Melinda Shore

Melinda Shore

Two Rivers, Alaska, United States
557 followers 500+ connections

About

Experienced security and middleware architect and researcher with a particular focus on…

Activity

Join now to see all activity

Experience

  • Retired

  • -

    Two Rivers, Alaska

  • -

  • -

  • -

    Two Rivers, AK

  • -

    Two Rivers, Alaska

  • -

    Two Rivers, AK

  • -

  • -

  • -

  • -

  • -

  • -

  • -

  • -

Education

Licenses & Certifications

  • CISSP

    (ISC)2

    Issued Expires
    Credential ID 357437

Publications

  • A DANE Record and DNSSEC Authentication Chain Extension for TLS

    Internet draft

    This draft describes a new TLS extension for transport of a DNS
    record set serialized with the DNSSEC signatures needed to
    authenticate that record set. The intent of this proposal is to
    allow TLS clients to perform DANE authentication of a TLS server
    certificate without needing to perform additional DNS record
    lookups. It will typically not be used for general DNSSEC
    validation of TLS endpoint names.

    Other authors
    See publication
  • RFC 7279: An Acceptable Use Policy for New ICMP Types and Codes

    IETF (Best Current Practice)

    In this document we provide a basic description of ICMP's role in the IP stack and some guidelines for future use.

    This document is motivated by concerns about lack of clarity concerning when to add new Internet Control Message Protocol (ICMP) types and/or codes. These concerns have highlighted a need to describe policies for when adding new features to ICMP is desirable and when it is not.

    See publication
  • GPS Trackers

    Mushing Magazine

  • Network-Layer Signaling: Transport Layer

    Internet draft

    Other authors
    • David McGrew
    • Kaushik Biswas
  • An EME Signaling Protocol Design

    Internet draft

    Other authors
    • Paul Francis
    • Saikat Guha
    • Scott Brim
  • A STUN-Based Signaling Framework

    Internet draft

  • Architecture for Reliable Server Pooling

    Internet draft

    Other authors
    • M Tuexen
    • Q Xie
    • R Stewart
    • L Ong
    • J Loughney
    • M Stillman
  • Establishing Reachability Behind NATs

    Internet draft

  • Talking to Stuff in the Network: Midcom Communication Models

    Internet draft

  • Communicating with Transport Intermediaries: Discussion and Framework

    Internet draft

  • The NSIS Transport Layer Protocol (NTLP)

    Internet draft

  • The TIST (Topology-Insensitive Service Traversal) Protocol

    Internet draft

  • Middlebox Communications (midcom) Protocol Requirements, RFC 3304

    IETF

    Other authors
    • RP Swale
    • PA Mart
    • P Sijben
    • S Brim
  • Towards a Network Friendlier Midcom

    Internet draft

  • Requirements for Reliable Server Pooling, RFC 3237

    IETF

    Other authors
    • M Tuexen
    • Q Xie
    • R Stewart
    • L Ong
    • J Loughney
    • M Stillman
  • Application Considerations for Midcom Middleboxes,

    Internet drafts

  • H.323 and Firewalls: Problem Statement and Solution Framework

    Internet draft

  • IP Telephony: Architectures and Protocol

    Usenix Conference Invited Speakers Track

  • Cells In Frames: ATM Over Legacy Networks

    IEEE International Conference on ATM

    Other authors
    • Tom Parker
    • Joy Veronneau
  • Workstation Telephony

    Usenix Association WIP Track

  • 2.6 MSD Implementation Overview

    BSD Workshop, Boulder, CO

  • Release and User Environment Engineering for Mach 2.5

    Open Software Foundation Mach Development Workshop

  • Advanced DNS Services for Securing Your Application and Enhancing User Privacy

    PyCon 2016

    This talk introduces new features that have been added to the Domain Name System recently, and how to use those features to improve application security and user privacy. I also introduce the "getdns" Python library, which provides a simplified DNS API, and how to interface with popular crypto libraries.

