Securing Email Communication with XML Technology
نویسندگان
چکیده
This chapter deals with the issues concerning e-mail communication security. We analyze the most popular security mechanisms and standards related to the e-mail communication and identify potential threats and vulnerabilities. The most significant drawback of all current approaches is the impossibility of keeping headers information authentic. This leads to possible impersonation attacks and profiling of the e-mail communication, and encourages spam and phishing activities. Furthermore, none of the currently available security mechanisms supports partial signature generation of the e-mail content by distinct signers, which might be useful in commercial scenarios. To handle these problems, we suggest a new approach, called XMaiL, which can be considered as an advanced email security mechanism based on the popular XML technologies. The proposed XMaiL supersedes all currently available e-mail security standards in the sense of the higher flexibility and security.
منابع مشابه
Customized PKI for SCADA System
Anupam Saxena Centre for Development of Advanced Computing, Mumbai, India Email: [email protected] Om Pal Centre for Development of Advanced Computing, Mumbai, India Email:[email protected] Zia Saquib Centre for Development of Advanced Computing, Mumbai, India Email: [email protected] Dhiren Patel Indian Institute of Technology Gandhinagar, Ahmedabad, India Email: [email protected] ---...
متن کاملUsing an XML-capable mailtool for the communication in software development projects
In this paper we show, how an XML-capable mailtool can improve the ways of communication in software development projects. Therefore we analyze which kinds of communication may appear within such a project. Moreover we show, that the main advantage of using XML in emails, namely the known structure of a message, applies to these kinds of communication.
متن کاملA Survey Paper on Cryptography Techniques
In the modern era evaluation of networking and wireless networks has come in information and communication technology, there are so many things that gives facility to deal with these technology using internet. In internet email security is main aspect and the process of cryptography plays an important role to provide the security to the networks. To improve security and efficiency, most email s...
متن کاملPrototyping a Vibrato-Aware Query-By-Humming (QBH) Music Information Retrieval System for Mobile Communication Devices: Case of Chromatic Harmonica
Background and Aim: The current research aims at prototyping query-by-humming music information retrieval systems for smart phones. Methods: This multi-method research follows simulation technique from mixed models of the operations research methodology, and the documentary research method, simultaneously. Two chromatic harmonica albums comprised the research population. To achieve the purpose ...
متن کاملXML-based Modeling of Communication Protocols for the Power System
The XML technology currently widely used in network communication is also able to play an important role in the automation system of the power system. Based on some specifications and standards of the current power system, the study conducted self-description of the information and data modeling of substation communication protocols with XML and its object-oriented technology, and discussed bas...
متن کامل