To see the other types of publications on this topic, follow the link: Domain Name Service.

Journal articles on the topic 'Domain Name Service'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Domain Name Service.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Victors, Jesse, Ming Li, and Xinwen Fu. "The Onion Name System." Proceedings on Privacy Enhancing Technologies 2017, no. 1 (2017): 21–41. http://dx.doi.org/10.1515/popets-2017-0003.

Full text
Abstract:
Abstract Tor onion services, also known as hidden services, are anonymous servers of unknown location and ownership that can be accessed through any Torenabled client. They have gained popularity over the years, but since their introduction in 2002 still suffer from major usability challenges primarily due to their cryptographically-generated non-memorable addresses. In response to this difficulty, in this work we introduce the Onion Name System (OnioNS), a privacy-enhanced decentralized name resolution service. OnioNS allows Tor users to reference an onion service by a meaningful globally-uni
APA, Harvard, Vancouver, ISO, and other styles
2

VIXIE, P. "Federated Domain Name Service Using DNS Metazones." IEICE Transactions on Communications E89-B, no. 4 (2006): 1144–49. http://dx.doi.org/10.1093/ietcom/e89-b.4.1144.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zou, Futai, Siyu Zhang, Linsen Li, Li Pan, and Jianhua Li. "Detecting malware based on expired command-and-control traffic." International Journal of Distributed Sensor Networks 13, no. 7 (2017): 155014771772079. http://dx.doi.org/10.1177/1550147717720791.

Full text
Abstract:
In this article, we analyze the behavioral characteristics of domain name service queries produced by programs and then design an algorithm to detect malware with expired command-and-control domains based on the key feature of domain name service traffic, that is, repeatedly querying domain with a fixed interval. In total, 3027 malware command-and-control domains in the network traffic of Shanghai Jiao Tong University, affecting 249 hosts, were successfully detected, with a high precision of 92.0%. This algorithm can find those malware with expired command-and-control domains that are usually
APA, Harvard, Vancouver, ISO, and other styles
4

Cheung, S. "Denial of service against the Domain Name System." IEEE Security & Privacy Magazine 4, no. 1 (2006): 40–45. http://dx.doi.org/10.1109/msp.2006.10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zhang, Denghui, Lijing Ren, and Zhaoquan Gu. "Enhancing the Privacy of Network Services through Trusted Computing." Applied Sciences 12, no. 18 (2022): 9191. http://dx.doi.org/10.3390/app12189191.

Full text
Abstract:
The addressing and discovering service is a vital infrastructure of the Internet. New applications and scenarios in next-generation networks rely on the secure and stable operation of domain name services, which puts forward new security challenges for the original domain name mechanism. While previous security enhancements of network services struggled to strike a balance between security, performance, and compatibility, hindering further use of core network services, the TEE (Trusted Computing Environment) technology can provide trusted and confidential services in untrusted network environm
APA, Harvard, Vancouver, ISO, and other styles
6

Mir, Jibran, and Azhar Mahmood. "Movie Aspects Identification Model for Aspect Based Sentiment Analysis." Information Technology And Control 49, no. 4 (2020): 564–82. http://dx.doi.org/10.5755/j01.itc.49.4.25350.

Full text
Abstract:
Aspect Based Sentiment Analysis techniques have been applied in several application domains. From the last two decades, these techniques have been developed mostly for product and service application domains. However, very few aspect-based sentiment techniques have been proposed for the movie application domain. Moreover, these techniques only mine specific aspects (Script, Director, and Actor) of a movie application domain, nevertheless, the movie application domain is more complex than the product and service application domain. Since, it contains NER (Named Entity Recognition) problem and i
APA, Harvard, Vancouver, ISO, and other styles
7

Hassanah, Hetty, and Wahyudi Wahyudi. "PENGAKUAN PUTUSAN PENYEDIA LAYANAN PENYELESAIAN SENGKETA NAMA DOMAIN ASING." Jurnal Bina Mulia Hukum 6, no. 1 (2021): 34–46. http://dx.doi.org/10.23920/jbmh.v6i1.240.

Full text
Abstract:
ABSTRAK
 Pendaftaran dan putusan merupakan dasar hukum terbitnaya nama domain. Dalam Undang-Undang ITE hanya mengakui eksistensi Nama Domain (ND) hasil pendaftaran pada Registrar Asing (Ps. 24 ayat 3). Teknologi informasi membuka ruang baru yang dinamakan cyberspace. Nama domain termasuk dalam cyberspace yang kepentingannya melibatkan seluruh pengguna internet akan tetapi tidak semua negara mempunyai regulasi yang sesuai dengan perkembangan teori dunia maya. Metode yuridis normatif yang digunakan dalam penelitian ini dengan spesifikasi yang bersifat deskriptif analitis. Teori “Code” atau
APA, Harvard, Vancouver, ISO, and other styles
8

Yuchi, Xue Biao, An Lei Hu, and Xiao Dong Lee. "Improving Domain Name Service Availability via Cache Optimization Methods." Applied Mechanics and Materials 687-691 (November 2014): 2092–95. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2092.

