Beyond Identity: Addressing Problems that Persist in an Electronic Mail System with Reliable Sender Identification
نویسنده
چکیده
Many abuses of the Internet’s electronic mail system rely on its intrinsic lack of reliable sender identification, and many parties have proposed schemes to retro-fit sender identification into the system to combat such abuse. This paper considers what the spam problem and its countermeasures would be like under a theoretically ideal sender identification scheme, with some attention to the resource consumption the countermeasures entail—the economics of spam. Analysis suggests that no one single technique is likely to prove adequate, but a blended approach could be effective. Such an approach will create a need for integrated policy management facilities in future mail user agents.
منابع مشابه
iSATS: Leveraging Identity based Sender Authentication for Spam Mitigation
A vast majority of spam emails today are sent from botnets with forged sender addresses. This has attracted researchers over the years to develop email sender authentication mechanism as a promising way to verify identity of the senders. In this paper we introduce iSATS, a new email sender authentication system based on Identity-based public key cryptography. iSATS leverages an identity based s...
متن کاملنقش واسطه ای هویت معنوی در رابطه بین دلبستگی به والدین و همسالان با تابآوری
Spiritual identity defined as self identification based on spirituality and spiritual experiences, has gained increasing attention during recent years. Considering the phenomenological nature of spirituality and difficulties in its measurement, the scientific study of spiritual identity as a unified construct began a few decades ago. Considering the fact that very little quantitative research i...
متن کاملIdentity management in cloud computing in conformity with European union law? - problems and approaches pursuant to the proposal for a regulation by the European commission on electronic identification and trust services for electronic transactions in the internal market
On 4 June 2012, the EU Commission submitted a draft of a regulation on “electronic identification and trust services for electronic transactions in the internal market“ [EC12]. Due to its impact onto the infrastructure of the new German identity card (nPA) it is subject to fierce criticism, particularly from Germany. This essay seeks to address that criticism and to discuss potential approaches...
متن کاملTire Inflation Pressure Estimation Using Identification Techniques
In this research study, one of the most crucial automotive engineering problems is intended to be solved. The necessity of tire pressure monitoring system is beyond doubt. Such systems are now provided relying on expensive sensors. In this study an indirect tire pressure monitoring system is proposed, utilizing identification techniques, which will reduce the cost of monitoring considerably in ...
متن کاملTire Inflation Pressure Estimation Using Identification Techniques
In this research study, one of the most crucial automotive engineering problems is intended to be solved. The necessity of tire pressure monitoring system is beyond doubt. Such systems are now provided relying on expensive sensors. In this study an indirect tire pressure monitoring system is proposed, utilizing identification techniques, which will reduce the cost of monitoring considerably in ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004