Usable Secure Email Communications - Criteria and Evaluation of Existing Approaches
نویسندگان
چکیده
Email communication has been used for many years and replaces more and more traditional letters. Compared to postal service the mail service is easier, faster and free of charge. However, the standard email is from a security point of view comparable to post cards and not to letters. While end-to-end secure email communication is possible with PGP and S/MIME, only few people use it due to a lack of awareness, low usability, and lacking an understanding of PKIs. Recently, some new approaches for secure email communication have been proposed. In order to enable a comparison of all these different email services we define security, usability, and interoperability criteria and apply them to existing approaches. Based on the result, we propose future directives for usable secure email communication.
منابع مشابه
On Secure and Usable Program Obfuscation: A Survey
Program obfuscation is a widely employed approach for software intellectual property protection. However, general obfuscation methods (e.g., lexical obfuscation, control obfuscation) implemented in mainstream obfuscation tools are heuristic and have little security guarantee. Recently in 2013, Garg et al. have achieved a breakthrough in secure program obfuscation with a graded encoding mechanis...
متن کاملارزیابی ریسک در محیط کار با استفاده از آنالیز ایمنی شغل، روش گروه اسمی و تاپسیس فازی
Background and aims: Risk assessment is the most important function in the Risk management Process. Because the lack of existing a general methodology in this filed, organizations prefer to use simple approaches. These approaches are not capable of presenting an accurate ranking of dangers. The aim of this paper was to overcome the existing limitation of the simple approaches. Methods: The pres...
متن کاملSEIMCHA: a new semantic image CAPTCHA using geometric transformations
As protection of web applications are getting more and more important every day, CAPTCHAs are facing booming attention both by users and designers. Nowadays, it is well accepted that using visual concepts enhance security and usability of CAPTCHAs. There exist few major different ideas for designing image CAPTCHAs. Some methods apply a set of modifications such as rotations to the original imag...
متن کاملA New Hybrid Approach of K-Nearest Neighbors Algorithm with Particle Swarm Optimization for E-Mail Spam Detection
Emails are one of the fastest economic communications. Increasing email users has caused the increase of spam in recent years. As we know, spam not only damages user’s profits, time-consuming and bandwidth, but also has become as a risk to efficiency, reliability, and security of a network. Spam developers are always trying to find ways to escape the existing filters therefore new filters to de...
متن کاملSECURE Validation
This deliverable reports on the validation results obtained after an evaluation of the SECURE project’s trust-based security model. The first step of the evaluation is the definition of validation criteria for the SECURE model. Trust-based security frameworks are increasingly popular, yet few evaluations have been conducted. As a result, no guidelines or evaluation methodology have emerged that...
متن کامل