Full text
Abstract:
Domain Name Service (DNS) is essential to modern Internet activities. Cache issues in DNS are one of the most critical to ensure the stability of DNS service. To improve the performance of DNS Cache, here we present a solution for DNS cache architecture optimization. Based on this solution, we further give a novel DNS cache backup method in this paper, in which a dynamic incremental DNS cache synchronization mechanism is proposed.
APA, Harvard, Vancouver, ISO, and other styles
9

Liu, Siyuan, Shaoyong Guo, Ziwei Hu, et al. "Domain Name Service Mechanism Based on Master-Slave Chain." Intelligent Automation & Soft Computing 32, no. 2 (2022): 951–62. http://dx.doi.org/10.32604/iasc.2022.021202.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Siamionava, T. V. "RIGHT TO A DOMAIN NAME (Part 1)." Vestnik of Polotsk State University. Part D. Economic and legal sciences, no. 5 (June 27, 2021): 145–51. http://dx.doi.org/10.52928/2070-1632-2021-56-5-145-151.

Full text
Abstract:
The author substantiated a new model of the right to a domain name, proceeding from the established legal nature and essence of this right. It is proposed to endow the owner of the domain name with a property right of an absolute nature, which is limited in the event of full or partial coincidence with the trademark, service mark or company name, by the term and conditions of the agreement with the registrar.
APA, Harvard, Vancouver, ISO, and other styles
11

Siamionava, Т. "Right to a domain name (Part 2)." Vestnik of Polotsk State University. Part D. Economic and legal sciences, no. 6 (August 15, 2021): 136–41. http://dx.doi.org/10.52928/2070-1632-2021-57-6-136-141.

Full text
Abstract:
The author substantiated a new model of the right to a domain name, proceeding from the established legal nature and essence of this right. It is proposed to endow the owner of the domain name with a property right of an absolute nature, which is limited in the event of full or partial coincidence with the trademark, service mark or company name, by the term and conditions of the agreement with the registrar.
APA, Harvard, Vancouver, ISO, and other styles
12

Li, Ruixiang, Rui Xu, Yuanyuan Ma, and Xiangyang Luo. "LandmarkMiner." ACM Transactions on Internet of Things 2, no. 3 (2021): 1–22. http://dx.doi.org/10.1145/3457409.

Full text
Abstract:
High-confidence network landmarks are the basis of IP geolocation. However, existing landmarks acquisition methods had weakness such as high time cost and insufficient landmarks number. For this, LandmarkMiner, a street-level network landmarks mining method, is proposed based on service identification and domain name association. First, LandmarkMiner trains classifiers using the scanning results of IPs with known hosting service type, identifies the hosting service type of target IPs using the trained classifiers, and obtains the classified IPs’ domain names using DNS. Then, according to insti
APA, Harvard, Vancouver, ISO, and other styles
13

Liu, Yi, Sha Liu, Junyu Wang, et al. "A Credible Food Traceability System Based on Domain Name System Security Extensions." International Journal of Online Engineering (iJOE) 14, no. 04 (2018): 111. http://dx.doi.org/10.3991/ijoe.v14i04.8385.

Full text
Abstract:
Food safety has drawn worldwide attention because of its enormous impact on human health and social stability. Although traceability systems based on Internet of Things (IoT) can improve the visibility of the food supply chain, the trust service is necessary to ensure the data origin and data integrity. This paper proposes a food traceability system supported by a trust service based on Domain Name System Security Extensions(DNSSEC). A DNSSEC-enabled traceability system is implemented for food safety in China. In the traceability system, the master data and event data of the products is stored
APA, Harvard, Vancouver, ISO, and other styles
14

Ghazaleh, Shereen Abu. "Fighting Cybersquatting: Nominet Disputes Resolution Service Policy." Business Law Review 32, Issue 2 (2011): 31–34. http://dx.doi.org/10.54648/bula2011008.

Full text
Abstract:
In the UK cybersquatting can be challenged through litigation under either the Trade Marks Act 1994 or passing-off law. Litigation is expensive and time-consuming but, if it succeeds, there are damages awarded and attorney fees are paid according to certain circumstances. Another way to claim against the abusive registration of domain names is through the UK’s domain name registration authority’s Dispute Resolution Service. This article describes the service and assesses its strengths and weaknesses.
APA, Harvard, Vancouver, ISO, and other styles
15

Maia, Ricardo J. M., Dustin Ray, Sikha Pentyala, et al. "An end-to-end framework for private DGA detection as a service." PLOS ONE 19, no. 8 (2024): e0304476. http://dx.doi.org/10.1371/journal.pone.0304476.

