Paulus et al., 2004 - Google Patents
Pragmatic solutions to make E-Mail Security workPaulus et al., 2004
View PDF- Document ID
- 17706048735878599960
- Author
- Paulus S
- Pohlmann N
- Reimer H
- Seemann H
- Publication year
- Publication venue
- Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2003 Conference
External Links
Snippet
The concepts for secure e-mail are available for quite some time. Nevertheless only few users have adopted them. The classical concept of end-to-end e-mail security provides maximum theoretical security. But the effort to implement and enforce it at every client has …
- 241000700605 Viruses 0 abstract description 6
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0272—Virtual private networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/104—Grouping of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10348670B2 (en) | Secure electronic mail system | |
US9864865B2 (en) | Secure electronic mail system | |
US10630689B2 (en) | Strong identity management and cyber security software | |
JP3932319B2 (en) | Email firewall using encryption / decryption with stored key | |
US8688790B2 (en) | Secure electronic mail system with for your eyes only features | |
US8631227B2 (en) | Processing encrypted electronic documents | |
US7966375B2 (en) | System and method for restricting access to email and attachments | |
WO2019118838A1 (en) | Using a measure of influence of sender in determining a security risk associated with an electronic message | |
Chhabra et al. | Review of e-mail system, security protocols and email forensics | |
Banday | Effectiveness and limitations of e-mail security protocols | |
US8166113B2 (en) | Access limited EMM distribution lists | |
Paulus et al. | Pragmatic solutions to make E-Mail Security work | |
Kounelis et al. | Secure and privacy-enhanced e-mail system based on the concept of proxies | |
Rights | Use offense to inform defense. Find flaws before the bad guys do. | |
Kamthe et al. | Email security: The challenges of network security | |
Tracy et al. | SP 800-45 Version 2. Guidelines on Electronic Mail Security | |
Licari | Protecting the information workplace | |
Pateriya et al. | Author Identification of Email Forensic in Service Oriented Architecture | |
Coskun | Wireless E-mail Security: A State-of-the-Art Review for Message Privacy and Protection from Application Perspective | |
Miller | E-Mail Security and Privacy | |
Vacca | Responding to Attacks |