Eliot Lear

According to our database1, Eliot Lear authored at least 27 papers between 1991 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A YANG Data Model for Reporting Software Bills of Materials (SBOMs) and Vulnerability Information.
RFC, October, 2023

2021
On the Analysis of MUD-Files' Interactions, Conflicts, and Configuration Requirements Before Deployment.
CoRR, 2021

Making Access Control Easy in IoT.
Proceedings of the Human Aspects of Information Security and Assurance, 2021

Is Visualization Enough? Evaluating the Efficacy of MUD-Visualizer in Enabling Ease of Deployment for Manufacturer Usage Description (MUD).
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
IETF Plenary Meeting Venue Selection Process.
RFC, February, 2020

2019
Manufacturer Usage Description Specification.
RFC, March, 2019

2016
Interoperability Issues between Domain-based Message Authentication, Reporting, and Conformance (DMARC) and Indirect Email Flows.
RFC, September, 2016

Response to the IANA Stewardship Transition Coordination Group (ICG) Request for Proposals on the IANA Protocol Parameters Registries.
RFC, August, 2016

Slinging MUD: Manufacturer usage descriptions: How the network can protect things.
Proceedings of the International Conference on Selected Topics in Mobile & Wireless Networking, 2016

2014
Report from the IAB Workshop on Internet Technology Adoption and Transition (ITAT).
RFC, July, 2014

The Internet Assigned Numbers Authority Transition.
IEEE Internet Comput., 2014

2013
NERD: A Not-so-novel Endpoint ID (EID) to Routing Locator (RLOC) Database.
RFC, January, 2013

2012
Internet Engineering Task Force and International Telecommunication Union - Telecommunication Standardization Sector Collaboration Guidelines.
RFC, September, 2012

A Simple Authentication and Security Layer (SASL) and Generic Security Service Application Program Interface (GSS-API) Mechanism for OpenID.
RFC, May, 2012

A Simple Authentication and Security Layer (SASL) and GSS-API Mechanism for the Security Assertion Markup Language (SAML).
RFC, April, 2012

Procedures for Maintaining the Time Zone Database.
RFC, February, 2012

2007
Timezone Options for DHCP.
RFC, April, 2007

2006
Using the NETCONF Protocol over the Blocks Extensible Exchange Protocol (BEEP).
RFC, December, 2006

Getting Rid of the Cruft: Report from an Experiment in Identifying and Reclassifying Obsolete Standards Documents.
RFC, March, 2006

2005
Things Multihoming in IPv6 (MULTI6) Developers Should Think About.
RFC, October, 2005

Procedures for Renumbering an IPv6 Network without a Flag Day.
RFC, September, 2005

2004
Being Awash in Keys.
login Usenix Mag., 2004

2003
Uniform Resource Identifier (URI) Scheme and Applicability Statement for the Trivial File Transfer Protocol (TFTP).
RFC, October, 2003

1996
Address Allocation for Private Internets.
RFC, February, 1996

Renumbering: Threat or Menace.
Proceedings of the 10th Conference on Systems Administration (LISA 1996), Chicago, IL, USA, September 29, 1996

1994
Network 10 Considered Harmful (Some Practices Shouldn't be Codified).
RFC, July, 1994

1991
A mechanism for maintaining an up-to-date GenBank database via Usenet.
Comput. Appl. Biosci., 1991


  Loading...