{"title":"确保电子邮件系统安全","authors":"B. Serenelli, T. Leisher","doi":"10.1109/MILCOM.1992.244144","DOIUrl":null,"url":null,"abstract":"It is pointed out that security at the network layer cannot provide application-specific services associated with electronic mail such as signed receipts and digital signatures. These deficiencies can be remedied by providing end user to end user security where mail messages are black (protected/encrypted) at all intermediate points. The authors describe the approach and implementation taken in building such a mail security device. Mail messages are protected along the entire path from originator to recipient. The messages are protected during storage and processing at all intermediate points. the security can be implemented independently of the network layer architecture or a network layer security device. The key distribution technique is suitable for client-server architectures such as electronic mail, where the number of users is large and connectivity is diverse.<<ETX>>","PeriodicalId":394587,"journal":{"name":"MILCOM 92 Conference Record","volume":"16 3","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1992-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Securing electronic mail systems\",\"authors\":\"B. Serenelli, T. Leisher\",\"doi\":\"10.1109/MILCOM.1992.244144\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"It is pointed out that security at the network layer cannot provide application-specific services associated with electronic mail such as signed receipts and digital signatures. These deficiencies can be remedied by providing end user to end user security where mail messages are black (protected/encrypted) at all intermediate points. The authors describe the approach and implementation taken in building such a mail security device. Mail messages are protected along the entire path from originator to recipient. The messages are protected during storage and processing at all intermediate points. the security can be implemented independently of the network layer architecture or a network layer security device. The key distribution technique is suitable for client-server architectures such as electronic mail, where the number of users is large and connectivity is diverse.<<ETX>>\",\"PeriodicalId\":394587,\"journal\":{\"name\":\"MILCOM 92 Conference Record\",\"volume\":\"16 3\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1992-10-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"MILCOM 92 Conference Record\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MILCOM.1992.244144\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"MILCOM 92 Conference Record","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MILCOM.1992.244144","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
It is pointed out that security at the network layer cannot provide application-specific services associated with electronic mail such as signed receipts and digital signatures. These deficiencies can be remedied by providing end user to end user security where mail messages are black (protected/encrypted) at all intermediate points. The authors describe the approach and implementation taken in building such a mail security device. Mail messages are protected along the entire path from originator to recipient. The messages are protected during storage and processing at all intermediate points. the security can be implemented independently of the network layer architecture or a network layer security device. The key distribution technique is suitable for client-server architectures such as electronic mail, where the number of users is large and connectivity is diverse.<>