Skip Abstract Section
Abstract
The Domain Name System was originally designed to support queries of a statically configured database. While the data was expected to change, the frequency of those changes was expected to be fairly low, and all updates were made as external edits to a zone's Master File.
RFC Downloads
ZIP
Cited By
- Gibb R, Madhavapeddy A and Crowcroft J Where on Earth is the Spatial Name System? Proceedings of the 22nd ACM Workshop on Hot Topics in Networks, (79-86)
- Liu S, Duan H, Heimes L, Bearzi M, Vieli J, Basin D and Perrig A A Formal Framework for End-to-End DNS Resolution Proceedings of the ACM SIGCOMM 2023 Conference, (932-949)
- Zheng X, Lu C, Peng J, Yang Q, Zhou D, Liu B, Man K, Hao S, Duan H and Qian Z Poison over troubled forwarders Proceedings of the 29th USENIX Conference on Security Symposium, (577-593)
- Tomic D, Zagar D and Martinovic G (2019). Implementation and efficiency analysis of composite DNS-metric for dynamic server selection, Telecommunications Systems, 71:1, (1-18), Online publication date: 1-May-2019.
- Müller M, Moura G, de O. Schmidt R and Heidemann J Recursives in the wild Proceedings of the 2017 Internet Measurement Conference, (489-495)
- Kalim U, Gardner M, Brown E and Feng W SLIM Proceedings of the Symposium on Architectures for Networking and Communications Systems, (165-177)
- Korczyński M, Król M and van Eeten M Zone Poisoning Proceedings of the 2016 Internet Measurement Conference, (271-278)
- Danielis P, Altmann V, Skodzik J, Wegner T, Koerner A and Timmermann D (2015). P-DONAS, ACM Transactions on Internet Technology, 15:3, (1-21), Online publication date: 28-Sep-2015.
- Yuan L, Chen C, Mohapatra P, Chuah C and Kant K (2013). A Proxy View of Quality of Domain Name Service, Poisoning Attacks and Survival Strategies, ACM Transactions on Internet Technology, 12:3, (1-26), Online publication date: 1-May-2013.
- Chandra S and Back M Faunus Proceedings of the Industrial Track of the 13th ACM/IFIP/USENIX International Middleware Conference, (1-6)
- Patriarca F, Salsano S, Bonola M and Cerqua P UPMT per-application mobility management solution Proceedings of the 10th ACM international symposium on Mobility management and wireless access, (163-166)
- Nordström E, Shue D, Gopalan P, Kiefer R, Arye M, Ko S, Rexford J and Freedman M Serval Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation, (7-7)
- Al-Surmi I, Othman M and Mohd Ali B (2012). Review, Journal of Network and Computer Applications, 35:1, (295-315), Online publication date: 1-Jan-2012.
- Zhu Z, Wakikawa R, Cheshire S and Zhang L Home as you go Proceedings of the 7th Asian Internet Engineering Conference, (89-95)
- Gupta V, Goldman R and Udupi P A network architecture for the Web of Things Proceedings of the Second International Workshop on Web of Things, (1-6)
- Lee Y, Chen I, Kuo S, Liu H and Leu Y Implementation of OpenWrt-based IP PnP gateway Proceedings of the International Conference on Mobile Technology, Applications, and Systems, (1-5)
- Zhou H, Zhang H, Qin Y, Wang H and Chao H GPMIP Proceedings of the International Conference on Mobile Technology, Applications, and Systems, (1-8)
- Rikitake K, Nakao K, Shimojo S and Nogawa H (2008). UDP Large-Payload Capability Detection for DNSSEC, IEICE - Transactions on Information and Systems, E91-D:5, (1261-1273), Online publication date: 1-May-2008.
- Harris A, Miozzo M, Rossi M and Zorzi M Performance improvements in Ad Hoc networks through mobility groups and channel diversity Proceedings of the 3rd international conference on Wireless internet, (1-8)
- Le D, Lei J and Fu X A new decentralized mobility management service architecture for ipv6-based networks Proceedings of the 3rd ACM workshop on Wireless multimedia networking and performance modeling, (54-61)
- Lim T, Lee B, Yeo C and Tantra J A terminal-assisted route optimized NEMO management Proceedings of the 5th ACM international workshop on Mobility management and wireless access, (84-90)
- Guha S and Francis P (2007). An end-middle-end approach to connection establishment, ACM SIGCOMM Computer Communication Review, 37:4, (193-204), Online publication date: 1-Oct-2007.
