[go: up one dir, main page]

Paulus et al., 2004 - Google Patents

Pragmatic solutions to make E-Mail Security work

Paulus et al., 2004

View PDF
Document ID
17706048735878599960
Author
Paulus S
Pohlmann N
Reimer H
Seemann H
Publication year
Publication venue
Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2003 Conference

External Links

Snippet

The concepts for secure e-mail are available for quite some time. Nevertheless only few users have adopted them. The classical concept of end-to-end e-mail security provides maximum theoretical security. But the effort to implement and enforce it at every client has …
Continue reading at dl.gi.de (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0272Virtual private networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/104Grouping of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies

Similar Documents

Publication Publication Date Title
US10348670B2 (en) Secure electronic mail system
US9864865B2 (en) Secure electronic mail system
US10630689B2 (en) Strong identity management and cyber security software
JP3932319B2 (en) Email firewall using encryption / decryption with stored key
US8688790B2 (en) Secure electronic mail system with for your eyes only features
US8631227B2 (en) Processing encrypted electronic documents
US7966375B2 (en) System and method for restricting access to email and attachments
WO2019118838A1 (en) Using a measure of influence of sender in determining a security risk associated with an electronic message
Chhabra et al. Review of e-mail system, security protocols and email forensics
Banday Effectiveness and limitations of e-mail security protocols
US8166113B2 (en) Access limited EMM distribution lists
Paulus et al. Pragmatic solutions to make E-Mail Security work
Kounelis et al. Secure and privacy-enhanced e-mail system based on the concept of proxies
Rights Use offense to inform defense. Find flaws before the bad guys do.
Kamthe et al. Email security: The challenges of network security
Tracy et al. SP 800-45 Version 2. Guidelines on Electronic Mail Security
Licari Protecting the information workplace
Pateriya et al. Author Identification of Email Forensic in Service Oriented Architecture
Coskun Wireless E-mail Security: A State-of-the-Art Review for Message Privacy and Protection from Application Perspective
Miller E-Mail Security and Privacy
Vacca Responding to Attacks