Full text
Abstract:
Domain Generation Algorithms (DGAs) are used by malware to generate pseudorandom domain names to establish communication between infected bots and command and control servers. While DGAs can be detected by machine learning (ML) models with great accuracy, offering DGA detection as a service raises privacy concerns when requiring network administrators to disclose their DNS traffic to the service provider. The main scientific contribution of this paper is to propose the first end-to-end framework for privacy-preserving classification as a service of domain names into DGA (malicious) or non-DGA
APA, Harvard, Vancouver, ISO, and other styles
16

Zhang, Ning, Le Jun Chi, and Hai Yan Xu. "Domain Names Based on Fault Tree Analysis." Applied Mechanics and Materials 667 (October 2014): 143–48. http://dx.doi.org/10.4028/www.scientific.net/amm.667.143.

Full text
Abstract:
The success rate of domain name resolution has a direct influence on the service of DNS. Analytical performance of DNS server is the key to measure the satisfaction degree of users when they access to the network. This article establishes the dependence model for the domain name server. In order to get DNS fault model and analytical model, this article uses Fault Tree Analysis theory to describe the relationship of tree basic events and target events of fault tree of dependency. On the basis of fault tree model, dependencies of domain names are qualitative analyzed, including number of sets an
APA, Harvard, Vancouver, ISO, and other styles
17

Liddicoat, Joy. "A country road: domain name disputes in .nz—is private dispute resolution working?" International Journal of Law and Information Technology 27, no. 4 (2019): 409–36. http://dx.doi.org/10.1093/ijlit/eaz013.

Full text
Abstract:
Abstract Domain name dispute literature focuses largely on generic top level domains and the Uniform Dispute Resolution Policy. Country code top level domains (ccTLDs) attract far less commentary. This article addresses this gap with a detailed evaluation of one ccTLD dispute resolution system: .nz. Evaluation of domain name disputes presents unique challenges: there is no single system for resolving disputes, diverse legal tests apply across jurisdictions and categories of disputes vary. The article examines .nz in light of these challenges, developing and applying evaluation criteria to draw
APA, Harvard, Vancouver, ISO, and other styles
18

Bagnato, Domenica. "The network information systems directive (EU) 2016/1148: internet service providers and registraties." Central and Eastern European eDem and eGov Days 338 (July 15, 2020): 111–22. http://dx.doi.org/10.24989/ocg.v.338.9.

Full text
Abstract:
The NIS Directive [1] defines critical infrastructures and operators of essential services. It also calls for organizational measures to ensure these infrastructures are protected from cybercrime and terrorism. This also includes the establishment of a national framework for emergency response. The list of essential services in Annex II does contain certain elements of Internet infrastructures, such as Domain Name Servers and Internet Exchange Points. However, in a truly remarkable omission, the Directive does not include Internet Service Providers (ISP) [2]. Since operators of essential servi
APA, Harvard, Vancouver, ISO, and other styles
19

Mason, Paul Eric. "Como Resolver Disputas Sobre Nomes de Domínio na Internet." Revista Brasileira de Arbitragem 9, Issue 33 (2012): 122–35. http://dx.doi.org/10.54648/rba2012005.

Full text
Abstract:
ABSTRACT: The present article describes the UDRP - Uniform Domain Name Dispute Resolution Policy - the rules and procedures for which were approved in 1999. The UDRP procedure is the primary method used to resolve disputes between domain name registrants and trade or service mark holders on the internet. The article further touches on aspects of the Arbitration and Mediation Center of the World Intellectual Property Organization, and the scenario Brazil is facing with the new rules governing disputes over domain names containing the extension .br.
APA, Harvard, Vancouver, ISO, and other styles
20

Zhang, Mingming, Xiang Li, Baojun Liu, et al. "Detecting and Measuring Security Risks of Hosting-Based Dangling Domains." Proceedings of the ACM on Measurement and Analysis of Computing Systems 7, no. 1 (2023): 1–28. http://dx.doi.org/10.1145/3579440.

Full text
Abstract:
Public hosting services provide convenience for domain owners to build web applications with better scalability and security. However, if a domain name points to released service endpoints (e.g., nameservers allocated by a provider), adversaries can take over the domain by applying the same endpoints. Such a security threat is called "hosting-based domain takeover''. In recent years, a large number of domain takeover incidents have occurred; even well-known websites like the subdomains of microsoft.com have been impacted. However, until now, there has been no effective detection system to iden
APA, Harvard, Vancouver, ISO, and other styles
21

Tian, Hong Cheng, Hong Wang, and Jin Kui Ma. "Domain Name System during the Transition from IPv4 to IPv6." Applied Mechanics and Materials 687-691 (November 2014): 1912–15. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1912.

