Improving security in computational electronic mail systems
نویسندگان
چکیده
Computational electronic mail is essentially traditional electronic mail messages with embedded programs or interpretable scripts. At the recipient’s end, the mail reading software will distinguish it from normal mail, and executes it upon confirmation by the recipient. If appropriate, output from the program can be channelled back to the sender automatically for further processing. Despite its potential for many applications, it has however, not taken off in a big way. A major reason stems from security concerns amongst users. This paper examines security issues associated with computational electronic mail systems and suggest some techniques and approaches for improving the security of such systems.
منابع مشابه
Pathology of electronic health record from the sociological perspective (qualitative research among health experts in 1398)
Technological progress and changes have affected the field of medicine and health. Also, the electronic health record is used for convenience of treatment, prevention and diagnosis, but it has advantages and disadvantages that we have studied them in this research. Method: Qualitative research methods and Grounded theory were used for the sociological study of electronic health record, and in...
متن کاملA Model based on Cloud Computing for the implementation and management IT services in Banks
In recent years, the banking industry has made significant changes in technology and communications. The expansion of electronic communications and a large number of people around the world access to the Internet, appropriate to establish trade and economic exchanges provided but high costs, lack of flexibility and agility in existing systems because of the large volume of information, confiden...
متن کاملA Model based on Cloud Computing for the implementation and management IT services in Banks
In recent years, the banking industry has made significant changes in technology and communications. The expansion of electronic communications and a large number of people around the world access to the Internet, appropriate to establish trade and economic exchanges provided but high costs, lack of flexibility and agility in existing systems because of the large volume of information, confiden...
متن کاملInformation Security Requirements for Implementing Electronic Health Records in Iran
Background and Goal: ICT development in recent years has created excellent developments in human social and economic life. One of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (EHR).The purpose of this research is to investigate the effects information securi...
متن کاملSDN Security: A Survey
The pull of Software-Defined Network- ing (SDN) is magnetic. There are few in the networking community who have escaped its impact. As the benefits of network visibility and network device programmability are discussed, the question could be asked as to who exactly will benefit? Will it be the network operator or will it, in fact, be the network intruder? As SDN devices and systems hit the mark...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Inf. Manag. Comput. Security
دوره 5 شماره
صفحات -
تاریخ انتشار 1997