Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
An architecture for end-to-end and inter-domain trusted mail delivery service
Date
2006-06-18
Author
Ayla, Erkut Sinan
Özgit, Attila
Metadata
Show full item record
This work is licensed under a
Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License
.
Item Usage Stats
118
views
0
downloads
Cite This
Common methods of e-mail delivery over the Internet is vulnerable to some significant security risks. In this study, a "Trusted Mail Gateway" aiming at reliable and trusted end-to-end e-mail delivery is presented. The designed Trusted Mail Gateway provides a domain with the basic security services that are message integrity, confidentiality, non-repudiation, origin authentication and availability while the message (e-mail) is being delivered through the Internet. It generates S/MIME digital signatures and performs S/MIME encryption on behalf of the domain using secret key cryptography and public-key techniques and generating Cryptographic Message Syntax (CMS) data to provide origin authenticity, integrity and confidentiality. It applies anti-virus control and protection, spam filtering and content check to both incoming mails to the domain and outgoing mails from the domain to prevent attacks against availability. Trusted Mail Gateway also provides intra-domain security. It keeps e-mail messages in corresponding mailboxes as encrypted messages. Trusted Mail Gateway processes all the mails passing through and records processing results in database as notary information. Moreover, it establishes trust relations with other registered trusted domains and exchanges notary information with them via a secure channel.
Subject Keywords
Notary
,
Intra-domai
,
Inter-domain
,
E-mail protocols
,
E-mail security services
,
S/MIME
URI
https://hdl.handle.net/11511/30198
DOI
https://doi.org/10.1109/iscn.2006.1662537
Conference Name
: 7th International Symposium on Computer Networks
Collections
Graduate School of Informatics, Conference / Seminar
Suggestions
OpenMETU
Core
A Computational Dynamic Trust Model for User Authorization
ZHONG, Yuhui; Bhargava, Bharat; LU, Yİ; Angın, Pelin (Institute of Electrical and Electronics Engineers (IEEE), 2015-01-01)
Development of authorization mechanisms for secure information access by a large community of users in an open environment is an important problem in the ever-growing Internet world. In this paper we propose a computational dynamic trust model for user authorization, rooted in findings from social science. Unlike most existing computational trust models, this model distinguishes trusting belief in integrity from that in competence in different contexts and accounts for subjectivity in the evaluation of a pa...
An Entropy based DDoS detection method and implementation
Yücebaş, Süleyman Fürkan; Betin Can, Aysu; Department of Cyber Security (2019)
Distributed Denial of Service (DDoS) is a cyber attack type involving multiple computer sources which aims to temporarily or permanently deactivate the service provided by a device. This attack type has been listed multiple times as the most used attack types and has a great portion in all types of cyber attacks. Also, these attacks are increasing day by day and poses a threat for cyber security ecosystem. In today's world, these attacks target worldwide organizations and cause them to suffer. DDoS attacks ...
Using Assurance Cases to Develop Iteratively Security Features Using Scrum
BEN OTHMANE, Lotfi; Angın, Pelin; BHARGAVA, Bharat (2014-09-12)
A security feature is a customer-valued capability of software for mitigating a set of security threats. Incremental development of security features, using the Scrum method, often leads to developing ineffective features in addressing the threats they target due to factors such as incomplete security tests. This paper proposes the use of security assurance cases to maintain a global view of the security claims as the feature is being developed iteratively and a process that enables the incremental developm...
Server notarıes: a complementary approach to the web PKI TRUST model
Yüce, Emre; Doğanaksoy, Ali; Selçuk, Ali Aydın; Department of Cryptography (2016)
SSL/TLS is the de facto protocol for providing secure communication over the Internet. It relies on the Web PKI model for authentication and secure key exchange. Despite its relatively successful past, the number of Web PKI incidents observed have increased recently. These incidents revealed the risks of forged certificates issued by certificateauthoritieswithouttheconsentofthedomainowners. Severalsolutionshave beenproposedtosolvethisproblem,butnosolutionhasyetreceivedwidespreadadaption due to complexity and ...
Automatic detection of cyber security events from Turkish twitter stream and Turkish newspaper data
Ural, Özgür; Acartürk, Cengiz; Department of Cyber Security (2019)
Cybersecurity experts scan the internet and face security events that influence users, institutions, and governments. An information security analyst regularly examines sources to stay up to date on security events in her/his domain of expertise. This may lead to a heavy workload for the information analysts if they do not have proper tools for security event investigation. For example, an information analyst may want to stay aware of cybersecurity events, such as a DDoS (Distributed Denial of Service) atta...
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
E. S. Ayla and A. Özgit, “An architecture for end-to-end and inter-domain trusted mail delivery service,” presented at the : 7th International Symposium on Computer Networks, Istanbul, TURKEY, 2006, Accessed: 00, 2020. [Online]. Available: https://hdl.handle.net/11511/30198.