Home»Activities»Workshops»Design Expectations vs. Deployment Reality in Protocol Development Workshop 2019»Position Papers: DEDR Workshop
- Paul Hoffman, Realities in DNSSEC Depployment
- Alissa Cooper, Don’t Forget the Access Network
- Geoff Huston, The Border Gateway Protocol, 25 years on
- Stéphane Bortzmeyer, Encouraging better deployments
- Jari Arkko, Changes in the Internet Threat Model
- Ted Hardie, Instant Messaging and Presence: A Cautionary Tale
- Andrew Sullivan, Three kinds of concentration in open protocols
- Phillip Hallam-Baker, The Devil is in the Deployment
- Vittorio Bertola, How the Internet Was Won and Where It Got Us
- Mohit Sethi, Tuomas Aura, IoT Security and the role of Manufacturers: A Story of Unrealistic Design Expectations
- Lucas Pardue, Some challenges with IP multicast deployment
- Julien Maisonneuve, DNS, side effects and concentration
- Dirk Kutscher, Great Expectations: Protocol Design and Socioeconomic Realities
- Jörg Ott, Protocol Design Assumptions and PEPs
- Carsten Bormann, Jan-Frederik Rieckers, WiFi authentication: Some deployment observations from eduroam
- John Mattsson, Privacy, Jurisdiction, and the Health of the Internet
- Jim Reid, Where/Why has DNS gone wrong?
- Brian Carpenter, Bing Liu, Limited Domains and Internet Protocols
- Stephen Farrell, We’re gonna need a bigger threat model
- Christian Huitema, Concentration is a business model
- Moritz Muller, Rolling Forward: An Outlook on Future Root Rollovers