Article

An advanced email service based on a new correspondence model

Authors:
To read the full-text of this research, you can request a copy directly from the author.

Abstract

The ease of use and efficiency of the email service contributed to its widespread adoption. It became an essential service and authorizing multiples and various uses (private, professional, administrative, governmental, military ...). However, all existing systems are technically reduced to the implementation of global policies, compiling in a static way a limited set of features. These approaches prevent differentiated adaptations of the system to the uses. The rigid and monolithic nature of these policies can moreover lead to unnecessary execution of expensive treatments or to the inability to simultaneously satisfy conflicting requirements. We address this problem of the evolution of e-mail in the general context of interpersonal communication of a sender to a receiver. We identify the sender's intention of communication, as a key parameter of any interpersonal communication, insofar as it allows to finely discriminate the successful communications, between all the ones that are understood. A second parameter which is orthogonal to the first, defined as the context of the sender, is important because it allows to determine the successful aspect of an interpersonal communication. The declination of these two parameters in the electronic mail led us to define the concept of electronic correspondence. This one is a generalization of the email the implementation of which provides a sufficient condition of qualification successful exchanges via this medium. A correspondence allows taking into account for each message, the intention of communication and context of its sender. Its implementation requires in certain points of the network, the enforcement of specific policies depending of an administrative domain and which take as argument the intention of communication and the current context of the sender. A second benefit provided by this concept concerns the level of customization of messaging reaching a maximum granularity, because it can be applied in a differentiated way, to each message instance. These works led to the description of a representative architecture and the definition of three extensions to existing standards (SUBMISSION, IMF and S/MIME). Our approach has been illustrated through two main use cases, compliant with recommended specifications for administration (RGS - Référentiel Général de Sécurité) and military (MMHS - Military Message Handling System) domains.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the author.

ResearchGate has not been able to resolve any citations for this publication.
Article
Full-text available
Taking into account that the medical practice and health systems have evolved considerably nowadays, medical establishments require the implementation of marketing guidelines to help maximize performance, with beneficial effects from the social, economic, and medical point of view, to differentiate from competitors. Communication is a fundamental clinical skill that, if performed competently and efficiently, facilitates the establishment of a relationship of trust between the medical staff and the patient-customer, a truly therapeutic alliance. In addition to the medical personnel’s competence and the facilities at the doctor’s disposal, the willingness manifested during consultation, kindness, openness and attention are offered to patients-customers. The way medical personnel responds to their needs and requests is an element that boosts performance, contributing to an increase in the prestige of the medical unit and the growing interest of patients-customers in it.
Article
Full-text available
Information systems are frequently exposed to various types of threats which can cause different types of damages that might lead to significant financial losses. Information security damages can range from small losses to entire information system destruction. The effects of various threats vary considerably: some affect the confidentiality or integrity of data while others affect the availability of a system. Currently, organizations are struggling to understand what the threats to their information assets are and how to obtain the necessary means to combat them which continues to pose a challenge. To improve our understanding of security threats, we propose a security threat classification model which allows us to study the threats class impact instead of a threat impact as a threat varies over time. This paper addresses different criteria of information system security risks classification and gives a review of most threats classification models. We define a hybrid model for information system security threat classification in order to propose a classification architecture that supports all threat classification principles and helps organizations implement their information security strategies.
Article
Full-text available
Phishing email is one of the major problems of today's Internet, resulting in financial losses for organizations and annoying individual users. Numerous approaches have been developed to filter phishing emails, yet the problem still lacks a complete solution. In this paper, we present a survey of the state of the art research on such attacks. This is the first comprehensive survey to discuss methods of protection against phishing email attacks in detail. We present an overview of the various techniques presently used to detect phishing email, at the different stages of attack, mostly focusing on machine-learning techniques. A comparative study and evaluation of these filtering methods is carried out. This provides an understanding of the problem, its current solution space, and the future research directions anticipated.
