Zobrazeno 1 - 3
of 3
pro vyhledávání: '"Tim Bruijnzeels"'
Autor:
Alan Mislove, Roland van Rijswijk-Deij, Balakrishnan Chandrasekaran, John P. Rula, Nick Sullivan, Bruce M. Maggs, Emile Aben, Taejoong Chung, David Choffnes, Tim Bruijnzeels, Dave Levin
Publikováno v:
Chung, T, Aben, E, Bruijnzeels, T, Chandrasekaran, B, Choffnes, D, Levin, D, Maggs, B M, Mislove, A, Rijswijk-Deij, R V, Rula, J & Sullivan, N 2019, RPKI is Coming of Age: A Longitudinal Study of RPKI Deployment and Invalid Route Origins . in Proceedings of the Internet Measurement Conference . IMC '19, Association for Computing Machinery, New York, NY, USA, pp. 406–419 . https://doi.org/10.1145/3355369.3355596
Proceedings of the Internet Measurement Conference
IMC '19: ACM Internet Measurement Conference, Amsterdam Netherlands, October, 2019, 406-419
STARTPAGE=406;ENDPAGE=419;TITLE=IMC '19
Internet Measurement Conference
Proceedings of the Internet Measurement Conference
IMC '19: ACM Internet Measurement Conference, Amsterdam Netherlands, October, 2019, 406-419
STARTPAGE=406;ENDPAGE=419;TITLE=IMC '19
Internet Measurement Conference
Despite its critical role in Internet connectivity, the Border Gateway Protocol (BGP) remains highly vulnerable to attacks such as prefix hijacking, where an Autonomous System (AS) announces routes for IP space it does not control. To address this is
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::94553899e2cd4ac46953a0d154224c0c
https://research.vu.nl/en/publications/4545c6a8-09a9-4cc9-aa6c-8235d669dcdc
https://research.vu.nl/en/publications/4545c6a8-09a9-4cc9-aa6c-8235d669dcdc
Autor:
Tim Bruijnzeels, Oleg Muravskiy
This document describes the approach to validate the content of the RPKI certificate tree, as it is implemented in the RIPE NCC RPKI Validator. This approach is independent of a particular object retrieval mechanism. This allows it to be used with re
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::66fd354b22f8860f64382a6b4698d297
https://doi.org/10.17487/rfc8488
https://doi.org/10.17487/rfc8488
Autor:
Geoff Huston, George Michaelson, Andrew Newton, Carlos Martinez, Daniel Shaw, Tim Bruijnzeels
This document specifies an alternative to the certificate validation procedure specified in RFC 6487 that reduces aspects of operational fragility in the management of certificates in the Resource Public Key Infrastructure (RPKI), while retaining ess
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::0b76ec21c3e41bfad24db10d82678408
https://doi.org/10.17487/rfc8360
https://doi.org/10.17487/rfc8360