Full text
Abstract:
IPv4 and IPv6 will coexist for a long time, due to ISPes’ inertia in the transition from IPv4 to IPv6. Domain Name System (DNS) is a very important functional unit in the Internet. This paper describres the hierarchy and operating process of IPv6 DNS, IPv6 DNS resolver, and presents the DNS transition from IPv4 to IPv6 in particular. We suggest two methods to implement DNS service during the transition period: DNS-Application Level Gateway (DNS-ALG) with Network Address Translation-Protocol Translation (NAT-PT), and dual stacks. And we also propose their respective operational principles. This
APA, Harvard, Vancouver, ISO, and other styles
22

Tian, Hong Cheng, and Hong Wang. "Deployment and Exploration of Domain Name System Based on IPv6." Applied Mechanics and Materials 668-669 (October 2014): 1247–52. http://dx.doi.org/10.4028/www.scientific.net/amm.668-669.1247.

Full text
Abstract:
IPv6 is intended to replace IPv4 in the Internet. Domain Name System (DNS) is an essential component of functionality of Internet. This paper presents new IPv6 characteristics, IPv6 DNS hierarchy, working process of IPv6 DNS, IPv6 address types, representation formats of IPv6 address, forward (reverse) resolver of IPv6 DNS, and the DNS transition from IPv4 to IPv6, combined with the practice to build the IPv6 experimental network of Peking University. We give corresponding solutions for the problems encountered in the IPv6 DNS deployment. This paper is of important reference value for IPv6 net
APA, Harvard, Vancouver, ISO, and other styles
23

Talib, Muhammad Adeel, Muhammad Nabeel Talib, and Madiha Akhtar. "Service Packaging: A Pattern Based Approach Towards Service Delivery." Computer and Information Science 12, no. 2 (2019): 14. http://dx.doi.org/10.5539/cis.v12n2p14.

Full text
Abstract:
Authentication, authorization, billing and monitoring are all common service delivery functions that are generally required to be added on to core business services in order for them to be delivered online commercially. Extending core services with these service delivery functions requires considerable effort if implemented ground-up and can be subject to limitations if outsourced to a service broker or a conventional middleware platform. Because of the ubiquitous nature of these service delivery functions, we see them as reusable patterns for service delivery. In this paper we have introduce
APA, Harvard, Vancouver, ISO, and other styles
24

Li, Yunliang, Zhiqiang Du, Yanfang Fu, and Liangxin Liu. "Role-Based Access Control Model for Inter-System Cross-Domain in Multi-Domain Environment." Applied Sciences 12, no. 24 (2022): 13036. http://dx.doi.org/10.3390/app122413036.

Full text
Abstract:
Information service platforms or management information systems of various institutions or sectors of enterprises are gradually interconnected to form a multi-domain environment. A multi-domain environment is convenient for managers to supervise and manage systems, and for users to access data across domains and systems. However, given the complex multi-domain environment and many users, the traditional or enhanced role-based access control (RBAC) model still faces some challenges. It is necessary to address issues such as role naming conflicts, platform–domain management conflicts, inter-doma
APA, Harvard, Vancouver, ISO, and other styles
25

Li, Chao, Yanan Cheng, Hao Men, Zhaoxin Zhang, and Ning Li. "Performance Analysis of Root Anycast Nodes Based on Active Measurement." Electronics 11, no. 8 (2022): 1194. http://dx.doi.org/10.3390/electronics11081194.

Full text
Abstract:
The root server is at the top of the domain name hierarchical structure. To improve root service performance, each root deploys anycast nodes worldwide. What is the actual service performance of these nodes after deployment? We analyze the service performance of the root anycast nodes deployed in China based on the active measurement data detected by the VPs of different ISPs in different geographical locations. From the analysis, we find that the resolution performance of the roots with anycast nodes deployed in China is higher than that of roots without deployment. However, users of differen
APA, Harvard, Vancouver, ISO, and other styles
26

Yuan, Lihua, Chao-Chih Chen, Prasant Mohapatra, Chen-Nee Chuah, and Krishna Kant. "A Proxy View of Quality of Domain Name Service, Poisoning Attacks and Survival Strategies." ACM Transactions on Internet Technology 12, no. 3 (2013): 1–26. http://dx.doi.org/10.1145/2461321.2461324.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Zaka Ullah. "Infrastructure of DNS/DNSSEC." Lahore Garrison University Research Journal of Computer Science and Information Technology 1, no. 3 (2017): 58–66. http://dx.doi.org/10.54692/lgurjcsit.2017.010323.

