[go: up one dir, main page]

Rose et al., 2017 - Google Patents

Trustworthy email

Rose et al., 2017

View PDF
Document ID
833310803273419002
Author
Rose S
Nightingale S
Garfinkel S
Chandramouli R
Publication year

External Links

Snippet

This publication has been developed by NIST in accordance with its statutory responsibilities under the 56 Federal Information Security Modernization Act (FISMA) of 2014, 44 USC § 3551 et seq., Public Law 57 (PL) 113-283. NIST is responsible for …
Continue reading at csrc.nist.gov (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
    • G06Q10/063Operations research or analysis
    • G06Q10/0631Resource planning, allocation or scheduling for a business operation
    • G06Q10/06311Scheduling, planning or task assignment for a person or group
    • G06Q10/063112Skill-based matching of a person or a group to a task
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
    • G06Q10/063Operations research or analysis
    • G06Q10/0635Risk analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
    • G06Q10/063Operations research or analysis
    • G06Q10/0639Performance analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
    • G06Q10/109Time management, e.g. calendars, reminders, meetings, time accounting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
    • G06Q10/103Workflow collaboration or project management

Similar Documents

Publication Publication Date Title
Foster et al. Security by any other name: On the effectiveness of provider based email security
US20090138711A1 (en) Sender Email Address Verification Using Reachback
US20050198508A1 (en) Method and system for transmission and processing of authenticated electronic mail
JP2006520112A (en) Security key server, implementation of processes with non-repudiation and auditing
Banday Effectiveness and limitations of e-mail security protocols
Kambourakis et al. What email servers can tell to Johnny: an empirical study of provider-to-provider email security
Derouet Fighting phishing and securing data with email authentication
KR102164338B1 (en) E-mail Security System to Prevent Sender Impersonation and Method thereof
Chandramouli et al. Secure domain name system (DNS) deployment guide
Tracy et al. Guidelines on electronic mail security
Rose et al. Trustworthy email
US20100180121A1 (en) Method and apparatus for enhancing security in network-based data communication
Herzberg DNS-based email sender authentication mechanisms: A critical review
Nanaware et al. Dmarcbox–corporate email security and analytics using dmarc
Ragheb et al. The effectiveness of dkim and spf in strengthening email security
Chauhan et al. Effectiveness of Anti-Spoofing Protocols for Email Authentication
Chandramouli et al. SECOND DRAFT NIST Special Publication 800-177
Jacobs et al. Identities, anonymity and information warfare
Draper-Gil et al. My email communications security assessment (MECSA): 2018 results
Chandramouli et al. DRAFT NIST Special Publication 800-177
US20240056466A1 (en) Computerized system for analysis and of electronic communication systems
Gersch et al. DANE Trusted Email for Supply Chain Management
Kour et al. Email attacks: Investigation about the vulnerability of the Swedish organizations against email threats.
Zhao et al. An add-on end-to-end secure email solution in mobile communications
ABDULLAH et al. THE IMPLEMENTATION STRATEGY OF DNSSEC IN STRENGTHENING DIGITAL GOVERNMENT SECURITY IN MALAYSIA.