Evolution of Email Security Standards
نویسندگان
چکیده
The first work on email security began in 1984, which resulted the Privacy Enhanced Mail (PEM) specifications. Two years later, was done as part of Secure Data Network System (SDNS) sponsored by U.S. Government, resulting Message Security Protocol (MSP). PEM and MSP both influenced development most popular Internet protocol, is MIME (S/MIME). This article provides insight into early history security, describes ongoing to improve then makes some predictions about future.
منابع مشابه
Evolution of Wireless LAN Security Standards
As wireless LANs (WLANs) become ubiquitous, the issue of network security in the wireless domain becomes one of crucial interest. In response to security concerns, the IEEE standard 802.11 proposed a protocol known as Wired Equivalent Privacy (WEP). However, the discovery of serious loopholes in WEP had a negative impact on the deployment of WLANs for corporate networks, and possibly on the gro...
متن کاملCyber Security Standards
The goal of cyber security standards is to improve the security of information technology (IT) systems, networks, and critical infrastructures. A cyber security standard defines both functional and assurance requirements within a product, system, process, or technology environment. Well-developed cyber security standards enable consistency among product developers and serve as a reliable metric...
متن کاملStandards for Cyber Security
Standards play a key role in improving cyber defense and cyber security across different geographical regions and communities. Standardizing processes and procedures is also essential to achieve effective cooperation in cross-border and cross-community environments. The number of standards development organizations and the number of published information security standards have increased in rec...
متن کاملSecurity Goals and Evolving Standards
With security standards, as with software, we cannot expect to eliminate all security flaws prior to publication. Protocol standards are often updated because flaws are discovered after deployment. The constraints of the deployments, and variety of independent stakeholders, mean that different ways to mitigate a flaw may be proposed and debated. In this paper, we propose a criterion for one mit...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Communications Magazine
سال: 2022
ISSN: ['0163-6804', '1558-1896']
DOI: https://doi.org/10.1109/mcom.2022.9946996