Full text
Abstract:
DNS Security Extension is introduced as a solution after the in-depth study of all expected issues regarding security of Domain Name System. Accordingly, DNS is domain name service provider via name server but it fails to facilitate the support for authenticity of data origin and integrity. In addition, DNS satirizing give stage to digital assaults, and can be used to watch client's exercises, for control, for conveyance of pernicious programming and to offend client's PC and even to subvert rightness and accessibility of internet systems and administrations. Therefore, it is fundamental to at
APA, Harvard, Vancouver, ISO, and other styles
28

Tedja, Andreas, Charles Lim, and Heru Purnomo Ipung. "Detecting Network Anomalies In ISP Network Using DNS And NetFlow." ICONIET PROCEEDING 2, no. 3 (2019): 238–42. http://dx.doi.org/10.33555/iconiet.v2i3.38.

Full text
Abstract:
The Internet has become the biggest medium for people to communicate with otherpeople all around the world. However, the Internet is also home to hackers with maliciouspurposes. This poses a problem for Internet Service Providers (ISP) and its user, since it ispossible that their network is compromised and damages may be done. There are many types ofmalware that currently exist on the Internet. One of the growing type of malware is botnet.Botnet can infect a system and make it a zombie machine capable of doing distributed attacksunder the command of the botmaster. In order to make detection of
APA, Harvard, Vancouver, ISO, and other styles
29

Katzan, Jr., Harry. "Cybersecurity Service Model." Journal of Service Science (JSS) 5, no. 2 (2012): 71–78. http://dx.doi.org/10.19030/jss.v5i2.7576.

Full text
Abstract:
The efficacy of modern computer systems is normally regarded as a function of five basic attributes of computer and information security: availability, accuracy, authenticity, confidentiality, and integrity. The concepts generally apply to government, business, education, and the ordinary lives of private individuals. The considerations normally involve extended applications of the Internet hence the name Cybersecurity. Achieving and maintaining a secure cyberspace is a complicated process, and some of the concerns involve personal identity, privacy and intellectual property, secure maintenanc
APA, Harvard, Vancouver, ISO, and other styles
30

Luo, Xi, Yixin Li, Hongyuan Cheng, and Lihua Yin. "AGCN-Domain: Detecting Malicious Domains with Graph Convolutional Network and Attention Mechanism." Mathematics 12, no. 5 (2024): 640. http://dx.doi.org/10.3390/math12050640.

Full text
Abstract:
Domain Name System (DNS) plays an infrastructure role in providing the directory service for mapping domains to IPs on the Internet. Considering the foundation and openness of DNS, it is not surprising that adversaries register massive domains to enable multiple malicious activities, such as spam, command and control (C&C), malware distribution, click fraud, etc. Therefore, detecting malicious domains is a significant topic in security research. Although a substantial quantity of research has been conducted, previous work has failed to fuse multiple relationship features to uncover the dee
APA, Harvard, Vancouver, ISO, and other styles
31

Hasan, Dana, Rebeen R. Hama Amin, and Masnida Hussin. "Efficient Authentication Mechanism for Defending Against Reflection-Based Attacks on Domain Name System." Kurdistan Journal of Applied Research 5, no. 1 (2020): 164–74. http://dx.doi.org/10.24017/science.2020.1.12.

Full text
Abstract:
Domain Name System (DNS) is one of few services on the Internet which is allowed through every security barrier. It mostly depends on the User Datagram Protocol (UDP) as the transport protocol, which is a connectionless protocol with no built-in authentication mechanism. On top of that, DNS responses are substantially larger than their corresponding requests. These two key features made DNS a fabulous attacking tool for cybercriminals to reflect and amplify a huge volume of requests to consume their victim's resources. Recent incidents revealed how harsh DNS could be when it is abused with gre
APA, Harvard, Vancouver, ISO, and other styles
32

Kirstein, Peter T. "Edge Networks & Devices for the Internet of Things." Daedalus 145, no. 1 (2016): 33–42. http://dx.doi.org/10.1162/daed_a_00363.

Full text
Abstract:
This paper considers how existing concepts underlying the development of the Internet are being strained in the emerging Internet of Things (IoT). It also explores how the well-known and tried Domain Name Service concepts, which map hierarchic names to addresses, can be extended for the IoT. The extension greatly broadens the concept of name/address mapping to digital objects with identifier/attribute database mapping for physical objects, applications, and data. Finally, this essay discusses the properties of the identifier management systems, showing how scalability, security, and flexibilit
APA, Harvard, Vancouver, ISO, and other styles
33

Schneider, J., A. Klein, C. Mannweiler, and H. D. Schotten. "An efficient architecture for the integration of sensor and actuator networks into the future internet." Advances in Radio Science 9 (August 1, 2011): 231–35. http://dx.doi.org/10.5194/ars-9-231-2011.

