DANE: An inbuilt security extension

dc.contributor.authorAishwarya, C.
dc.contributor.authorRaghuram, M.A.
dc.contributor.authorHosmani, S.
dc.contributor.authorSannidhan, M.S.
dc.contributor.authorRajendran, B.
dc.contributor.authorChandrasekaran, K.
dc.contributor.authorBindhumadhava, B.S.
dc.date.accessioned2026-02-06T06:39:14Z
dc.date.issued2016
dc.description.abstractUse of TSL and certificates in secure applications in the internet is very common today. Certificate authorities are playing the important role of trust anchors. But this means that third party certificate authorities have to be trusted by both domain owners and their clients. Compromises of certificate authorities will put many users under a huge risk. To solve this problem, the DANE protocol was proposed that is used on top of DNSSEC. It allows using the chain of trust in DNS for authenticating certificates and makes clients impose many constraints on the certificates they receive. We analyze the performance of the DANE protocol at the client side and also present a tool for deploying and administrating DANE with BIND servers in a local network. © 2015 IEEE.
dc.identifier.citationProceedings of the 2015 International Conference on Green Computing and Internet of Things, ICGCIoT 2015, 2016, Vol., , p. 1571-1576
dc.identifier.urihttps://doi.org/10.1109/ICGCIoT.2015.7380717
dc.identifier.urihttps://idr.nitk.ac.in/handle/123456789/32180
dc.publisherInstitute of Electrical and Electronics Engineers Inc.
dc.subjectDANE protocol
dc.subjectDNS
dc.subjectDNSSEC
dc.subjectPerformance Analysis
dc.subjectTool
dc.subjectWeb Security
dc.titleDANE: An inbuilt security extension

Files