A distributed systems approach to secure Internet mail
نویسنده
چکیده
One of the obstacles to improved security of the Internet is ad hoc development of technologies with different design goals and different security goals. This paper proposes reconceptualizing the Internet as a secure distributed system, focusing specifically on the application layer. The notion is to replace specific functionality by an equivalent, based on principles discovered in research on distributed systems in the decades since the initial development of the Internet. Because of the problems in retrofitting new technology across millions of clients and servers, any options with prospects of success must support backward compatibility. This paper outlines a possible new architecture for internet-based mail which would replace existing protocols by a more secure framework. To maintain backward compatability, initial implementation could offer a web browser-based front end, but the longer-term approach would be to implement the system using appropriate models of replication. keywords: Internet security, privacy, email, distributed systems, distributed file system
منابع مشابه
A Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملA Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملA Novel Reconfiguration Mixed with Distributed Generation Planning via Considering Voltage Stability Margin
In recent years, in Iran and other countries the power systems are going to move toward creating a competition structure for selling and buying electrical energy. These changes and the numerous advantages of DGs have made more incentives to use these kinds of generators than before. Therefore, it is necessary to study all aspects of DGs, such as size selection and optimal placement and impact o...
متن کاملA Critical Functional Approach to Educational Discourses of Students and Professors over the Internet Context
This paper investigated the ways Iranian B.A and M.A students of English language and their professors represent themselves linguistically in their e-mails in general, and the ways they construct and negotiate power with regard to social and cultural norms in particular. It examined 84 e-mail messages students and professors exchanged in 2012-2013 academic year through Halliday`s Systemic Funct...
متن کاملSeparating indexes from data: a distributed scheme for secure database outsourcing
Database outsourcing is an idea to eliminate the burden of database management from organizations. Since data is a critical asset of organizations, preserving its privacy from outside adversary and untrusted server should be warranted. In this paper, we present a distributed scheme based on storing shares of data on different servers and separating indexes from data on a distinct server. Shamir...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Computers & Security
دوره 24 شماره
صفحات -
تاریخ انتشار 2005