[Project Description] Implementing a Zero Trust Architecture
A Kerman, O Borchert, S Rose, A Tan
National Institute of Standards and Technology, 2020
702020
Secure domain name system (DNS) deployment guide
R Chandramouli, S Rose
NIST Special Publication 800, 81-2, 2006
552006
DNAME Redirection in the DNS
S Rose, W Wijngaards
542012
Challenges in securing the domain name system
R Chandramouli, S Rose
IEEE Security & Privacy 4 (1), 84-87, 2006
402006
DNS resource records for the identifier-locator network protocol (ILNP)
RJ Atkinson, SN Bhatti, S Rose
302012
Limiting the scope of the KEY Resource Record (RR)
D Massey, S Rose
302002
An autonomic failure-detection algorithm
K Mills, S Rose, S Quirolgico, M Britton, C Tan
ACM SIGSOFT Software Engineering Notes 29 (1), 79-83, 2004
292004
Evolution and challenges of DNS-Based CDNs
Z Wang, J Huang, S Rose
Digital Communications and Networks, 2017
242017
Self-adaptive leasing for jini
K Bowers, K Mills, S Rose
Pervasive Computing and Communications, 2003.(PerCom 2003). Proceedings of …, 2003
192003
Minimizing information leakage in the DNS
S Rose, A Nakassis
IEEE network 22 (2), 2008
152008
Information leakage through the domain name system
S Rose, R Chandramouli, A Nakassis
Conference For Homeland Security, 2009. CATCH'09. Cybersecurity Applications …, 2009
142009
An integrity verification scheme for DNS zone file based on security impact analysis
R Chandramouli, S Rose
Computer Security Applications Conference, 21st Annual, 10 pp.-321, 2005
132005
SECOND DRAFT NIST Special Publication 800-177
R Chandramouli, S Garfinkel, S Nightingale, S Rose
12*
Open issues in secure DNS deployment
R Chandramouli, S Rose
IEEE Security & Privacy 7 (5), 2009
112009
Trustworthy Email
R Chandramouli, SL Garfinkel, SJ Nightingale, SW Rose
Special Publication (NIST SP)-800-177, 2016
92016
O sistema não pode executar a operação agora. Tente novamente mais tarde.
Artigos 1–20