{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T11:00:34Z","timestamp":1730286034971,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,4]]},"DOI":"10.1109\/noms.2018.8406223","type":"proceedings-article","created":{"date-parts":[[2018,7,9]],"date-time":"2018-07-09T23:09:23Z","timestamp":1531177763000},"page":"1-9","source":"Crossref","is-referenced-by-count":7,"title":["Economic incentives on DNSSEC deployment: Time to move from quantity to quality"],"prefix":"10.1109","author":[{"given":"Tho","family":"Le","sequence":"first","affiliation":[]},{"given":"Roland","family":"van Rijswijk-Deij","sequence":"additional","affiliation":[]},{"given":"Luca","family":"Allodi","sequence":"additional","affiliation":[]},{"given":"Nicola","family":"Zannone","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.23919\/TMA.2017.8002913"},{"key":"ref30","article-title":"A Case for Comprehensive DNSSEC Monitoring and Analysis Tools","author":"deccio","year":"2011","journal-title":"Proc of the 1st Workshop on Securing and Trusting Internet Names"},{"journal-title":"DNSSEC in nl","year":"2016","author":"davids","key":"ref10"},{"journal-title":"Slowly Cracking the DNSSEC Code at ICANN 43","year":"2012","author":"mohan","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-81-2"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-57Pt3r1"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2558918"},{"journal-title":"OpenINTEL Active DNS Measurement Project","year":"0","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6781"},{"journal-title":"ENISA Reports","article-title":"The Costs oF DNSSEC Deployment","year":"2009","key":"ref17"},{"journal-title":"Tech Rep 4","article-title":"The Domain Name Industry Brief Q3 2017","year":"2017","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1035"},{"journal-title":"Reports","article-title":"State of DNSSEC Deployment","year":"2016","key":"ref28"},{"journal-title":"ICANN Research TLD DNSSEC Report","year":"0","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1452520.1452548"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4033"},{"journal-title":"Celebrating 10 Years of DNSSEC Workshops","year":"0","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1186\/s13388-015-0023-y"},{"journal-title":"Improving DNS Security A Measurement-Based Approach","year":"2017","author":"van rijswijk-deij","key":"ref5"},{"journal-title":"DNSSEC Deployment in Sweden","year":"2014","key":"ref8"},{"journal-title":"ISDN Verlengt DNSSEC Kortingsregeling tot 1 Juli 2018","year":"2014","key":"ref7"},{"key":"ref2","article-title":"Using the Domain Name System for System Break-ins","author":"bellovin","year":"1995","journal-title":"Proc Usenix Security Symposium"},{"journal-title":"Internetstiftelsen i Sverige Personal Communication","year":"0","author":"br\u00e4nnlund","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1034"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.2307\/2276207"},{"key":"ref22","first-page":"1307","article-title":"A Longitudinal, End-to-End View of the DNSSEC Ecosystem","author":"chung","year":"2017","journal-title":"Proceedings of the 26th USENIX Security Symposium"},{"key":"ref21","article-title":"Good Practices Guide for Deploying DNSSEC","author":"saragiotis","year":"2010","journal-title":"ENISA Reports"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1109\/MCOM.2014.6828880","article-title":"DNSSEC Meets Real World: Dealing with Unreachability Caused by Fragmentation","volume":"52","author":"van den broek","year":"2014","journal-title":"IEEE Communications Magazine"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131373"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2010.10"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2831347.2831350"}],"event":{"name":"NOMS 2018 - 2018 IEEE\/IFIP Network Operations and Management Symposium","start":{"date-parts":[[2018,4,23]]},"location":"Taipei","end":{"date-parts":[[2018,4,27]]}},"container-title":["NOMS 2018 - 2018 IEEE\/IFIP Network Operations and Management Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8399136\/8406102\/08406223.pdf?arnumber=8406223","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T15:59:34Z","timestamp":1643212774000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8406223\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/noms.2018.8406223","relation":{},"subject":[],"published":{"date-parts":[[2018,4]]}}}