Trusted mail gateway

Ayla, Erkut Sinan
The study aims to make contribution to solve mail security problems. The Trusted Mail Gateway provides a domain with the basic security services that are message integrity, confidentiality, non-repudiation, origin authentication and availability while message (e-mail) being delivered through the Internet. It generates S/MIME digital signatures and performs S/MIME encryption on behalf of the domain using secret key cryptography and public-key techniques and generating Cryptographic Message Syntax (CMS) data to provide origin authenticity, integrity and v confidentiality. It applies anti-virus control and protection, spam filtering and content check to both incoming mails to the domain and outgoing mails from the domain to prevent attacks against availability. Also, the Trusted Mail Gateway provides intra-domain security. It keeps e-mail messages in corresponding mailboxes as encrypted messages. Trusted Mail Gateway processes all the mails passing through and records processing results in database as notary information. Moreover, it establishes trust relations with other trusted domains and exchanges notary information with them via a secure channel.


A systematic study of probabilistic aggregation strategies in swarm robotic systems
Soysal, Onur; Şahin, Erol; Department of Computer Engineering (2005)
In this study, a systematic analysis of probabilistic aggregation strategies in swarm robotic systems is presented. A generic aggregation behavior is proposed as a combination of four basic behaviors: obstacle avoidance, approach, repel, and wait. The latter three basic behaviors are combined using a three-state finite state machine with two probabilistic transitions among them. Two different metrics were used to compare performance of strategies. Through systematic experiments, how the aggregation performa...
Archetype based domain modeling for health information systems
Atalağ, Koray; Bilgen, Semih; Department of Information Systems (2007)
A major problem to be solved in health informatics is high quality, structured and timely data collection. Standard terminologies and uniform domain conceptual models are important steps to alleviate this problem which are also proposed to enable interoperability among systems. With the aim of contributing to the solution of this problem, this study proposes novel features for the Archetypes and multi-level modeling technique in health information and knowledge modeling. The study consists of the developmen...
An information system re-structuring study for the financial inspection board
Yıldırım, Meltem; Bilgen, Semih; Department of Information Systems (2004)
With the scope of this study, certain tasks of the finance inspectors have been restructured by means of information technology in an effective way. The new structure has been integrated to the Internet technology and thus can eliminate the problems of time and place. The Documentation and Personnel Departments of FIB have been chosen for piloting and performance assesment has been performed after the restructuring with new technology. The result of the assesment suggest that, when compared to the old syste...
Memetic algorithms for timerabling problems in pricate schools
Aldoğan, Deniz; Alpaslan, Ferda Nur; Department of Computer Engineering (2005)
The aim of this study is to introduce a real-world timetabling problem that exists in some private schools in Turkey and to solve such problem instances utilizing memetic algorithms. Being a new type of problem and for privacy reasons, there is no real data available. Hence for benchmarking purposes, a random data generator has been implemented. Memetic algorithms (MAs) combining genetic algorithms and hill-climbing are applied to solve synthetic problem instances produced by this generator. Different types...
A P2P based failure detection model for distributed systems
Kavuklu, Celal; Doğru, Ali Hikmet; Department of Computer Engineering (2006)
A comprehensive failure detection model is proposed to detect service failures in asynchronous distributed systems. The proposed model takes advantage of P2P technology to provide required functionality. When compared to similar studies in failure detection, the presented failure detection model is more autonomous in resolving service dependencies, embodies more flexibility in providing different failure detection functions (like unreliable failure detectors, membership services) and offers more security. A...
Citation Formats
E. S. Ayla, “Trusted mail gateway,” M.S. - Master of Science, Middle East Technical University, 2004.