Skip to main content

IAB Workshop: Design Expectations vs Deployment Reality in Protocol Development (dedrws)

Slides

Title Abstract Curr. rev. Date Last presented On agenda
Rolling Forward: An Outlook on Future Root Rollovers Moritz Müller, Rolling Forward: An Outlook on Future Root Rollovers 00 2023-02-07
Concentration is a business model Christian Huitema, Concentration is a business model 00 2023-02-07
We’re gonna need a bigger threat model Stephen Farrell, We’re gonna need a bigger threat model 00 2023-02-07
Limited Domains and Internet Protocols Brian Carpenter, Bing Liu, Limited Domains and Internet Protocols 00 2023-02-07
Where/Why has DNS gone wrong? Jim Reid, Where/Why has DNS gone wrong? 00 2023-02-07
Privacy, Jurisdiction, and the Health of the Internet John Mattsson, Privacy, Jurisdiction, and the Health of the Internet 00 2023-02-07
WiFi authentication: Some deployment observations from eduroam Carsten Bormann, Jan-Frederik Rieckers, WiFi authentication: Some deployment observations from eduroam 00 2023-02-07
Protocol Design Assumptions and PEPs Jörg Ott, Protocol Design Assumptions and PEPs 00 2023-02-07
Great Expectations: Protocol Design and Socioeconomic Realities Dirk Kutscher, Great Expectations: Protocol Design and Socioeconomic Realities 00 2023-02-07
DNS, side effects and concentration Julien Maisonneuve, DNS, side effects and concentration 00 2023-02-07
Some challenges with IP multicast deployment Lucas Pardue, Some challenges with IP multicast deployment 00 2023-02-07
IoT Security and the role of Manufacturers: A Story of Unrealistic Design Expectations Mohit Sethi, Tuomas Aura, IoT Security and the role of Manufacturers: A Story of Unrealistic Design Expectations 00 2023-02-07
How the Internet Was Won and Where It Got Us Vittorio Bertola, How the Internet Was Won and Where It Got Us 00 2023-02-07
The Devil is in the Deployment Phillip Hallam-Baker, The Devil is in the Deployment 00 2023-02-07
Three kinds of concentration in open protocols Andrew Sullivan, Three kinds of concentration in open protocols 00 2023-02-07
Instant Messaging and Presence: A Cautionary Tale Ted Hardie, Instant Messaging and Presence: A Cautionary Tale 00 2023-02-07
Changes in the Internet Threat Model Jari Arkko, Changes in the Internet Threat Model 00 2023-02-07
Encouraging better deployments Stéphane Bortzmeyer, Encouraging better deployments 00 2023-02-07
The Border Gateway Protocol, 25 years on Geoff Huston, The Border Gateway Protocol, 25 years on 00 2023-02-07
Don’t Forget the Access Network Alissa Cooper, Don’t Forget the Access Network 00 2023-02-07
Realities in DNSSEC Depployment Paul Hoffman, Realities in DNSSEC Depployment 00 2023-02-07