Academic literature on the topic 'Client application for Domain Name System'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Client application for Domain Name System.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Client application for Domain Name System"

1

Ma, Liang, and Xiaole Zhao. "Research on the multi-terminal adapting Web system construction." MATEC Web of Conferences 232 (2018): 01028. http://dx.doi.org/10.1051/matecconf/201823201028.

Full text
Abstract:
Among the various applying patterns of Internet programs, the Web system based on B/S architecture has the congenital advantage of cross platform. The same application could be accessed via the same domain name with any operating system, as long as the client-side software (browser) is installed. Thus, in the development of Internet application, if the function could meet the requirement, the Web system construction should be given the top priority. With the wide development of information technology, such as intelligent terminal, mobile interconnection and cloud computing, how to construct the Web system which could adapt to multi terminals is deserving of research. Based on a systematical and comprehensive investigation, this article aims to explore feasible ways to construct the multi-terminal adapting Web system catering to the current social concern, through feasibility analysis of prototype design.
APA, Harvard, Vancouver, ISO, and other styles
2

Yunianta, Arda, Norazah Yusof, Arif Bramantoro, Haviluddin Haviluddin, Mohd Shahizan Othman, and Nataniel Dengen. "Data mapping process to handle semantic data problem on student grading system." International Journal of Advances in Intelligent Informatics 2, no. 3 (December 1, 2016): 157. http://dx.doi.org/10.26555/ijain.v2i3.84.

Full text
Abstract:
Many applications are developed on education domain. Information and data for each application are stored in distributed locations with different data representations on each database. This situation leads to heterogeneity at the level of integration data. Heterogeneity data may cause many problems. One major issue is about the semantic relationships data among applications on education domain, in which the learning data may have the same name but with a different meaning, or learning data that has a different name with same meaning. This paper discusses on semantic data mapping process to handle semantic relationships problem on education domain. There are two main parts in the semantic data mapping process. The first part is the semantic data mapping engine to produce data mapping language with turtle (.ttl) file format as a standard XML file schema, that can be used for Local Java Application using Jena Library and Triple Store. The Turtle file contains detail information about data schema of every application inside the database system. The second part is to provide D2R Server that can be accessed from outside environment using HTTP Protocol. This can be done using SPARQL Clients, Linked Data Clients (RDF Formats) and HTML Browser. To implement the semantic data process, this paper focuses on the student grading system in the learning environment of education domain. By following the proposed semantic data mapping process, the turtle file format is produced as a result of the first part of the process. Finally, this file is used to be combined and integrated with other turtle files in order to map and link with other data representation of other applications.
APA, Harvard, Vancouver, ISO, and other styles
3

Khudoyberdiev, Jin, and Kim. "A Novel Approach towards Resource Auto-Registration and Discovery of Embedded Systems Based on DNS." Electronics 8, no. 4 (April 17, 2019): 442. http://dx.doi.org/10.3390/electronics8040442.

Full text
Abstract:
The Internet of Things (IoT) is expected to deliver a whole range of new services to all parts of our society, and improve the way we work and live. The challenges within the Internet of Things are often related to interoperability, device resource constraints, a device to device connection and security. One of the essential elements of identification for each Internet of Things devices is the naming system and addresses. With this naming system, Internet of Things devices can be able to be discoverable by users. In this paper, we propose the IoT resource auto-registration and accessing indoor services based on Domain Name System (DNS) in the Open Connectivity Foundation (OCF) environment. We have used the Internet of Things Platform and DNS server for IoT Resource auto-registration and discovery in the Internet Protocol version 4 (IPv4). An existing system called Domain Name Auto-Registration in Internet Protocol version 6 can be used for Internet of Things devices for auto-registration and resource discovery. However, this system is not acceptable in the existing internet networks, because the highest percentage of the networks on the Internet are configured in Internet Protocol version 4. Through the proposed auto-registration system, clients can be able to discover the resources and access the services in the OCF network. Constrained Application Protocol (CoAP) is utilized for the IoT device auto-registration and accessing the services in the OCF network.
APA, Harvard, Vancouver, ISO, and other styles
4

Victors, Jesse, Ming Li, and Xinwen Fu. "The Onion Name System." Proceedings on Privacy Enhancing Technologies 2017, no. 1 (January 1, 2017): 21–41. http://dx.doi.org/10.1515/popets-2017-0003.