Full text
Abstract:
Abstract. In the future, sensors will enable a large variety of new services in different domains. Important application areas are service adaptations in fixed and mobile environments, ambient assisted living, home automation, traffic management, as well as management of smart grids. All these applications will share a common property, the usage of networked sensors and actuators. To ensure an efficient deployment of such sensor-actuator networks, concepts and frameworks for managing and distributing sensor data as well as for triggering actuators need to be developed. In this paper, we presen
APA, Harvard, Vancouver, ISO, and other styles
34

Chen, Min-Xiou, and Chi-Hsun Wu. "The Network Live Migration Design Based On The Mobile IPv6 Network Mobility For Hybrid Cloud Network." International Journal of Advanced Networking and Applications 13, no. 06 (2022): 5229–36. http://dx.doi.org/10.35444/ijana.2022.13609.

Full text
Abstract:
In the Cloud Computing, the migration mechanism can provide services, computing jobs and resources moved from a virtual environment to another virtual environment, and service providers can fit out their logic network architectures to offer services for user requirements. The network live migration across the different networks is a big challenge of the migration mechanism. In the paper, logical network architecture was proposed to provide the Cloud Computing in a hybrid network environment. The logical network concept, tunnel technology, domain name service and some existing network protocols
APA, Harvard, Vancouver, ISO, and other styles
35

Huang, Zhen Sheng. "Liner Model of Two-Stage Server Numbers and Load Throughputs." Applied Mechanics and Materials 182-183 (June 2012): 1303–7. http://dx.doi.org/10.4028/www.scientific.net/amm.182-183.1303.

Full text
Abstract:
This paper discuss Web servers load sharing techniques based on Domain Name Service, identifiers, and two-stage reliable and scalable Server architecture combine with DNS and identifier. Quantitative analyses the performance of the architecture and the relationship between the load throughputs and two-stage server numbers, and than obtain an approach liner regression model.
APA, Harvard, Vancouver, ISO, and other styles
36

Dövényi-Nagy, Tamás. "Internet Browsing Habits and Domain Choice Preferences of Economic Agricultural Engineers." Acta Agraria Debreceniensis, no. 13 (May 4, 2004): 134–37. http://dx.doi.org/10.34101/actaagrar/13/3398.

Full text
Abstract:
The findings below are based on a questionnaire survey carried out in order to establish an internet-based service at the Center of Agricultural Sciences of Debrecen University:• The typical target group of the service in the short run with a weekly average of 5.9 hours on the web is more active than that for average Hungarian, adult Internet users.• A professional webportal with a searchable database, primarily incorporating an archive of organized agricultural news, articles, publications, fits well into the internet habits of the target group, which mainly consists of keyword-based informat
APA, Harvard, Vancouver, ISO, and other styles
37

Al-Shehri, Saleh Fadel S., and Chun Lin Li. "Quality of Service for Cloud Computing." Advanced Materials Research 905 (April 2014): 683–86. http://dx.doi.org/10.4028/www.scientific.net/amr.905.683.

Full text
Abstract:
Cloud Computing has recently been recognized as one of the most emerging technology. A considerable amount of research has been carried out to explore different areas in Cloud Computing. This paper focuses on the QoS and new trends in cloud computing based on extant information systems literature, industry reports, and practical experience reflections. Additionally, it highlights the significance of DNS (Domain Name System) cloud computing QoS (Quality of Service) and its implications for practitioner and academics. This paper aims also to create higher performance and reliability, ensuring no
APA, Harvard, Vancouver, ISO, and other styles
38

Asswad, Mohammad Mourhaf AL, Sergio de Cesare, and Mark Lycett. "A Query-based Approach for Semi-Automatic Annotation of Web Services." International Journal of Information Systems and Social Change 2, no. 2 (2011): 37–54. http://dx.doi.org/10.4018/jissc.2011040103.

Full text
Abstract:
Semantic Web services (SWS) have attracted increasing attention due to their potential to automate discovery and composition of current syntactic Web services. An issue that prevents a wider adoption of SWS relates to the manual nature of the semantic annotation task. Manual annotation is a difficult, error-prone, and time-consuming process and automating the process is highly desirable. Though some approaches have been proposed to semi-automate the annotation task, they are difficult to use and cannot perform accurate annotation for the following reasons: (1) They require building application
APA, Harvard, Vancouver, ISO, and other styles
39

Zain ul Abideen, Muhammad, Shahzad Saleem, and Madiha Ejaz. "VPN Traffic Detection in SSL-Protected Channel." Security and Communication Networks 2019 (October 29, 2019): 1–17. http://dx.doi.org/10.1155/2019/7924690.

