Transparent Internet E-mail Security

نویسندگان

  • Raph Levien
  • Lewis McCarthy
  • Matt Blaze
چکیده

This paper describes the design and prototype implementation of a comprehensive system for securing Internet e-mail transparently, so that the only user intervention required is the initial setup and speciication of a trust policy. Our system uses the PolicyMaker trust management engine for evaluating the trustworthiness of keys, in particular whether the given binding between key and name is valid. In this approach, user policies and credentials are written as predicates in a safe programming language. These predicates can examine the graph of trust relationships among all the credentials presented. Thus, credentials can express higher-order policies that depend upon global properties of the trust graph or that impose speciic conditions under which keys are considered trusted. \Standard" certiicates, such as pgp and X.509, are automatically translated into simple PolicyMaker credentials that indicate that the certi-er trusts a binding between a key and a name and address, and certiiers can also issue more sophisticated credentials written directly in the PolicyMaker language. Our system does not assume any particular public key, certiicate, or message format. Our prototype implementation, which runs under most versions of Unix, accepts pgp key certiicates as well as our own credentials, and uses standard pgp message formats. Thus, our system inter-operates with the existing infrastructure of secure e-mail applications while providing additional exibility at those sites where the system is used. We plan also to support s/mime and other message formats, X.509 certiicates, and Win32-based platforms.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure transparent mobility secure mobility infrastructure using mobile ip

Mobility has become an integral part of modern computing. It increases user flexibility by releasing the potential of fixed data. Reliance on a static computing platform is not sufficient for the future needs of nomadic users. Portable e-mail devices have become popular in recent years due to their simplicity and functionality. These devices give the average user transparent access to their e-m...

متن کامل

Pragmatic solutions to make E-mail Security work

The concepts for secure e-mail are available for quite some time. Nevertheless only few users have adopted them. The classical concept of end-to-end e-mail security provides maximum theoretical security. But the effort to implement and enforce it at every client has limited the spreading of security and therefore the overall benefit. Centralized e-mail security overcomes this problem. A gateway...

متن کامل

FATIMA: A Firewall-Aware Transparent Internet Mobility Architecture

Ubiquitous communication will be one of the paradigms for the next decades. Mobile communication systems experience tremendous growth rates, Internet access is integrated in vehicles, pedestrians use Internet-ready mobile phones. This use of the Internet demands for a highly reliable and secure system, especially when used in nonacademical environments like remote offices, e-commerce, or traffi...

متن کامل

SureMsg: a XMPP-based security e-mail system

The Internet e-mail service based on SMTP protocol is an important information infrastructure. Meanwhile, the instant messaging becomes an emerging Internet application. This paper presents a security e-mail system based on instant messaging protocol to resolve the problem of SPAM. After introducing the design of architecture, client system and server system, this paper presents the security an...

متن کامل

Securing E-Mail Communication Using Hybrid Cryptosystem on Android-based Mobile Devices

One of the most popular internet services is electronic mail (e-mail). By using mobile devices with internet connection, e-mail can be widely used by anyone to exchange information anywhere and anytime whether public or confidential. Unfortunately, there are some security issues with email communication; email is sent in over open networks and e-mail is stored on potentially insecure mail serve...

متن کامل

Internet Voting, Security, and Privacy

Internet voting is an appealing concept to most voters, primarily for reasons of convenience (“why can’t I vote in my pajamas at a convenient time”), while appealing because of the attractiveness of technology. However, Internet voting is fundamentally different from other types of online transactions such as banking or shopping. In this Article, I describe different types of Internet voting, t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1996