Full text
Abstract:
Abstract Tor onion services, also known as hidden services, are anonymous servers of unknown location and ownership that can be accessed through any Torenabled client. They have gained popularity over the years, but since their introduction in 2002 still suffer from major usability challenges primarily due to their cryptographically-generated non-memorable addresses. In response to this difficulty, in this work we introduce the Onion Name System (OnioNS), a privacy-enhanced decentralized name resolution service. OnioNS allows Tor users to reference an onion service by a meaningful globally-unique verifiable domain name chosen by the onion service administrator.We construct OnioNS as an optional backwards-compatible plugin for Tor, simplify our design and threat model by embedding OnioNS within the Tor network, and provide mechanisms for authenticated denial-of-existence with minimal networking costs. We introduce a lottery-like system to reduce the threat of land rushes and domain squatting. Finally, we provide a security analysis, integrate our software with the Tor Browser, and conduct performance tests of our prototype.
APA, Harvard, Vancouver, ISO, and other styles
5

Xiao, Yu Zhi. "On the Research of Internet Equipment Naming Methods." Advanced Materials Research 664 (February 2013): 1021–27. http://dx.doi.org/10.4028/www.scientific.net/amr.664.1021.

Full text
Abstract:
This paper analyzes the content of Internet naming problems as well as the current exist problems .We discuss the namespace and the major technologies, and then elaborating the important thinking on research of naming problems detailed and propose development direction in the future. In the paper, we propose a new method for devices naming due to the issues that exist in the Internet naming. Using this technical, it can solve the problem of the extremely scarce IPv4 and the IP address changed frequently on Internet devices. Equipment naming scheme has five major components: equipment name registered server, equipment communication server and client domain name server and client communication agency, the client login and configuration. It is a pattern in which the mobile device uses configured client software to issue a request to NG-DNS (new generation domain system).we have analyze on the realization of the key technology on the windows system. It has realized communication among equipments which are mobile, wireless, dynamic IP address, and hidden NAT and firewall. The method can be extended entry of Android devices.
APA, Harvard, Vancouver, ISO, and other styles
6

Ji, Hong. "Research on Design and Security Strategy of DNS." Applied Mechanics and Materials 378 (August 2013): 510–13. http://dx.doi.org/10.4028/www.scientific.net/amm.378.510.

Full text
Abstract:
DNS service plays a very important role in the Internet; each host must pass it to query the IP address of the destination host, and can communicate with each other. DNS uses a distributed database structure and server/client mode, which is stored domain name in the server and allowed a client to access the required data. DNS can resolve the host name to the corresponding IP address, while it also can resolve IP address to a host name. With the development of information technology, the network attacks become more and more frequent occurrence in the Internet. So DNS system has suffered a series of attacks frequently, and the communication is severely affected in the Internet. Therefore, the security problems of DNS are increasingly concerned about. The paper describes the composition, features and working principle of DNS system. According to the security risks of the system, it proposes the corresponding security strategy and designs a reliable and safe DNS.
APA, Harvard, Vancouver, ISO, and other styles
7

Díaz-Sánchez, Daniel, Andrés Marín-Lopez, Florina Almenárez Mendoza, and Patricia Arias Cabarcos. "DNS/DANE Collision-Based Distributed and Dynamic Authentication for Microservices in IoT †." Sensors 19, no. 15 (July 26, 2019): 3292. http://dx.doi.org/10.3390/s19153292.

Full text
Abstract:
IoT devices provide real-time data to a rich ecosystem of services and applications. The volume of data and the involved subscribe/notify signaling will likely become a challenge also for access and core networks. To alleviate the core of the network, other technologies like fog computing can be used. On the security side, designers of IoT low-cost devices and applications often reuse old versions of development frameworks and software components that contain vulnerabilities. Many server applications today are designed using microservice architectures where components are easier to update. Thus, IoT can benefit from deploying microservices in the fog as it offers the required flexibility for the main players of ubiquitous computing: nomadic users. In such deployments, IoT devices need the dynamic instantiation of microservices. IoT microservices require certificates so they can be accessed securely. Thus, every microservice instance may require a newly-created domain name and a certificate. The DNS-based Authentication of Named Entities (DANE) extension to Domain Name System Security Extensions (DNSSEC) allows linking a certificate to a given domain name. Thus, the combination of DNSSEC and DANE provides microservices’ clients with secure information regarding the domain name, IP address, and server certificate of a given microservice. However, IoT microservices may be short-lived since devices can move from one local fog to another, forcing DNSSEC servers to sign zones whenever new changes occur. Considering DNSSEC and DANE were designed to cope with static services, coping with IoT dynamic microservice instantiation can throttle the scalability in the fog. To overcome this limitation, this article proposes a solution that modifies the DNSSEC/DANE signature mechanism using chameleon signatures and defining a new soft delegation scheme. Chameleon signatures are signatures computed over a chameleon hash, which have a property: a secret trapdoor function can be used to compute collisions to the hash. Since the hash is maintained, the signature does not have to be computed again. In the soft delegation schema, DNS servers obtain a trapdoor that allows performing changes in a constrained zone without affecting normal DNS operation. In this way, a server can receive this soft delegation and modify the DNS zone to cope with frequent changes such as microservice dynamic instantiation. Changes in the soft delegated zone are much faster and do not require the intervention of the DNS primary servers of the zone.
APA, Harvard, Vancouver, ISO, and other styles
8

