Artigo Revisado por pares

A proxy approach to e-mail security

1999; Wiley; Volume: 29; Issue: 12 Linguagem: Inglês

10.1002/(sici)1097-024x(199910)29

ISSN

1097-024X

Autores

Ian Brown, C. R. Snow,

Tópico(s)

User Authentication and Security Systems

Resumo

Software: Practice and ExperienceVolume 29, Issue 12 p. 1049-1060 Research Article A proxy approach to e-mail security Ian Brown, Ian Brown I.Brown@cs.ucl.ac.uk Department of Computer Science, University College London, London WC1E 6BT, UKSearch for more papers by this authorC. R. Snow, Corresponding Author C. R. Snow C.R.Snow@ncl.ac.uk Department of Computing Science, University of Newcastle, Newcastle upon Tyne, NE1 7RU, UKDepartment of Computing Science, University of Newcastle, Newcastle upon Tyne, NE1 7RU, UKSearch for more papers by this author Ian Brown, Ian Brown I.Brown@cs.ucl.ac.uk Department of Computer Science, University College London, London WC1E 6BT, UKSearch for more papers by this authorC. R. Snow, Corresponding Author C. R. Snow C.R.Snow@ncl.ac.uk Department of Computing Science, University of Newcastle, Newcastle upon Tyne, NE1 7RU, UKDepartment of Computing Science, University of Newcastle, Newcastle upon Tyne, NE1 7RU, UKSearch for more papers by this author First published: 29 September 1999 https://doi.org/10.1002/(SICI)1097-024X(199910)29:12 3.0.CO;2-1Citations: 5AboutPDF ToolsRequest permissionExport citationAdd to favoritesTrack citation ShareShare Give accessShare full text accessShare full-text accessPlease review our Terms and Conditions of Use and check box below to share full-text version of article.I have read and accept the Wiley Online Library Terms and Conditions of UseShareable LinkUse the link below to share a full-text version of this article with your friends and colleagues. Learn more.Copy URL Share a linkShare onFacebookTwitterLinkedInRedditWechat Abstract New Internet applications and new releases of existing Internet applications appear with bewildering rapidity. Adding functionality to such applications can therefore be a time-consuming process. By contrast, Internet protocols are significantly less volatile. In some circumstances, the additional functionality can be provided by ‘tapping into’ the protocol exchanges rather than modifying the applications themselves. We claim that this represents a more manageable approach to the problem of adding additional facilities to applications. We demonstrate this approach using the example of e-mail security. Whenever possible, a proxy sitting between a mail client and server signs and encrypts outgoing mail. Incoming secured mail is automatically decrypted and verified. This means that any software that works with standard mail protocols gains security without requiring separate upgrading. The proxy attempts to keep the amount of user interaction required to a minimum providing security functionality for users without the need to learn a complex new user interface.Copyright © 1999 John Wiley & Sons, Ltd. Citing Literature Volume29, Issue12October 1999Pages 1049-1060 RelatedInformation

Referência(s)
Altmetric
PlumX