Article
Full-text available
This paper describes an intelligent system to help people share and filter information communicated by computer-based messaging systems. The system exploits concepts from artificial intelligence such as frames, production rules, and inheritance networks, but it avoids the unsolved problems of natural language understanding by providing users with a rich set of semi-structured message templates. A consistent set of “direct manipulation” editors simplifies the use of the system by individuals, and an incremental enhancement path simplifies the adoption of the system by groups. One of the key problems that arises when any group of people cooperates to solve problems or make decisions is how to share information. Thus one of the central goals of designing good “organizational interfaces” (Malone, 1985) should be to help people share information in groups and organizations. In this paper, we will describe a prototype system, called the Information Lens, that focuses on one aspect of this problem: how to help people share the many diverse kinds of qualitative information that are communicated via electronic messaging systems. It is already a common experience in mature computer-based messaging communities for people to feel flooded with large quantities of electronic “junk mail” (Denning, 1982; Palme, 1984; Wilson, 1984; Hiltz & Turoff, 1985), and the widespread availability of inexpensive communication capability has the potential to overwhelm people with even more messages that are of little or no value to them. At the same time, it is also a common experience for people to be ignorant of facts that would facilitate their work and that are known elsewhere in their organization. The system we will describe helps solve both these problems: it helps people filter, sort, and prioritize messages that are already addressed to them, and it also helps them find useful messages they would not otherwise have received. The most common previous approach to structuring information sharing in electronic messaging environments is to let users implicitly specify their general areas of interest by associating themselves with centralized distribution lists or conference topics related to particular subjects (e.g., Hiltz & Turoff, 1978). Since these methods of disseminating information are often targeted for relatively large audiences, however, it is usually impossible for all the information distributed to be of interest to all recipients. The Information Lens system uses much more detailed representations of message contents and receivers' interests to provide more sophisticated filtering possibilities. One of the key ideas behind this system is that many of the unsolved problems of natural language understanding can be avoided by using semi-structured templates (or frames) for different types of messages. These templates are used by the senders of messages to facilitate composing messages in the first place. Then, the same templates are used by the receivers of messages to facilitate constructing a set of rules to be used for filtering and categorizing messages of different types.
Article
As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects. Author Jason Andress gives you the basic knowledge needed to understand the key concepts of confidentiality, integrity, and availability, and then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security. The Basics of Information Security gives you clear-non-technical explanations of how infosec works and how to apply these principles whether youre in the IT field or want to understand how it affects your career and business. The new Second Edition has been updated for the latest trends and threats, including new material on many infosec subjects. Learn about information security without wading through a huge textbook Covers both theoretical and practical aspects of information security Provides a broad view of the information security field in a concise manner All-new Second Edition updated for the latest information security trends and threats, including material on incident response, social engineering, security awareness, risk management, and legal/regulatory issues.
Article
My thesis is about the modelization of the communicative intentions of human-computer dialog systems in natural language and more generally, about any artificial agent. The goal is to propose a model of processing that gives its own communicative intentions to the computer to interact with human users, so that optimal relevance of the computer utterances is certified. My model is based upon the idea that the sense exchanged between dialog participants is not a pre-existing sense but, by opposition, a sense negotiated and co-constructed by participants during the dialog. This co-construction depends on the hypothesis of the existence of a common ground, that is a knowledge set assumptions and believes that the speaker thinks to be shared. My work has consisted in defining a computer interactional memory allowing the sense negotiation task. This memory contains elements of three different states organized in tree diagrams. These elements become from interpretations of user's illocutionary acts and from inferences of the activities of the dialog system. We distinguish three activities: the applicative activity performs any service to the human user, the linguistic activity analyzes user utterances and generates system utterances, and the dialogical activity converses with the human user in the sense previously defined. Computer communicative intentions are generated from the recognition of a set of configurations that I have defined by analyzing empirically the possible tree structures. This principle that gives computer speech acts, is general and independent of the field application. It is just based on the structural shape of the memory elements (called MMU for Minimal Memory Unit) and the state of these elements.
Article
RESUME. Les infrastructures à clé publique (PKIs : acronyme anglais) sont essentielles pour fournir les services de sécurité dans des réseaux ouverts comme Internet. Dans cet article nous proposons une logique de croyance pour l'analyse formelle du modèle de confiance d'une PKI . Notre formalisme utilise le langage des prédicats pour décrire le modèle de confiance d'une PKI. Ce langage permet de formaliser les certificats du modèle et les croyances de ses entités quant à l'authenticité des clés publiques des autres entités et la confiance qu'elles peuvent avoir dans ces entités. Nous tenant compte dans ce formalisme du nombre d'intermédiaires qui ont permis à une entité d'aboutir à une croyance ainsi que des contraintes relatives aux politiques de certificat et aux pratiques de certification des CAs de la PKI. En introduisant ces paramètres nous pouvons vérifier sous quelles conditions un modèle répond ou non aux objectifs pour lesquels la PKI a été utilisée. ABSTRACT. Public-Key Infrastructures (PKIs) are essential for providing security services in open networks like Internet. We propose in this paper a logic-based approach for reasoning about PKI trust model. Our formalism uses the predicate calculus language to describe a PKI trust model. It allows us to formalize the certificates of the model and the statements about entities beliefs with regard to public key authenticity and CAs trustworthiness. In this formalism, we take into account the number of intermediates that have participated in an entity belief, the trust level in a statement and the constraints that can be the concern of certificate policies of PKI's CAs. By using these constraints we can verify whether a model responds to the objectives for which the PKI has been used and on the basis of which assumptions.