Full text
Abstract:
In recent times, secure communication protocols over web such as HTTPS (Hypertext Transfer Protocol Secure) are being widely used instead of plain web communication protocols like HTTP (Hypertext Transfer Protocol). HTTPS provides end-to-end encryption between the user and service. Nowadays, organizations use network firewalls and/or intrusion detection and prevention systems (IDPS) to analyze the network traffic to detect and protect against attacks and vulnerabilities. Depending on the size of organization, these devices may differ in their capabilities. Simple network intrusion detection sy
APA, Harvard, Vancouver, ISO, and other styles
40

Benyó, Balázs, Miklós Hatwágner, Tamás Heckenast, Katalin Kovács, Ágnes Varga, and Norbert Varjasi. "Design and Implementation of Enum-Based Services." JUCS - Journal of Universal Computer Science 12, no. (9) (2006): 1128–38. https://doi.org/10.3217/jucs-012-09-1128.

Full text
Abstract:
ENUM is a technology based on a procedure that assigns a sequence of traditional telephone numbers to Internet domain names. It specifies a rule that makes it possible to relate a domain to a telephone number without any risk of ambiguity. This domain can then be used to identify various communication services like fax, mobile phone numbers, voice-mail systems, e-mail addresses, IP telephone addresses, web pages, GPS coordinates, call diverts or unified messaging. In our paper we deal with three main problem areas in connection with the business model of the ENUM service and with the introduct
APA, Harvard, Vancouver, ISO, and other styles
41

Benkler, Yochai. "WikiLeaks and the protect-ip Act: A New Public-Private Threat to the Internet Commons." Daedalus 140, no. 4 (2011): 154–64. http://dx.doi.org/10.1162/daed_a_00121.

Full text
Abstract:
The WikiLeaks affair and proposed copyright bills introduced in the Senate are evidence of a new, extralegal path of attack aimed at preventing access and disrupting the payment systems and advertising of targeted sites. In this model, the attacker may be a government agency seeking to circumvent constitutional constraints on its power or a private company trying to enforce its interests beyond those afforded by procedural or substantive safeguards in the law. The vector of attack runs through the targeted site's critical service providers, disrupting technical services, such as Domain Name Sy
APA, Harvard, Vancouver, ISO, and other styles
42

Wang, Jiachen, Zhiping Li, Zhaoxin Zhang, Jian Chen, Chao Li, and Yanan Cheng. "Root Mirror Sites Identification and Service Area Analysis." Electronics 12, no. 7 (2023): 1737. http://dx.doi.org/10.3390/electronics12071737.

Full text
Abstract:
The operation of today’s Internet can only be achieved with the domain name system (DNS), and the essential part of the DNS is the root servers. Adding anycast mirrors has been used to maintain the security of root servers, but many problems accompany this technique. In this paper, we used 36198 probe points deployed worldwide to probe 1160 root mirror sites and analyzed the data with root mirrors’ identification and localization (RMIL). RMIL is a method to identify and locate root mirrors. It contains probing and analyzing the network services ID (NSID) and traceroute data to identify and loc
APA, Harvard, Vancouver, ISO, and other styles
43

Gao, Tianfu, and Qingkuan Dong. "DNS-BC: Fast, Reliable and Secure Domain Name System Caching System Based on a Consortium Blockchain." Sensors 23, no. 14 (2023): 6366. http://dx.doi.org/10.3390/s23146366.

Full text
Abstract:
The Domain Name System (DNS) is a fundamental component of the internet, responsible for resolving domain names into IP addresses. DNS servers are typically categorized into four types: recursive resolvers, root name servers, Top-Level Domain (TLD) name servers, and authoritative name servers. The latter three types of servers store actual records, while recursive resolvers do not store any real data and are only responsible for querying the other three types of servers and responding to clients. Recursive resolvers typically maintain a caching system to speed up response times, but these cach
APA, Harvard, Vancouver, ISO, and other styles
44

Sekhar, Sirish. "Serverless Deployment of a Next.js Application Using AWS." International Journal for Research in Applied Science and Engineering Technology 13, no. 6 (2025): 2617–20. https://doi.org/10.22214/ijraset.2025.72702.

Full text
Abstract:
This paper presents a practical and scalable approach to deploying a modern web application built with Next.js using Amazon Web Services (AWS) in a serverless environment. The deployment architecture incorporates AWS Amplify for frontend hosting and continuous integration/continuous deployment (CI/CD), Amazon Simple Notification Service (SNS) for programmatically sending emails from a contact form, and Route 53 for robust Domain Name System (DNS) management. We detail the configuration of each component, design rationale, and encountered challenges. The solution significantly reduces infrastru
APA, Harvard, Vancouver, ISO, and other styles
45

Babo, Winarto, and Metty Mustikasari. "EVALUATION OF MOBILE APPLICATION BPJSTKU USING COBIT 5 FRAMEWORK (STUDY CASE: BPJS KETENAGAKERJAAN)." International Journal of Engineering Technologies and Management Research 8, no. 7 (2021): 103–14. http://dx.doi.org/10.29121/ijetmr.v8.i7.2021.963.

