Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications by Scott Rose

Search Title, Abstract, Conference, Citation, Keyword or Author
Displaying 1 - 25 of 26

Zero Trust Architecture

Author(s)
Scott W. Rose, Oliver Borchert, Stuart Mitchell, Sean Connelly
Zero trust (ZT) is the term for an evolving set of cybersecurity paradigms that move defenses from static, network- based perimeters to focus on users, assets

Trustworthy Email

Author(s)
Scott W. Rose, J. S. Nightingale, Simson Garfinkel, Ramaswamy Chandramouli
This document gives recommendations and guidelines for enhancing trust in email. The primary audience includes enterprise email administrators, information

Evolution and Challenges of DNS-Based CDNs

Author(s)
Zheng Wang, Scott W. Rose
DNS-based server redirecting has been realized as the most popular way to deploy CDNs. However, with the increasing use of remote DNS, DNS-based CDNs faces a

Energy-Aware Server Allocating

Author(s)
Zheng Wang, Scott W. Rose
Faced with the scalability and reliability challenge, the DNS is increasingly operated by geographically dispersed data centers. Energy management across those

Improving the Trustworthiness of E-Mail, and Beyond!

Author(s)
Scott W. Rose, Larry Feldman, Gregory A. Witte
This bulletin summarizes the information found in NIST SP 1800-6: Domain Name System-Based Electronic Mail Security, which describes a security platform for

Domain Name System-Based Electronic Mail Security

Author(s)
Scott W. Rose, Karen M. Waltermire, Santos Jha, Chinedum Irrechukwu, William C. Barker
This document describes a security platform for trustworthy email exchanges across organizational boundaries. The project includes reliable authentication of

Updating the Keys for DNS Security

Author(s)
Scott W. Rose, Larry Feldman, Gregory A. Witte
To help maintain the reliability and integrity of the Internet’s Domain Name System (DNS), NIST is working with specialists from around the world to update the

Making Email Trustworthy

Author(s)
Scott W. Rose, Larry Feldman, Gregory A. Witte
This bulletin summarizes the information presented in NIST SP 800-177: Trustworthy Email. This publication gives recommendations and guidelines for enhancing

Trustworthy Email

Author(s)
Ramaswamy Chandramouli, Simson L. Garfinkel, J. S. Nightingale, Scott W. Rose
This document gives recommendations and guidelines for enhancing trust in email. The primary audience includes enterprise email administrators, information

Trust Issues with Opportunistic Encryption

Author(s)
Scott W. Rose
Recent revelations have shed light on the scale of eavesdropping on Internet traffic; violating the privacy of almost every Internet user. In response, protocol

Secure Domain Name System (DNS) Deployment Guide

Author(s)
Ramaswamy Chandramouli, Scott W. Rose
The Domain Name System (DNS) is a distributed computing system that enables access to Internet resources by user-friendly domain names rather than IP addresses

Information Leakage Through the Domain Name System

Author(s)
Scott W. Rose, Anastase Nakassis, Ramaswamy Chandramouli
The Domain Name System (DNS) is the global lookup service for network resources. It is often the first step in an Internet transaction as well as a network

Open Issues in Secure DNS Deployment

Author(s)
Ramaswamy Chandramouli, Scott W. Rose
This paper describes some practical administrative issues and challenges in the deployment of DNSSEC - an IETF specified suite of security measures for securing

Minimizing Information Leakage in the DNS

Author(s)
Scott W. Rose, Anastase Nakassis
The Domain Name System (DNS) is the global lookup service for network resources. To protect DNS information, the DNS Security Extensions (DNSSEC) has been

Integrity Checking of DNS Zone File Data Using XSLT

Author(s)
Ramaswamy Chandramouli, Scott W. Rose
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the

Integrity Checking of DNS Zone File Data Using XSLT

Author(s)
Ramaswamy Chandramouli, Scott W. Rose
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the

DNS Security Introduction and Requirements, RFC 4033

Author(s)
R Arends, R Austein, M Larson, Daniel Massey, Scott W. Rose
The Domain Name System Security Extensions (DNSSEC) add data origin authentication and data integrity to the Domain Name System. This document introduces these

Resource Records for the DNS Security Extensions, RFC 4034

Author(s)
R Arends, R Austein, M Larson, Daniel Massey, Scott W. Rose
This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of resource