Zhang, Chen Guang, Yu Lan Zhao, Feng Xian Jiang, and Chao Ji. "The Research and Application of Short Message Name and Address System." Advanced Materials Research 225-226 (April 2011): 1008–11. http://dx.doi.org/10.4028/www.scientific.net/amr.225-226.1008.

Full text
Abstract:
With the rapid development of mobile communication technology, the short message name and address system [1] has been developed swiftly nowadays. We make the short message to be a kind of carrier, for delivering the requirements which clients required and return the answers which clients seek for. This paper contains such contents as follows based on the research of the system: analyzing the problems and defections existed in the system, enhancing the transfer mode to be a standard way, and improving the efficiency of data query and transfer. Taking advantages of the superiority of this system and innovate on the technology, we have completed a business software based on J2ME platform[2-7].In the research and development process we designed client-side functions and structural model combined with some functions used on the mobile phones, accordingly, the system technology has been practiced to some extents. And we optimize the software interface by a third party plug-in board called the “polish”, this work must will provide far-reaching significance for later research on this technology.
APA, Harvard, Vancouver, ISO, and other styles
9

Bein, Adrian Sean, and Alexander Williams. "Networking IP Restriction filtering and network address." IAIC Transactions on Sustainable Digital Innovation (ITSDI) 1, no. 2 (April 30, 2020): 172–77. http://dx.doi.org/10.34306/itsdi.v1i2.149.

Full text
Abstract:
Permissions setting on a computer is necessary. This is an effort that is not easy to change the system configuration or settings changed by the user. With a network of computers, of course, permissions settings do not need to be done one by one manually. Because in a computer network course there are many collections of computers connected together. Permissions setting so that the system can use the client-server applications that access restrictions can be done effectively. As the implementation of client-server applications can be created using Visual Basic 6.0. This language has been able to access the socket on the Windows operating system, named Winsock API that supports TCP / IP. This protocol is widely used because of the reliability of client-server application programming. The application is divided into two main applications, namely the client and server program name with the name of the Receiver Sender program. Receiver function receives instructions restriction of access rights Sender and sends reports to the Sender process execution. While Sender functions to send instructions restrictions permissions via the Registry to the Receiver. And after the test, the application can block important features available in the Windows operating system. So it is expected that these applications can help in permissions setting on a computer network.
APA, Harvard, Vancouver, ISO, and other styles
10

Jia, Bin. "The Research and Application of Short Message Name and Address Technology." Applied Mechanics and Materials 432 (September 2013): 571–74. http://dx.doi.org/10.4028/www.scientific.net/amm.432.571.

Full text
Abstract:
This paper contains such contents as follows based on the research of the system: analyzing the problems and defections existed in the system, enhancing the transfer mode to be a standard way, and improving the efficiency of data query and transfer. Take advantages of the superiority of this system and innovates on the technology, we have completed a business software based on J2ME platform [1-.In the research and develop process we designed client-side functions and structural model combined with some functions used on the mobile phones, accordingly, the system technology has been practiced to some extents. And we optimize the software interface by a third party plug-in board called the polish [7-, this work must will provide far-reaching significance for later work on this technology.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Client application for Domain Name System"

1

Biolek, Martin. "Klientská aplikace protokolu DNS s grafickým rozhraním pro účely výuky." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2021. http://www.nusl.cz/ntk/nusl-442404.