- Guha S and Francis P An end-middle-end approach to connection establishment Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications, (193-204)
- Lihua Yuan , Kant K, Mohapatra P and Chen-Nee Chuah A Proxy View of Quality of Domain Name Service Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (321-329)
- Ansari F and Sathyanath A (2007). STEM, ACM SIGMOBILE Mobile Computing and Communications Review, 11:2, (1-13), Online publication date: 1-Apr-2007.
- Vixie P (2007). DNS Complexity, Queue, 5:3, (24-29), Online publication date: 1-Apr-2007.
- Teck Meng Lim , Juki Wirawan Tantra , Bu-Sung Lee , Chai Kiat Yeo and Yang Xia Terminal-Assisted Network Mobility Management Proceedings of the 2007 IEEE Wireless Communications and Networking Conference, (3664-3669)
- Jenkins A, Henkel D and Brown T Sensor Data Collection Through Gateways in a Highly Mobile Mesh Network Proceedings of the 2007 IEEE Wireless Communications and Networking Conference, (2784-2789)
- Fritsche W and Guardini I Deploying home agent load sharing in operational mobile IPv6 networks Proceedings of first ACM/IEEE international workshop on Mobility in the evolving internet architecture, (31-36)
- Ford B, Strauss J, Lesniewski-Laas C, Rhea S, Kaashoek F and Morris R Persistent personal names for globally connected mobile devices Proceedings of the 7th symposium on Operating systems design and implementation, (233-248)
- Broido A, Hyun Y, Fomenkov M and claffy k (2006). The windows of pivate DNS updates, ACM SIGCOMM Computer Communication Review, 36:3, (93-98), Online publication date: 5-Jul-2006.
- Sung H, Han S, Joo B, Ang C, Cheng W and Wong K A self-configuration mechanism for high-availability clusters Proceedings of the 6th international conference on Computational Science - Volume Part IV, (260-263)
- Curtmola R, Del Sorbo A and Ateniese G On the performance and analysis of DNS security extensions Proceedings of the 4th international conference on Cryptology and Network Security, (288-303)
- Kristensen L, Westergaard M and Nørgaard P Model-Based prototyping of an interoperability protocol for mobile ad-hoc networks Proceedings of the 5th international conference on Integrated Formal Methods, (266-286)
- Deegan T, Crowcroft J and Warfield A (2005). The main name system, ACM SIGCOMM Computer Communication Review, 35:5, (5-14), Online publication date: 6-Oct-2005.
- Katsaros C, Niarhos I and Vassalos V DAIMON Proceedings of the 4th ACM international workshop on Data engineering for wireless and mobile access, (57-64)
- Giordano M DNS-Based discovery system in service oriented programming Proceedings of the 2005 European conference on Advances in Grid Computing, (840-850)
- Wessels D Is your caching resolver polluting the internet? Proceedings of the ACM SIGCOMM workshop on Network troubleshooting: research, theory and operations practice meet malfunctioning reality, (271-276)
- Ford B (2004). Unmanaged Internet Protocol, ACM SIGCOMM Computer Communication Review, 34:1, (93-98), Online publication date: 1-Jan-2004.
- Crowcroft J, Hand S, Mortier R, Roscoe T and Warfield A (2003). Plutarch, ACM SIGCOMM Computer Communication Review, 33:4, (258-266), Online publication date: 1-Oct-2003.
- Crowcroft J, Hand S, Mortier R, Roscoe T and Warfield A Plutarch Proceedings of the ACM SIGCOMM workshop on Future directions in network architecture, (258-266)
- Osman S, Subhraveti D, Su G and Nieh J (2002). The design and implementation of Zap, ACM SIGOPS Operating Systems Review, 36:SI, (361-376), Online publication date: 31-Dec-2003.
- Osman S, Subhraveti D, Su G and Nieh J The design and implementation of Zap Proceedings of the 5th symposium on Operating systems design and implementation (Copyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading), (361-376)
- Ballintijn G, van Steen M and Tanenbaum A (2001). Scalable Human-Friendly Resource Names, IEEE Internet Computing, 5:5, (20-27), Online publication date: 1-Sep-2001.
- Gleitz P and Bellovin S Transient addressing for related processes Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
- Snoeren A and Balakrishnan H An end-to-end approach to host mobility Proceedings of the 6th annual international conference on Mobile computing and networking, (155-166)
- Park C, Ahn S, Chung J, Lee C and Park C The Improvement for Integrity between DHCP and DNS Proceedings of the High-Performance Computing on the Information Superhighway, HPC-Asia '97
- Carlberg K and Crowcroft J (1997). Building shared trees using a one-to-many joining mechanism, ACM SIGCOMM Computer Communication Review, 27:1, (5-11), Online publication date: 1-Jan-1997.