@techreport{lewis-dnssig-authorization-00, number = {draft-lewis-dnssig-authorization-00}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-lewis-dnssig-authorization/00/}, author = {Ólafur Guðmundsson and Edward P. Lewis}, title = {{DNSSEC Signature and Data Verification Semantics}}, pagetotal = 12, year = 1997, month = dec, day = 4, abstract = {This draft discusses authorization models for DNSSEC that can be used to determine the relationship of a KEY RR and a DNS RRset in the validation process. Is this key trusted to sign for this data? Is this data trusted because it was signed by this key? This draft defines a number of different policies that can be used and what the signing authority of keys are in each. This draft also addresses what steps are recommended in the secure DNS resolution process and how the authorization policy is put to use. The ideas and definitions expressed here are based on the authors experience in implementing a reference secure resolver.}, }