Full text
Abstract:
The goal of the Master thesis on the topic of the Client application of DNS protocol with graphical interface for teaching purposes is to create a program with the features of sending, receiving DNS, MDNS and LLMNR protocols with optional parameters. Additionally, compare the created application with available tools such as Nslookup, Dig and create examples of application for teaching.
APA, Harvard, Vancouver, ISO, and other styles
2

Scarlato, Michele. "Sicurezza di rete, analisi del traffico e monitoraggio." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3223/.

Full text
Abstract:
Il lavoro è stato suddiviso in tre macro-aree. Una prima riguardante un'analisi teorica di come funzionano le intrusioni, di quali software vengono utilizzati per compierle, e di come proteggersi (usando i dispositivi che in termine generico si possono riconoscere come i firewall). Una seconda macro-area che analizza un'intrusione avvenuta dall'esterno verso dei server sensibili di una rete LAN. Questa analisi viene condotta sui file catturati dalle due interfacce di rete configurate in modalità promiscua su una sonda presente nella LAN. Le interfacce sono due per potersi interfacciare a due segmenti di LAN aventi due maschere di sotto-rete differenti. L'attacco viene analizzato mediante vari software. Si può infatti definire una terza parte del lavoro, la parte dove vengono analizzati i file catturati dalle due interfacce con i software che prima si occupano di analizzare i dati di contenuto completo, come Wireshark, poi dei software che si occupano di analizzare i dati di sessione che sono stati trattati con Argus, e infine i dati di tipo statistico che sono stati trattati con Ntop. Il penultimo capitolo, quello prima delle conclusioni, invece tratta l'installazione di Nagios, e la sua configurazione per il monitoraggio attraverso plugin dello spazio di disco rimanente su una macchina agent remota, e sui servizi MySql e DNS. Ovviamente Nagios può essere configurato per monitorare ogni tipo di servizio offerto sulla rete.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Client application for Domain Name System"

1

Bettinger, Torsten, and Allegra Waddell, eds. Domain Name Law And Practice. Oxford University Press, 2015. http://dx.doi.org/10.1093/oso/9780199663163.001.0001.

Full text
Abstract:
An established authority in the field, this work provides comprehensive analysis of the law and practice relating to internet domain names at an international level, combined with a detailed survey of the 36 most important domain name jurisdictions worldwide, including the US, UK, Germany, France, Italy, Netherlands, Japan, China, Singapore, Russia, Canada, and Australia, and new chapters on Israel, Mexico, South Korea, Brazil, Colombia, Portugal, and South Africa. The survey includes extensive country-by-country analysis of how domain names relate to existing trade mark law, and upon the developing case law in the field, as well as the alternative dispute resolution procedures. In its second edition, this work analyses, in depth, key developments in the field including ICANN's new gTLD program. The program, introducing more than 700 new top-level domains, will have far-reaching consequences for brand name industries worldwide and for usage of the internet. The complicated application process is considered in detail as well as filing and review procedures, the delegation process, the role and function of the Trademark Clearing House and the Sunrise and Trademark Claims Services, dispute resolution, and new rights protection mechanisms. Other developments covered include new registration processes such as the use of privacy and proxy services, as well as the expansion of the scope of internationalized domain names, including the addition of a number of generic top-level domains such as “.tel” and “.travel”. Also considered are developments relating to the Uniform Domain Name Dispute Resolution Policy (UDRP) in terms of the nature of cases seen under the Policy and the number of cases filed, as well as the recent paperless e-UDRP initiative. The Uniform Rapid Suspension System, working alongside the UDRP in the new gTLD space, is also discussed in a new chapter on this process. Giving detailed information about the registration of domain names at national, regional and international levels, analysis of the dispute resolution processes at each of those levels, and strategic guidance on how to manage domain names as part of an overall brand strategy, this leading work in international domain name law is essential reading for practitioners in the field.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Client application for Domain Name System"

1

Wagner, Roland, Franz Gruber, and Werner Hartmann. "Distribution Patterns for Mobile Internet Applications." In Mobile Computing, 459–72. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-054-7.ch039.

Full text
Abstract:
After the enormous success of the internet and mobile networks, the next upcoming boost for information technology will be the combination of both. But developing applications for this domain is challenging, because first, most mobile devices provide only small memory and processor footprints, prohibiting resource intensive code at client side and second, mobile networks offer only limited bandwidth, and the probability to connection losses is relatively high compared to wired networks. Selecting the appropriate software architecture in terms of distributing the functionality of the system between server and client device is crucial. Application distribution patterns, known from conventional system development, are analysed for their applicability for the mobile environment. After the more abstract analysis of the patterns, the IP multimedia subsystem (IMS) which is part of the current specification of 3G mobile networks is introduced and its support for different application distribution patterns is examined.
APA, Harvard, Vancouver, ISO, and other styles
2

"Networking Fundamentals." In Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention, 106–18. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7628-0.ch004.

