Scott Rose

Orcid: 0000-0002-3105-7427

According to our database1, Scott Rose authored at least 24 papers between 1987 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A YANG Data Model for Reporting Software Bills of Materials (SBOMs) and Vulnerability Information.
RFC, October, 2023

2018
Energy-aware DNS server allocating.
Sustain. Comput. Informatics Syst., 2018

An On-Demand Defense Scheme Against DNS Cache Poisoning Attacks.
EAI Endorsed Trans. Security Safety, 2018

Evolution and challenges of DNS-based CDNs.
Digit. Commun. Networks, 2018

2017
An On-Demand Defense Scheme Against DNS Cache Poisoning Attacks.
Proceedings of the Security and Privacy in Communication Networks, 2017

DANE Trusted Email for Supply Chain Management.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

2013
Signaling Cryptographic Algorithm Understanding in DNS Security Extensions (DNSSEC).
RFC, July, 2013

Applicability Statement: DNS Security (DNSSEC) DNSKEY Algorithm Implementation Status.
RFC, April, 2013

2012
DNS Resource Records for the Identifier-Locator Network Protocol (ILNP).
RFC, November, 2012

DNS Security (DNSSEC) DNSKEY Algorithm IANA Registry Updates.
RFC, August, 2012

DNAME Redirection in the DNS.
RFC, June, 2012

DNSSEC Deployment in .gov: Progress and Lessons Learned.
Proceedings of the Strategies, 2012

2009
Open Issues in Secure DNS Deployment.
IEEE Secur. Priv., 2009

2008
Minimizing information leakage in the DNS.
IEEE Netw., 2008

2006
Challenges in Securing the Domain Name System.
IEEE Secur. Priv., 2006

2005
Protocol Modifications for the DNS Security Extensions.
RFC, March, 2005

Resource Records for the DNS Security Extensions.
RFC, March, 2005

DNS Security Introduction and Requirements.
RFC, March, 2005

An Integrity Verification Scheme for DNS Zone file based on Security Impact Analysis.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

2004
An autonomic failure-detection algorithm.
Proceedings of the Fourth International Workshop on Software and Performance, 2004

2003
Self-Adaptive Leasing for Jini.
Proceedings of the First IEEE International Conference on Pervasive Computing and Communications (PerCom'03), 2003

Improving Failure Responsiveness in Jini Leasing.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

2002
Limiting the Scope of the KEY Resource Record (RR).
RFC, December, 2002

1987
A user interface for deaf-blind people (preliminary report).
Proceedings of the SIGCHI/GI Conference on Human Factors in Computing Systems and Graphics Interface, 1987


  Loading...