Usable Secure Email Communications - Criteria and Evaluation of Existing Approaches

نویسندگان

  • Cristian Thiago Moecke
  • Melanie Volkamer
چکیده

Email communication has been used for many years and replaces more and more traditional letters. Compared to postal service the mail service is easier, faster and free of charge. However, the standard email is from a security point of view comparable to post cards and not to letters. While end-to-end secure email communication is possible with PGP and S/MIME, only few people use it due to a lack of awareness, low usability, and lacking an understanding of PKIs. Recently, some new approaches for secure email communication have been proposed. In order to enable a comparison of all these different email services we define security, usability, and interoperability criteria and apply them to existing approaches. Based on the result, we propose future directives for usable secure email communication.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On Secure and Usable Program Obfuscation: A Survey

Program obfuscation is a widely employed approach for software intellectual property protection. However, general obfuscation methods (e.g., lexical obfuscation, control obfuscation) implemented in mainstream obfuscation tools are heuristic and have little security guarantee. Recently in 2013, Garg et al. have achieved a breakthrough in secure program obfuscation with a graded encoding mechanis...

متن کامل

ارزیابی ریسک در محیط کار با استفاده از آنالیز ایمنی شغل، روش گروه اسمی و تاپسیس فازی

Background and aims: Risk assessment is the most important function in the Risk management Process. Because the lack of existing a general methodology in this filed, organizations prefer to use simple approaches. These approaches are not capable of presenting an accurate ranking of dangers. The aim of this paper was to overcome the existing limitation of the simple approaches. Methods: The pres...

متن کامل

SEIMCHA: a new semantic image CAPTCHA using geometric transformations

As protection of web applications are getting more and more important every day, CAPTCHAs are facing booming attention both by users and designers. Nowadays, it is well accepted that using visual concepts enhance security and usability of CAPTCHAs. There exist few major different ideas for designing image CAPTCHAs. Some methods apply a set of modifications such as rotations to the original imag...

متن کامل

A New Hybrid Approach of K-Nearest Neighbors Algorithm with Particle Swarm Optimization for E-Mail Spam Detection

Emails are one of the fastest economic communications. Increasing email users has caused the increase of spam in recent years. As we know, spam not only damages user’s profits, time-consuming and bandwidth, but also has become as a risk to efficiency, reliability, and security of a network. Spam developers are always trying to find ways to escape the existing filters therefore new filters to de...

متن کامل

SECURE Validation

This deliverable reports on the validation results obtained after an evaluation of the SECURE project’s trust-based security model. The first step of the evaluation is the definition of validation criteria for the SECURE model. Trust-based security frameworks are increasingly popular, yet few evaluations have been conducted. As a result, no guidelines or evaluation methodology have emerged that...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012