Development and Evaluation of a System for Checking for Improper Sending of Personal Information in Encrypted E-Mail

نویسندگان

  • Kenji Yasu
  • Yasuhiko Akahane
  • Masami Ozaki
  • Koji Semoto
  • Ryôichi Sasaki
چکیده

There have been cases, in recent years, where customer information or other personal information has been leaked, and protective measures for personal information have become important. Corporations and other organizations have increasingly adopted software with e-mail monitoring capability to prevent leakage of personal information to the outside through e-mail. However, if the e-mail is encrypted, it is completely impossible to check whether personal information is being improperly sent. The authors have designed and implemented a system for solving such problems. Experiments to detect personal information were conducted using the implemented system, and we were able to confirm the basic effectiveness of the system. This paper reports on those results.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Evaluation of Failure Causes in Employing Hospital Information Systems

Today, the information systems play a critical role in business for each organization. Like other organizations, hospitals use information systems for data collection, data storage, data processing and the like to have long-term and short-term achievements. Despite the very benefits of implementing HIS and its costly implementation, the HIS project sometimes fails. The importance of the HIS fai...

متن کامل

Private Key based query on encrypted data

Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...

متن کامل

Classification of encrypted traffic for applications based on statistical features

Traffic classification plays an important role in many aspects of network management such as identifying type of the transferred data, detection of malware applications, applying policies to restrict network accesses and so on. Basic methods in this field were using some obvious traffic features like port number and protocol type to classify the traffic type. However, recent changes in applicat...

متن کامل

Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines

Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...

متن کامل

Developing Reliable yet Flexible Software through If-Then Model Transformation Rules

Developing reliable yet flexible software is a hard problem. Although modeling methods enjoy a lot of advantages, the exclusive use of just one of them, in many cases, may not guarantee the development of reliable and flexible software. Formal modeling methods ensure reliability because they use a rigorous approach to software development. However, lack of knowledge and high cost practically fo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005