Evolution of Email Security Standards

نویسندگان

چکیده

The first work on email security began in 1984, which resulted the Privacy Enhanced Mail (PEM) specifications. Two years later, was done as part of Secure Data Network System (SDNS) sponsored by U.S. Government, resulting Message Security Protocol (MSP). PEM and MSP both influenced development most popular Internet protocol, is MIME (S/MIME). This article provides insight into early history security, describes ongoing to improve then makes some predictions about future.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Evolution of Wireless LAN Security Standards

As wireless LANs (WLANs) become ubiquitous, the issue of network security in the wireless domain becomes one of crucial interest. In response to security concerns, the IEEE standard 802.11 proposed a protocol known as Wired Equivalent Privacy (WEP). However, the discovery of serious loopholes in WEP had a negative impact on the deployment of WLANs for corporate networks, and possibly on the gro...

متن کامل

Cyber Security Standards

The goal of cyber security standards is to improve the security of information technology (IT) systems, networks, and critical infrastructures. A cyber security standard defines both functional and assurance requirements within a product, system, process, or technology environment. Well-developed cyber security standards enable consistency among product developers and serve as a reliable metric...

متن کامل

Standards for Cyber Security

Standards play a key role in improving cyber defense and cyber security across different geographical regions and communities. Standardizing processes and procedures is also essential to achieve effective cooperation in cross-border and cross-community environments. The number of standards development organizations and the number of published information security standards have increased in rec...

متن کامل

Security Goals and Evolving Standards

With security standards, as with software, we cannot expect to eliminate all security flaws prior to publication. Protocol standards are often updated because flaws are discovered after deployment. The constraints of the deployments, and variety of independent stakeholders, mean that different ways to mitigate a flaw may be proposed and debated. In this paper, we propose a criterion for one mit...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Communications Magazine

سال: 2022

ISSN: ['0163-6804', '1558-1896']

DOI: https://doi.org/10.1109/mcom.2022.9946996