DocumentCode :
3358940
Title :
Securing electronic mail systems
Author :
Serenelli, Bob ; Leisher, Tim
Author_Institution :
USA CECOM, Ft. Monmouth, NJ, USA
fYear :
1992
fDate :
11-14 Oct 1992
Firstpage :
677
Abstract :
It is pointed out that security at the network layer cannot provide application-specific services associated with electronic mail such as signed receipts and digital signatures. These deficiencies can be remedied by providing end user to end user security where mail messages are black (protected/encrypted) at all intermediate points. The authors describe the approach and implementation taken in building such a mail security device. Mail messages are protected along the entire path from originator to recipient. The messages are protected during storage and processing at all intermediate points. the security can be implemented independently of the network layer architecture or a network layer security device. The key distribution technique is suitable for client-server architectures such as electronic mail, where the number of users is large and connectivity is diverse
Keywords :
computer networks; cryptography; electronic mail; client-server architectures; digital signatures; electronic mail systems; message encryption; message protection; network layer; security; signed receipts; Access protocols; Cryptography; Digital signatures; Electronic mail; Information security; Postal services; Protection; Public key; Telephony; US Government;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Military Communications Conference, 1992. MILCOM '92, Conference Record. Communications - Fusing Command, Control and Intelligence., IEEE
Conference_Location :
San Diego, CA
Print_ISBN :
0-7803-0585-X
Type :
conf
DOI :
10.1109/MILCOM.1992.244144
Filename :
244144
Link To Document :
بازگشت