Conference Paper
Messaging service still remains fundamental for military operations. This service is an important tool to fulfill missions, either in time of peace or in time of crisis. Military operational needs must comply with specific requirements. Military standards describe the services that meet these needs. For different reasons, current military messaging standards became obsolete and the definition of new military standards has become necessary. Studies have shown that it is possible to rely on Internet standards to design a new military messaging system but some services may not be covered by these standards, for example, securing a military message involves defining new security mechanism. This paper presents the design of an extension of the S/MIME standard that meets the security requirements applicable to military messages.
Article
Facing an increasing number of threats and stricter business regulations, organisations are continually challenged with ensuring that security and compliance across the IT infrastructure is sufficient. While scams and tricks are hardly new, the speed and reach of them has been magnified enormously with the world's increasing dependence on the Internet, email and social media. In particular, the proliferation of email within the workplace has not only facilitated the success of businesses, it has also opened a door to substantial security threats. The rise of attacks like spear-phishing means that organisations need to revise their ideas about how they protect themselves. While scams and tricks are hardly new, the speed and reach of them has been magnified enormously with the world's increasing dependence on the Internet, email and social media. Spear-phishing, in particular, exploits people's trust, and the results can be devastating. Bimal Parmar of Faronics argues that defence in depth is the answer, and that we need to move away from relying on conventional anti-virus solutions towards greater use of whitelisting and system restore capabilities.
Article
This paper discusses the possibility of adopting the concept of knowledge based systems [KBS], in general, and conceptual maps, in particular, in email classification system. Needless to say that email has the potential to improve efficiency and reduce costs involved in communication. Even after the advent of newer technologies such as instant messaging and VoIP, email remains the top most application of the Internet, intranets and extranets. Though the email system is popular, powerful, cost-effective and efficient, it has some shortcomings viz., [a] it remains an unmanaged medium and [b] it is a vast store of unstructured information. Hence, email database will effectively be used by the knowledge workers only if: [a] it enables classification within stringent legitimate frame work [b] it can be searched/sorted and mined in ways that make it useful. Email classification, a technique for adding metadata and visual labels to email, offers an effective strategy for managing and controlling email. Most of the existing systems are based on term-based classification schemes. To achieve better accuracy, semantic information must be made use of. This proposed system could be an add-on application of existing computational as well as term-based methods.
Article
STD 11, RFC 822, defines a message representation protocol specifying considerable detail about US-ASCII message headers, and leaves the message content, or message body, as flat US-ASCII text. This set of documents, collectively called the Multipurpose Internet Mail Extensions, or MIME, redefines the format of messages to allow for (1) textual message bodies in character sets other than US-ASCII,
Article
Status of this Memo This RFC specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract This memo describes an extension to the message format defined in RFC 1521 (1), to allow the representation of character sets other than ASCII in RFC 822 (STD 11) message headers. The extensions described were designed to be highly compatible with existing Internet mail handling software, and to be easily implemented in mail readers that support RFC 1521.
Article
Many Internet applications have been designed to deduce top-level domains (or other domain name labels) from partial information. The introduction of new top-level domains, especially non-country-code ones, has exposed flaws in some of the methods used by these applications. These flaws make it more difficult, or impossible, for users of the applications to access the full Internet. This memo discusses some of the techniques that have been used and gives some guidance for minimizing their negative impact as the domain name environment evolves. This document draws summaries of the applicable rules together in one place and supplies references to the actual standards.
Article
This document describes an additional content type for the Cryptographic Message Syntax (CMS). The authenticated-enveloped-data content type is intended for use with authenticated encryption modes. All of the various key management techniques that are supported in the CMS enveloped-data content type are also supported by the CMS authenticated-enveloped-data content type.
