A Novel Approach For Intranet Mailing For Providing User Authentication
نویسندگان
چکیده
With the explosion of the public Internet and e-commerce, private computers, and computer networks, if not adequately secured, are increasingly vulnerable to damaging attacks. Hackers, viruses, vindictive employees and even human error all represent clear and present dangers to networks. Various antidotes that are in fact inextricable with security issues are – Cryptography, Authentication, Integrity and Non Repudiation, Key Distribution and certification, Access control by implementing Firewalls etc.The main idea of this paper is to overcome the PGP’s(Pretty Good Privacy) main limitation of incomplete non-repudiation Service, which increases the degree of security and efficiency of an email message communication through NRR(Non-Repudiation of Receipt) and including PGPs original feature of NRO(Non-Repudiation of Origin), and there it assures new security service of Mutual NonRepudiation (MNR) .
منابع مشابه
Design and Implementation of an Intranet Security and Access Control System in Ubi-Com
Currently, most enterprise intranet systems process user information for security and access authentication purposes. However, this information is often captured by unauthorized users who may edit, modify, delete or otherwise corrupt this ∗ corresponding author 420 M. Lee, N.-D. Cho, K.-K. Lee, K.-S. Ko data. In addition, corruption can result from inaccurate communication protocols in the web ...
متن کاملSmart City Reference Model: Interconnectivity for On-Demand User to Service Authentication
The Internet of Things and Services (IoTS) has encouraged the development of service provisioning systems in respect to Smart City topics. Most of them are operated as heterogeneous systems which limits end customers’ access and contradicts with IoTS principles. In this paper, we discuss and develop a reference model of an interconnected service marketplace ecosystem. The prototypical implement...
متن کاملA Novel Approach for Protecting Exposed Intranet from Intrusions
This paper proposes a novel approach for protecting groups of computers in an intranet from malicious attacks. The proposed scheme uses a distributed intrusion detection system as the primary source of security mechanism along with micro-firewalls at the host level to enable dynamic policy update for the intranet as and when the threat pattern changes. The authentication mechanism used for auth...
متن کاملDesign and Implementation of GUISET-Driven Authentication Framework
Authentication is the process of identifying a user on the basis of the credentials provided. In reality, the user does not necessarily have to be a person; it can be an application that is making a remote call from the intranet or Internet. Different Grid domains provide different security policies and GUISET is not an exception. Authentication ensures that each application or user must be abl...
متن کاملBiometric Authentication of Fingerprint for Banking Users, Using Stream Cipher Algorithm
Providing banking services, especially online banking and electronic payment systems, has always been associated with high concerns about security risks. In this paper, customer authentication for their transactions in electronic banking has been discussed, and a more appropriate way of using biometric fingerprint data, as well as encrypting those data in a different way, has been suggest...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1110.1497 شماره
صفحات -
تاریخ انتشار 2011