RE: Reliable Email
نویسندگان
چکیده
The explosive growth in unwanted email has prompted the development of techniques for the rejection of email, intended to shield recipients from the onerous task of identifying the legitimate email in their inboxes amid a sea of spam. Unfortunately, widely used contentbased filtering systems have converted the spam problem into a false positive one: email has become unreliable. Email acceptance techniques complement rejection ones; they can help prevent false positives by filing email into a user’s inbox before it is considered for rejection. Whitelisting, whereby recipients accept email from some set of authorized senders, is one such acceptance technique. We present Reliable Email (RE:), a new whitelisting system that incurs zero false positives among socially connected users. Unlike previous whitelisting systems, which require that whitelists be populated manually, RE: exploits friend-of-friend relationships among email correspondents to populate whitelists automatically. To do so, RE: permits an email’s recipient to discover whether other email users have whitelisted the email’s sender, while preserving the privacy of users’ email contacts with cryptographic private matching techniques. Using real email traces from two sites, we demonstrate that RE: renders a significant fraction of received email reliable. Our evaluation also shows that RE: can prevent up to 88% of the false positives incurred by a widely deployed email rejection system, at modest computational cost.
منابع مشابه
What Makes Re-finding Information Difficult? A Study of Email Re-finding
Re-finding information that has been seen or accessed before is a task which can be relatively straight-forward, but often it can be extremely challenging, time-consuming and frustrating. Little is known, however, about what makes one re-finding task harder or easier than another. We performed a user study to learn about the contextual factors that influence users’ perception of task difficulty...
متن کاملEmail-Set Visualization: Facilitating Re-Finding in Email Archives
In this paper we describe ESVT – EmailSet Visualization Tool, an email archive tool that provides users a visualization to re-find and discover information in their email archive. ESVT is an end-to-end email archive tool that can be used from archiving a user’s email messages to visualizing queries on the email archive. We address email archiving by allowing import of email messages from an ema...
متن کاملThe Labor Market Effects of a Refugee Wave: Synthetic Control Method meets the Mariel Boatlift∗
We apply the synthetic control method to re-examine the wage and employment effect of the Mariel Boatlift, a large inflow of Cuban refugees to Miami in 1980. This method improves on previous studies by choosing a control group for Miami so as to best match its labor market features in the eight years before the Boatlift. Given the presence of significant measurement error for average city wages...
متن کاملCCA-Secure PRE Scheme without Random Oracles
In a proxy re-encryption scheme, a semi-trusted proxy can transform a ciphertext under Alice’s public key into another ciphertext that Bob can decrypt. However, the proxy cannot access the plaintext. Due to its transformation property, proxy re-encryption can be used in many applications, such as encrypted email forwarding. In this paper, by using the techniques of Canetti-Hohenberger and Kuros...
متن کاملDomainKeys Identified Mail Demonstrates Good Reasons to Re-invent the Wheel
DomainKeys Identified Mail is an anti-spam proposal that involves mail servers digitally signing outbound email and verifying signatures on inbound email. The scheme makes no use of existing public key infrastructure or email security standards. This paper provides an outline of the scheme and discusses some reasons why re-use of existing standards is inappropriate in this context.
متن کامل