This paper describes a method of public key verification based on DNS, that can be used to further increase security of package managers. On top of this method, an extended version is proposed, that can also protect repository metadata. An implementation for the RPM ecosystem is proposed corresponding to the theoretical background
Today's world without the DNS protocol would not be as we know it. DNS protocol enables us the use o...
The global public-key authentication infrastructure standardized in the Domain Name System Security ...
Management of the Domain Name System (DNS) root zone file is a uniquely global policy problem. For t...
This paper describes a method of public key verification based on DNS, that can be used to further i...
Generation and maintenance of security poli-cies is too complex and needs simplification for it to b...
A major problem for a distributed security system is the management of cryptographic keys. Public ke...
Tato diplomová práce se zabývá problémem bezpečné distribuce software. Je navrženo zlepšení s pomocí...
Package management systems play an essential role in pursuing systems dependability by ensuring that...
The domain name system (DNS) is the naming system on the Internet. With the DNS security extensions ...
International audienceThe Domain Name System Security Extensions (DNSSEC) architecture is based on p...
Domain Name System (DNS) plays a massive role in today’s technological era. While initially designed...
Abstract—DNSSEC security extensions make use of a public-private key pair to sign and validate origi...
This paper examines the deployment of the DNS Security Extensions (DNSSEC), which adds cryptographic...
As the email system is widely used as a communication channel, and often is crucial for the performa...
Securing DNS in Edge- and Fog computing, or other scenarios where microservices are offloaded, requi...
Today's world without the DNS protocol would not be as we know it. DNS protocol enables us the use o...
The global public-key authentication infrastructure standardized in the Domain Name System Security ...
Management of the Domain Name System (DNS) root zone file is a uniquely global policy problem. For t...
This paper describes a method of public key verification based on DNS, that can be used to further i...
Generation and maintenance of security poli-cies is too complex and needs simplification for it to b...
A major problem for a distributed security system is the management of cryptographic keys. Public ke...
Tato diplomová práce se zabývá problémem bezpečné distribuce software. Je navrženo zlepšení s pomocí...
Package management systems play an essential role in pursuing systems dependability by ensuring that...
The domain name system (DNS) is the naming system on the Internet. With the DNS security extensions ...
International audienceThe Domain Name System Security Extensions (DNSSEC) architecture is based on p...
Domain Name System (DNS) plays a massive role in today’s technological era. While initially designed...
Abstract—DNSSEC security extensions make use of a public-private key pair to sign and validate origi...
This paper examines the deployment of the DNS Security Extensions (DNSSEC), which adds cryptographic...
As the email system is widely used as a communication channel, and often is crucial for the performa...
Securing DNS in Edge- and Fog computing, or other scenarios where microservices are offloaded, requi...
Today's world without the DNS protocol would not be as we know it. DNS protocol enables us the use o...
The global public-key authentication infrastructure standardized in the Domain Name System Security ...
Management of the Domain Name System (DNS) root zone file is a uniquely global policy problem. For t...