Map
Index
Random
Help
Related
Subtopics
th

Topic: security issues with electronic mail

computer science > Group: security


--related--
security
electronic mail
-
computational mail
restricted electronic mail
security of remotely executed code
using hypertext for cooperative work

--referenced--
topics s-z
topics to process
Subtopic: acceptable risks up

Quote: email users accept risks of resource deprivation and non-technical attacks [boreNS11_1992]

Subtopic: spam up

Quote: measured the conversion rate for email spam; infiltrated the Storm botnet; 1e-5 to 1e-7 conversion rate [kaniC9_2009]
Quote: the profit margin for email spam is low; economically susceptible to new defenses [kaniC9_2009]

Subtopic: encrypted broadcast up

Quote: Community Information Service broadcasts encrypted messages with a key identifier [giffDK12_1985]
Quote: Vice's services prevents forged mail in Andrew and allows private bulletin boards [boreN2_1988]

Subtopic: sabotage up

Quote: work group software is liable to sabotage by co-workers [dvorJC9_1988]

Subtopic: fine-grained security up

Quote: Clearinghouse uses an access control list for each operation, domain [oppeDC10_1981]
Quote: Clearinghouse authenticates all update requests against requesters credentials [oppeDC7_1983]
Quote: Clearinghouse attaches an access control list to each domain and property [oppeDC7_1983]
Quote: Clearinghouse sentry to verify and forward internetwork requests [oppeDC10_1981]

Subtopic: worms up

Quote: defenses against worm programs must be at the host level and its application programs; not at the network level [rochJA6_1989]
Quote: Cornell worm sites which immediately disconnected hurt themselves and the community; no bug fixes and no findings reported [rochJA6_1989]
Quote: logging information was important for identifying the Cornell worm [rochJA6_1989]

Subtopic: computational email up

Quote: computational email needs to be secure; at least compared to generally accepted risks [boreNS11_1992]
Quote: risks for computational email--destruction of resources, theft of resources, and deprivation of resources [boreNS11_1992]
Quote: secure, computational email by restricted access to a single subdirectory; e.g., limit size and number of created files [boreNS11_1992]
Quote: secure, computational email by disallowing nonprintable characters [boreNS11_1992]

Subtopic: on-line calendar security up

Quote: use public entries in on-line calendars: helps meeting organizers, potential attenders, and locating individuals [paleL12_1997]
Quote: only reveal unscheduled time in on-line calendars [paleL12_1997]
Quote: most users maintain their privacy defaults as shipped; most users think the default is correct [paleL12_1997]

Related up

Group: electronic mail
-
Topic: computational mail
Topic: restricted electronic mail
Topic: security of remotely executed code
Topic: using hypertext for cooperative work

Subtopics up

acceptable risks
computational email
encrypted broadcast
fine-grained security
on-line calendar security
sabotage
spam
worms

Updated barberCB 1/05
Copyright © 2002-2023 by C.B. Barber
Thesa, Avev, and thid-... are trademarks of C.B. Barber