Development and Evaluation of a System for Checking for Improper Sending of Personal Information in Encrypted E-Mail
نویسندگان
چکیده
There have been cases, in recent years, where customer information or other personal information has been leaked, and protective measures for personal information have become important. Corporations and other organizations have increasingly adopted software with e-mail monitoring capability to prevent leakage of personal information to the outside through e-mail. However, if the e-mail is encrypted, it is completely impossible to check whether personal information is being improperly sent. The authors have designed and implemented a system for solving such problems. Experiments to detect personal information were conducted using the implemented system, and we were able to confirm the basic effectiveness of the system. This paper reports on those results.
منابع مشابه
Evaluation of Failure Causes in Employing Hospital Information Systems
Today, the information systems play a critical role in business for each organization. Like other organizations, hospitals use information systems for data collection, data storage, data processing and the like to have long-term and short-term achievements. Despite the very benefits of implementing HIS and its costly implementation, the HIS project sometimes fails. The importance of the HIS fai...
متن کاملPrivate Key based query on encrypted data
Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...
متن کاملClassification of encrypted traffic for applications based on statistical features
Traffic classification plays an important role in many aspects of network management such as identifying type of the transferred data, detection of malware applications, applying policies to restrict network accesses and so on. Basic methods in this field were using some obvious traffic features like port number and protocol type to classify the traffic type. However, recent changes in applicat...
متن کاملSecure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines
Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...
متن کاملDeveloping Reliable yet Flexible Software through If-Then Model Transformation Rules
Developing reliable yet flexible software is a hard problem. Although modeling methods enjoy a lot of advantages, the exclusive use of just one of them, in many cases, may not guarantee the development of reliable and flexible software. Formal modeling methods ensure reliability because they use a rigorous approach to software development. However, lack of knowledge and high cost practically fo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005