Full text
Abstract:
BPJS as a social security to provides protection to all workers in Indonesian utilize especially mobile application in providing information and services to all BPJS customer anytime and anywhere without having to BPJS branch office. Beginning in 2019 BPJS has mobile application with the name as a continuation of BPJSTK Mobile has been made previously. The addition of new features and improvements to the mobile application apparently still provides problem and complaints from workers addressed to the BPJS branch office, BPJS complaints services, and BPJS contact center. For this reason, it’s n
APA, Harvard, Vancouver, ISO, and other styles
46

Vos, Rutger, Jordan Biserkov, Bachir Balech, et al. "Enriched biodiversity data as a resource and service." Biodiversity Data Journal 2 (June 16, 2014): e1125. https://doi.org/10.3897/BDJ.2.e1125.

Full text
Abstract:
Background: Recent years have seen a surge in projects that produce large volumes of structured, machine-readable biodiversity data. To make these data amenable to processing by generic, open source "data enrichment" workflows, they are increasingly being represented in a variety of standards-compliant interchange formats. Here, we report on an initiative in which software developers and taxonomists came together to address the challenges and highlight the opportunities in the enrichment of such biodiversity data by engaging in intensive, collaborative software development: The Biodiversity Da
APA, Harvard, Vancouver, ISO, and other styles
47

Firdausillah, Fahri, Muhammad Hafidz, Erika Devi Udayanti, and Etika Kartikadarma. "Sistem Deteksi Surel SPAM Dengan DNSBL Dan Support Vector Machine Pada Penyedia Layanan Mail Marketing." Journal of Information System Research (JOSH) 3, no. 4 (2022): 618–25. http://dx.doi.org/10.47065/josh.v3i4.1795.

Full text
Abstract:
Mail marketing is an effective communication medium for users and internet providers. Many companies use email as a mean of communication with customers to ensure customers are not left behind with the latest information, and at once provide personalized offers to specific customers. However, not all emails that are sent reach mail inbox as expected. There are several factors as the cause including content that does not comply with the writing rules and tends to have SPAM signatures, invalid e-mail addresses, the sender domains are registered in the blacklist and so forth. Mail marketing servi
APA, Harvard, Vancouver, ISO, and other styles
48

Chen, Hong Ming, Hui Zhang, and Da Feng Shen. "Research of the DNS Server Deployment in Multi-Export Network." Applied Mechanics and Materials 475-476 (December 2013): 915–19. http://dx.doi.org/10.4028/www.scientific.net/amm.475-476.915.

Full text
Abstract:
Most of college campus network to access the CERNET and CHINANET and CNC, respectively, more than export way access to the Internet. How to effectively use more export resources, improve the network speed and reliability aspects worthy of in-depth study, etc. In this paper, a model of campus network, combined with DNS service program of the new features and rational deployment of how many export server in the network domain name, put forward a reasonable solution.
APA, Harvard, Vancouver, ISO, and other styles
49

Widyaningsih, Pipin, and Intan Oktaviani. "Induksi Teknologi Informasi Untuk Penguatan Usaha “Hasbuna Catering” Pada Masa Pandemi Covid 2019." Duta Abdimas 1, no. 1 (2022): 1–6. http://dx.doi.org/10.47701/abdimas.v1i1.1581.

Full text
Abstract:
Community service activities are carried out by implementing a company profile website and making business license for Hasbuna Catering Surakarta. The community service partner is "Hasbuna Catering" which is located at Perumahan Garden Vista B-7 Gang Jambu Gebyok RT.03 RW.05 Kelurahan Ngemplak, Kartasura, Sukoharjo. Community service activities are divided into three stages, namely (1) Preparation Stage; (2) Implementation Stage; (3) Mentoring Stage.Preparation stage includes discussion with partners regarding problems and expectations desired by partners. The company profile website process i
APA, Harvard, Vancouver, ISO, and other styles
50

Pattiwar, Shravan Kumar, and Harish Ballu. "Improved way of Content Delivery Network Management with Authenticated Delegation Service." International Journal of Trend in Scientific Research and Development 3, no. 1 (2018): 1250–68. https://doi.org/10.31142/ijtsrd20218.

Full text
Abstract:
Content Delivery Network CDN and Hypertext Transfer Protocol Secure HTTPS are two prominent however free web advances, every one of which has been very much concentrated exclusively and autonomously. This paper gives a precise report on how these two cooperate. We inspected 20 prominent CDN suppliers and 10,721 of their client sites utilizing HTTPS. Our investigation uncovers different issues with the present HTTPS practice received by CDN suppliers, for example, broad utilization of invalid authentications, private key sharing, ignored renouncement of stale endorsements, and shaky back end co
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!