Full text
Abstract:
This chapter introduces to basics of computer networking and associated widely used essential networking communication protocols. The chapter provides the comparison of OSI and TCP model along with details of internet layer protocols including internet protocol (IP), IP addressing schemes, internet control messaging protocol (ICMP), etc. Next, the chapter discusses transport layer protocols transmission control protocol (TCP) and user datagram protocol (UDP) in detail. Application layer protocols including dynamic host control protocol (DHCP), secure shell (SSH), file transfer protocol (FTP), trivial FTP (TFTP), simple network management protocol (SNMP), hyper text transfer protocol secure (HTTPS), network time protocol (NTP), domain name system (DNS), and simple mail transfer protocol (SMTP) are also explained in this chapter. One just cannot attack a networking protocol without knowing how it works. Having a solid introduction about computer networking and network protocols is fundamental in the ethical hacking world. This chapter quickly revisits all essential concepts related to computer networking.
APA, Harvard, Vancouver, ISO, and other styles
3

Ouedraogo, Moussa, Haralambos Mouratidis, Eric Dubois, and Djamel Khadraoui. "Security Assurance Evaluation and IT Systems’ Context of Use Security Criticality." In Mobile and Handheld Computing Solutions for Organizations and End-Users, 70–91. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2785-7.ch005.

Full text
Abstract:
Today’s IT systems are ubiquitous and take the form of small portable devices, to the convenience of the users. However, the reliance on this technology is increasing faster than the ability to deal with the simultaneously increasing threats to information security. This paper proposes metrics and a methodology for the evaluation of operational systems security assurance that take into account the measurement of security correctness of a safeguarding measure and the analysis of the security criticality of the context in which the system is operating (i.e., where is the system used and/or what for?). In that perspective, the paper also proposes a novel classification scheme for elucidating the security criticality level of an IT system. The advantage of this approach lies in the fact that the assurance level fluctuation based on the correctness of deployed security measures and the criticality of the context of use of the IT system or device, could provide guidance to users without security background on what activities they may or may not perform under certain circumstances. This work is illustrated with an application based on the case study of a Domain Name Server (DNS).
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Client application for Domain Name System"

1

Falkner, Nickolas J. G., Paul D. Coddington, and Andrew L. Wendelborn. "Using Ontologies to Support Customisation and Maintain Interoperability in Distributed Information Systems with Application to the Domain Name System." In Second International Conference on Semantics, Knowledge, and Grid (SKG 2006). IEEE, 2006. http://dx.doi.org/10.1109/skg.2006.109.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Xiong, Ting, Shaojin Fu, Xiaochun Luo, and Tao Xie. "LEA-DNS: DNS Resolution Validity and Timeliness Guarantee Local Authentication Extension with Public Blockchain." In 2nd International Conference on Blockchain and Internet of Things (BIoT 2021). AIRCC Publishing Corporation, 2021. http://dx.doi.org/10.5121/csit.2021.110801.

Full text
Abstract:
While the Domain Name System (DNS) is an infrastructure of the current network, it still faces the problem of centralization and data authentication according to its concept and practice. Decentralized storage of domain names and user local verification using blockchain may be effective solutions. However, since the blockchain is an add-only type database, domain name changes will cause out of date records to still be correct when using the Simplified Payment Verification (SPV) mechanism locally. This paper mainly introduces Local Enhanced Authentication DNS (LEA-DNS), which allows domain names to be stored in public blockchain database to provide decentralization feature and is compatible with the existing DNS. It achieves the validity and timeliness of local domain name resolution results to ensure correct and up to date with the Merkle Mountain Range and RSA accumulator technologies. Experiments show that less than 3.052Kb is needed for each DNS request to be validated, while the validation time is negligible, and only 9.44Kb of data need to be stored locally by the web client. Its compatibility with the existing DNS system and the lightness of the validation protocols indicate that this is a system suitable for deployment widely.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Client application for Domain Name System"

1

Taylor, Curtis R., and Craig A. Shue. Using the Domain Name System to Thwart Automated Client-Based Attacks. Office of Scientific and Technical Information (OSTI), September 2011. http://dx.doi.org/10.2172/1024283.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography