跳至主要内容

Study of the Security Enhancements in Various E-Mail Systems

Read full paper at:
http://www.scirp.org/journal/PaperInformation.aspx?PaperID=52346#.VJJGS8nQrzE

E-mail security becomes critical issue to research community in the field of information security. Several solutions and standards have been fashioned according to the recent security requirements in order to enhance the e-mail security. Some of the existing enhancements focus on keeping the exchange of data via e-mail in confident and integral way. While the others focus on authenticating the sender and prove that he will not repudiate from his message. This paper will survey various e-mail security solutions. We introduce different models and techniques used to solve and enhance the security of e-mail systems and evaluate each one from the view point of security.
Cite this paper
Babrahem, A. , Alharbi, E. , Alshiky, A. , Alqurashi, S. and Kar, J. (2015) Study of the Security Enhancements in Various E-Mail Systems. Journal of Information Security, 6, 1-11. doi: 10.4236/jis.2015.61001
 

[1] Al-taee, M.A., Al-Hassani, H.N., Bamajbour, B.S. and Al-Jumeily, D. (2009) Biometric-Based Security System for Plaintext e-Mail Messages. Second International Conference on Developments in eSystems Engineering (DESE), Abu Dhabi, 14-16 December 2009, 202-206.
[2] Ghafoor, A., Muftic, S. and Schmölzer, G. (2009) CryptoNET: Design and Implementation of the Secure Email System. Proceedings of the 1st International Workshop on Security and Communication Networks (IWSCN), Trondheim, 20-22 May 2009, 402-407.
[3] Al-Saadoon, G.M.W. (2011) Authentication and Virus Detection Enhancement for Client and Server Applications. Journal of Emerging Trends in Computing and Information Sciences, 2, 390-395.
[4] Baykara, M. and Das, R. (2013) A Steganography Application for Secure Data Communication. International Conference on Electronics, Computer and Computation (ICECCO), Ankara, 7-9 November 2013, 309-313.
[5] Cailleux, L., Bouabdallah, A. and Bonnin, J.-M. (2014) Building a Confident Advanced Email System Using a New Correspondence Model. 28th International Conference on Advanced Information Networking and Applications Workshops (WAINA), Victoria, 13-16 May 2014, 85-90.
[6] Shukla, R., Prakash, H.O., Bhushan, R., Venkataraman, S. and Varadan, G. (2013) Sahastradhara Biometric and EToken Integrated Secure Email System. 15th International Conference on Advanced Computing Technologies (ICACT), Rajampet, 21-22 September 2013, 1-4.
[7] Kar, J. (2014) Provably Secure Online/Off-Line Identity-Based Signature Scheme for Wireless Sensor Network. International Journal of Network Security, Taiwan, 16, 26-36.
[8] Hameed, S., Kloht, T. and Fu, X.M. (2013) Identity Based Email Sender Authentication for Spam Mitigation. Eighth International Conference on Digital Information Management (ICDIM), Islamabad, 10-12 September 2013, 14-19.
[9] Stallings, W. (2014) Electronic Mail Security, in Cryptography and Network Security Principles and Practice. 6th Edition, Pearson Education, Upper Saddle River, 591-615.
[10] Kar, J. and Majhi, B. (2009) An Efficient Password Security of Three Party Key Exchange Protocol Based on ECDLP. 12th International Conference on Information Technology 2009 (ICIT 2009), Tata McGrow Hill Education Private Limited, Bhubaneswar, 75-78.
[11] Kar, J. and Majhi, B. (2009) An Efficient Password Security of Multiparty Key Exchange Protocol Based on ECDLP. International Journal of Computer Science and Security (IJCSS), 3, 405-413.
[12] Kar, J. and Majhi, B. (2009) A Secure Two-Party Identity Based Key Exchange Protocol based on Elliptic Curve Discrete Logarithm Problem. Journal of Information Assurance and Security, 5, 473-482.
[13] Zadgaonkar, S., Pandey, V.C. and Pradhan, P.S. (2013) Developing a Model to Enhance E-Mail Authentication against E-Mail Address Spoofing Using Application. International Journal of Science and Modern Engineering (IJISME), 1, 13-17.
[14] Mooloo, D. and Fowdur, T.P. (2013) An SSL-Based Client-Oriented Anti-Spoofing Email Application. AFRICON, Pointe-Aux-Piments, 9-12 September 2013, 1-5.
[15] Kounelis, I., Muftic, S. and Loschner, J. (2014) Secure and Privacy-Enhanced E-Mail System Based on the Concept of Proxies. 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), Opatija, 26-30 May 2014, 1405-1410.
[16] Jang, J., Nepal, S. and Zic, J. (2008) Trusted Email Protocol: Dealing with Privacy Concerns from Malicious Email Intermediaries. 8th IEEE International Conference on Computer and Information Technology, Sydney, 8-11 July 2008, 402-407.                                                eww141218lx

评论

此博客中的热门博文

A Comparison of Methods Used to Determine the Oleic/Linoleic Acid Ratio in Cultivated Peanut (Arachis hypogaea L.)

Cultivated peanut ( Arachis hypogaea L.) is an important oil and food crop. It is also a cheap source of protein, a good source of essential vitamins and minerals, and a component of many food products. The fatty acid composition of peanuts has become increasingly important with the realization that oleic acid content significantly affects the development of rancidity. And oil content of peanuts significantly affects flavor and shelf-life. Early generation screening of breeding lines for high oleic acid content greatly increases the efficiency of developing new peanut varieties. The objective of this study was to compare the accuracy of methods used to classify individual peanut seed as high oleic or not high oleic. Three hundred and seventy-four (374) seeds, spanning twenty-three (23) genotypes varying in oil composition (i.e. high oleic (H) or normal/not high oleic (NH) inclusive of all four peanut market-types (runner, Spanish, Valencia and Virginia), were individually tested ...

Location Optimization of a Coal Power Plant to Balance Costs against Plant’s Emission Exposure

Fuel and its delivery cost comprise the biggest expense in coal power plant operations. Delivery of electricity from generation to consumers requires investment in power lines and transmission grids. Placing a coal power plant or multiple power plants near dense population centers can lower transmission costs. If a coalmine is nearby, transportation costs can also be reduced. However, emissions from coal plants play a key role in worsening health crises in many countries. And coal upon combustion produces CO 2 , SO 2 , NO x , CO, Metallic and Particle Matter (PM10 & PM2.5). The presence of these chemical compounds in the atmosphere in close vicinity to humans, livestock, and agriculture carries detrimental health consequences. The goal of the research was to develop a methodology to minimize the public’s exposure to harmful emissions from coal power plants while maintaining minimal operational costs related to electric distribution losses and coal logistics. The objective was...

Evaluation of the Safety and Efficacy of Continuous Use of a Home-Use High-Frequency Facial Treatment Appliance

At present, many home-use beauty devices are available in the market. In particular, many products developed for facial treatment use light, e.g., a flash lamp or a light-emitting diode (LED). In this study, the safety of 4 weeks’ continuous use of NEWA TM , a high-frequency facial treatment appliance, every alternate day at home was verified, and its efficacy was evaluated in Japanese individuals with healthy skin aged 30 years or older who complained of sagging of the facial skin.  Transepidermal water loss (TEWL), melanin levels, erythema levels, sebum secretion levels, skin color changes and wrinkle improvement in the facial skin were measured before the appliance began to be used (study baseline), at 2 and 4 weeks after it had begun to be used, and at 2 weeks after completion of the 4-week treatment period (6 weeks from the study baseline). In addition, data obtained by subjective evaluation by the subjects themselves on a visual analog scale (VAS) were also analyzed. Fur...