  • Requirements of the Cornell Theory Center for Resource Management and Process Scheduling

    IPPS Workshop on Job Scheduling Strategies for Parallel Processing

    Other authors
    • Marcy Rosencrantz
    • David Schneider
    • Roslyn Liebensperger
    • John Zollweg

Patents

  • Address tagging for network address translation (NAT) traversal

    Issued US 7,680,104

    Disclosed are methods and apparatus for generating, as well as processing data that is traversing (or will be traversing) a translation device, such as a Network Address Translation (NAT) device. In one embodiment, a method of sending data from a first node to a second node is disclosed. The method includes sending a data packet having a header and a payload whereby the header includes (i) one or more fields which identify an application type that uses addresses and indicates that there is a…

    Disclosed are methods and apparatus for generating, as well as processing data that is traversing (or will be traversing) a translation device, such as a Network Address Translation (NAT) device. In one embodiment, a method of sending data from a first node to a second node is disclosed. The method includes sending a data packet having a header and a payload whereby the header includes (i) one or more fields which identify an application type that uses addresses and indicates that there is a tag present in the payload that serves as a substitute for an address and (ii) an address and whereby the payload includes a tag that is positioned so that it serves as a substitution for an address that is used the identified application. The one or more fields are associated with the address of the header.

    See patent
  • Mechanisms for detection of non-supporting NAT traversal boxes in the path

    Issued US 7,443,849

    Disclosed are methods and apparatus for facilitating translation of packet addresses (or ports) by one or more translation devices (e.g., Network Address Translation or NAT devices) using a specialized protocol to handle an address (or port) that is used to form part of a payload. In one implementation, this specialized protocol is referred to as Network Layer Signaling (NLS). As a packet traverses along a path containing one or more translation devices, each translation device is configured to…

    Disclosed are methods and apparatus for facilitating translation of packet addresses (or ports) by one or more translation devices (e.g., Network Address Translation or NAT devices) using a specialized protocol to handle an address (or port) that is used to form part of a payload. In one implementation, this specialized protocol is referred to as Network Layer Signaling (NLS). As a packet traverses along a path containing one or more translation devices, each translation device is configured to translate an address (or port) of such packet's IP header if the packet is traversing between different domains (e.g., traversing between a private and public domain or between two different private domains). One or more of these translation devices may also be configured to implement the specialized protocol which includes translation device traversal mechanisms for detecting whether the traversal path contains a translation device that fails to implement such specialized protocol. When such a failure is detected, recovery mechanisms are also triggered.

    Other inventors
    • Kaushik Biswas
    • Senthil Sivakumar
    See patent
  • Cryptographic peer discovery, authentication, and authorization for on-path signaling

    Issued US 7,350,227

    A method is disclosed for cryptographic peer discovery, authentication, and authorization. According to one embodiment, a data packet, which is addressed to a destination device other than an intermediary network device, is intercepted at the intermediary network device. The data packet contains a request and a group identifier. A shared secret cryptographic key, which is mapped to the group identifier, is selected. A challenge is sent toward an upstream device from whence the data packet came.…

    A method is disclosed for cryptographic peer discovery, authentication, and authorization. According to one embodiment, a data packet, which is addressed to a destination device other than an intermediary network device, is intercepted at the intermediary network device. The data packet contains a request and a group identifier. A shared secret cryptographic key, which is mapped to the group identifier, is selected. A challenge is sent toward an upstream device from whence the data packet came. A response is received. A verification value is generated based on the cryptographic key and the challenge. It is determined whether the response matches the verification value. If the response matches the verification value, then it is determined whether the request is allowed by an authorization set that is mapped to the group identifier. If the request is allowed, then a policy of the intermediary network device is configured based on the request.

    Other inventors
    • David McGrew
    See patent

More activity by Melinda

View Melinda’s full profile

  • See who you know in common
  • Get introduced
  • Contact Melinda directly
Join to view full profile

People also viewed

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Melinda Shore

Add new skills with these courses