Rose et al., 2017 - Google Patents
Trustworthy emailRose et al., 2017
View PDF- Document ID
- 833310803273419002
- Author
- Rose S
- Nightingale S
- Garfinkel S
- Chandramouli R
- Publication year
External Links
Snippet
This publication has been developed by NIST in accordance with its statutory responsibilities under the 56 Federal Information Security Modernization Act (FISMA) of 2014, 44 USC § 3551 et seq., Public Law 57 (PL) 113-283. NIST is responsible for …
- 238000004458 analytical method 0 abstract description 7
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
- G06Q10/063—Operations research or analysis
- G06Q10/0631—Resource planning, allocation or scheduling for a business operation
- G06Q10/06311—Scheduling, planning or task assignment for a person or group
- G06Q10/063112—Skill-based matching of a person or a group to a task
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
- G06Q10/063—Operations research or analysis
- G06Q10/0635—Risk analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
- G06Q10/063—Operations research or analysis
- G06Q10/0639—Performance analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
- G06Q10/109—Time management, e.g. calendars, reminders, meetings, time accounting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
- G06Q10/103—Workflow collaboration or project management
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Foster et al. | Security by any other name: On the effectiveness of provider based email security | |
US20090138711A1 (en) | Sender Email Address Verification Using Reachback | |
US20050198508A1 (en) | Method and system for transmission and processing of authenticated electronic mail | |
JP2006520112A (en) | Security key server, implementation of processes with non-repudiation and auditing | |
Banday | Effectiveness and limitations of e-mail security protocols | |
Kambourakis et al. | What email servers can tell to Johnny: an empirical study of provider-to-provider email security | |
Derouet | Fighting phishing and securing data with email authentication | |
KR102164338B1 (en) | E-mail Security System to Prevent Sender Impersonation and Method thereof | |
Chandramouli et al. | Secure domain name system (DNS) deployment guide | |
Tracy et al. | Guidelines on electronic mail security | |
Rose et al. | Trustworthy email | |
US20100180121A1 (en) | Method and apparatus for enhancing security in network-based data communication | |
Herzberg | DNS-based email sender authentication mechanisms: A critical review | |
Nanaware et al. | Dmarcbox–corporate email security and analytics using dmarc | |
Ragheb et al. | The effectiveness of dkim and spf in strengthening email security | |
Chauhan et al. | Effectiveness of Anti-Spoofing Protocols for Email Authentication | |
Chandramouli et al. | SECOND DRAFT NIST Special Publication 800-177 | |
Jacobs et al. | Identities, anonymity and information warfare | |
Draper-Gil et al. | My email communications security assessment (MECSA): 2018 results | |
Chandramouli et al. | DRAFT NIST Special Publication 800-177 | |
US20240056466A1 (en) | Computerized system for analysis and of electronic communication systems | |
Gersch et al. | DANE Trusted Email for Supply Chain Management | |
Kour et al. | Email attacks: Investigation about the vulnerability of the Swedish organizations against email threats. | |
Zhao et al. | An add-on end-to-end secure email solution in mobile communications | |
ABDULLAH et al. | THE IMPLEMENTATION STRATEGY OF DNSSEC IN STRENGTHENING DIGITAL GOVERNMENT SECURITY IN MALAYSIA. |