IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Towards a Certified Electronic Mail System

Towards a Certified Electronic Mail System
View Sample PDF
Author(s): Gerard Draper-Gil (University of the Balearic Islands, Spain), Josep-Lluís Ferrer-Gomila (University of the Balearic Islands, Spain), M. Francisca Hinarejos (University of the Balearic Islands, Spain)and Arne Tauber (Graz University of Technology, Austria)
Copyright: 2014
Pages: 25
Source title: Architectures and Protocols for Secure Information Technology Infrastructures
Source Author(s)/Editor(s): Antonio Ruiz-Martinez (University of Murcia, Spain), Rafael Marin-Lopez (University of Murcia, Spain)and Fernando Pereniguez-Garcia (University of Murcia, Spain)
DOI: 10.4018/978-1-4666-4514-1.ch002

Purchase

View Towards a Certified Electronic Mail System on the publisher's website for pricing and purchasing information.

Abstract

Most of the existent certified electronic mail proposals (found in scientific papers) have been designed without considering their deployment into traditional e-mail infrastructure (e.g., Internet mail system). In fact, there is not any implementation used for commercial purposes of those proposals. On the other hand, in different countries, private companies and public administrations have developed their own applications for certified electronic mail, but these solutions are tailored to their needs and present serious drawbacks. They consider the mail providers as Trusted Third Parties (TTPs), but without being verifiable (if they cheat or fail, users cannot prove it). In most cases, users (typically recipients) cannot choose their mail provider; it is imposed, and even worse, sometimes a message is considered to have been delivered when it has been deposited in the recipient’s mailbox (and perhaps, he will not be able to access it). In this chapter, the authors give a broad picture on the current state of certified e-mail, including a brief description of the current e-mail architecture and the need of certified e-mail services, and a definition of the security requirements needed for such a service. Next, they review the scientific and existent proposals. Finally, the authors give some guidelines for developing practical solutions for certified e-mail services that meet all the security requirements.

Related Content

Chaymaâ Boutahiri, Ayoub Nouaiti, Aziz Bouazi, Abdallah Marhraoui Hsaini. © 2024. 14 pages.
Imane Cheikh, Khaoula Oulidi Omali, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 30 pages.
Tahiri Omar, Herrou Brahim, Sekkat Souhail, Khadiri Hassan. © 2024. 19 pages.
Sekkat Souhail, Ibtissam El Hassani, Anass Cherrafi. © 2024. 14 pages.
Meryeme Bououchma, Brahim Herrou. © 2024. 14 pages.
Touria Jdid, Idriss Chana, Aziz Bouazi, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 16 pages.
Houda Bentarki, Abdelkader Makhoute, Tőkési Karoly. © 2024. 10 pages.
Body Bottom