Securing Email Communication with XML Technology

نویسندگان

  • Lijun Liao
  • Jörg Schwenk
چکیده

This chapter deals with the issues concerning e-mail communication security. We analyze the most popular security mechanisms and standards related to the e-mail communication and identify potential threats and vulnerabilities. The most significant drawback of all current approaches is the impossibility of keeping headers information authentic. This leads to possible impersonation attacks and profiling of the e-mail communication, and encourages spam and phishing activities. Furthermore, none of the currently available security mechanisms supports partial signature generation of the e-mail content by distinct signers, which might be useful in commercial scenarios. To handle these problems, we suggest a new approach, called XMaiL, which can be considered as an advanced email security mechanism based on the popular XML technologies. The proposed XMaiL supersedes all currently available e-mail security standards in the sense of the higher flexibility and security.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Customized PKI for SCADA System

Anupam Saxena Centre for Development of Advanced Computing, Mumbai, India Email: [email protected] Om Pal Centre for Development of Advanced Computing, Mumbai, India Email:[email protected] Zia Saquib Centre for Development of Advanced Computing, Mumbai, India Email: [email protected] Dhiren Patel Indian Institute of Technology Gandhinagar, Ahmedabad, India Email: [email protected] ---...

متن کامل

Using an XML-capable mailtool for the communication in software development projects

In this paper we show, how an XML-capable mailtool can improve the ways of communication in software development projects. Therefore we analyze which kinds of communication may appear within such a project. Moreover we show, that the main advantage of using XML in emails, namely the known structure of a message, applies to these kinds of communication.

متن کامل

A Survey Paper on Cryptography Techniques

In the modern era evaluation of networking and wireless networks has come in information and communication technology, there are so many things that gives facility to deal with these technology using internet. In internet email security is main aspect and the process of cryptography plays an important role to provide the security to the networks. To improve security and efficiency, most email s...

متن کامل

Prototyping a Vibrato-Aware Query-By-Humming (QBH) Music Information Retrieval System for Mobile Communication Devices: Case of Chromatic Harmonica

Background and Aim: The current research aims at prototyping query-by-humming music information retrieval systems for smart phones. Methods: This multi-method research follows simulation technique from mixed models of the operations research methodology, and the documentary research method, simultaneously. Two chromatic harmonica albums comprised the research population. To achieve the purpose ...

متن کامل

XML-based Modeling of Communication Protocols for the Power System

The XML technology currently widely used in network communication is also able to play an important role in the automation system of the power system. Based on some specifications and standards of the current power system, the study conducted self-description of the information and data modeling of substation communication protocols with XML and its object-oriented technology, and discussed bas...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007