Article
This document is an Internet-Draft. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." To learn the current status of any Internet-Draft, please check the "1id-abstracts.txt " listing contained in the Internet-Drafts Shadow Directories on ds.internic.net (US East Coast), nic.nordu.net (Europe), ftp.isi.edu (US West Coast), or munnari.oz.au (Pacific
Article
This document is a self-contained specification of the basic protocol for the Internet electronic mail transport. It consolidates, updates and clarifies, but doesn't add new or change existing functionality of the following: - the original SMTP (Simple Mail Transfer Protocol) specification of RFC 821 [30], - domain name system requirements and implications for mail transport from RFC 1035 [22] and RFC 974 [27], - the clarifications and applicability statements in RFC 1123 [2], and - material drawn from the SMTP Extension mechanisms [19]. It obsoletes RFC 821, RFC 974, and updates RFC 1123 (replaces the mail transport materials of RFC 1123). However, RFC 821 specifies some features that were not in significant use in the Internet by the mid-1990s and (in appendices) some additional transport models. Those sections are omitted here in the interest of clarity and brevity; readers needing them should refer to RFC 821. It also includes some additional material from RFC 1123 that required amplification. This material has been identified in multiple ways, mostly by tracking flaming on various lists and newsgroups and problems of unusual readings or interpretations that have appeared as the SMTP extensions have been deployed. Where this specification moves beyond consolidation and actually differs from earlier documents, it supersedes them technically as well as textually. Although SMTP was designed as a mail transport and delivery protocol, this specification also contains information that is important to its use as a 'mail submission' protocol, as recommended for POP [3, 26] and IMAP [6]. Additional submission issues are discussed in RFC 2476 [15]. Section 2.3 provides definitions of terms specific to this document. Except when the historical terminology is necessary for clarity, this document uses the current 'client' and 'server' terminology to identify the sending and receiving SMTP processes, respectively. A companion document [32] discusses message headers, message bodies and formats and structures for them, and their relationship. ---------------- Note that this document is considered obsolete and should probably not be referenced except for historical purposes. It has been replaced by RFC 5321 with the same title. Copies of them can be obtained from http://www.rfc-editor.org/info/rfc2821 or http://www.rfc-editor.org/info/rfc5321.
Article
This paper gives an overview of unsolicited email and the techniques available to defend oneself against it. It covers the most inuential theories behind all major spam ltering software, including, but not limited to: simple pattern matching (pattern matching of words), statistical pattern matching (algorithms that perform heuristic tests on the header and text of the email, namely Naive Bayesian and ), blacklists (Internet databases which are queried upon relaying an email and matched to a blacklist of known spammers), and collaborative spam-tracking databases (like Spamassassin).
Article
Over its thirty-five-year history, Internet Mail has changed significantly in scale and complexity, as it has become a global infrastructure service. These changes have been evolutionary, rather than revolutionary, reflecting a strong desire to preserve both its installed base and its usefulness. To collaborate productively on this large and complex system, all participants need to work from a common view of it and use a common language to describe its components and the interactions among them. But the many differences in perspective currently make it difficult to know exactly what another participant means. To serve as the necessary common frame of reference, this document describes the enhanced Internet Mail architecture, reflecting the current service.
Article
Email has become a popular distribution service for a variety of socially unacceptable, mass-effect purposes. The most obvious ones include spam and worms. This note recommends conventions for the operation of email submission and transport services between independent operators, such as enterprises and Internet Service Providers. Its goal is to improve lines of accountability for controlling abusive uses of the Internet mail service. To this end the document offers
Article
The input/output automation model has recently been defined, in (LT1, LT2), as a tool for modeling concurrent and distributed discrete event systems of the sorts arising in computer science. Since its introduction, the model has been used for describing and reasoning about several different types of systems, including network resource allocation algorithms, communication algorithms, concurrent database systems, shared atomic objects, and dataflow architectures. This paper is intended to introduce researchers to the model. It is organized as follows. Section 2 contains an overview of the model. Section 3 defines the model formally and examines several illustrative examples concerning candy vending machines. Section 4 contains a second example, a leader election algorithm. Finally, Section 5 contains a survey of some of the uses that have so far been made of the model. Keywords: I/O automata, Asynchronous systems, Concurrency, Computer modeling, Data transfer.
Article
In designing computer-based systems, we work within a perspective that shapes the design questions that will be asked and the kinds of solutions that are sought. This paper introduces a perspective based on language as action, and explores its consequences for practical system design. The language/action perspective is contrasted to a number of other currently prominent perspectives, and is illustrated with an extended example based on studies of nursing work in a hospital ward. We show how it leads to particular analyses of that work, which reveal potentials for creating new designs that can make the work (and the workers) more effective.
Article
STD 11, RFC 822, defines a message representation protocol specifying considerable detail about US-ASCII message headers, and leaves the message content, or message body, as flat US-ASCII text. This set of documents, collectively called the Multipurpose Internet Mail Extensions, or MIME, redefines the format of messages to allow for
Article
draft-ietf-notary-mime-delivery-03.txt Status of this Memo This document is an Internet-Draft. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as ‘‘work in progress.’’ To learn the current status of any Internet-Draft, please check the ‘‘1id-abstracts.txt’ ’ listing contained in the Internet- Drafts Shadow Directories on ftp.is.co.za (Africa), nic.nordu.net (Europe), munnari.oz.au (Pacific Rim), ds.internic.net (US East Coast), or ftp.isi.edu (US West Coast). This memo defines a MIME content-type that may be used by a message transfer agent (MTA) or mail gateway to report the result of an attempt to deliver a message to one or more recipients. This content-type is meant to be a machine-processable alternative to the full range of electronic mail delivery status notifications currently in use in the Internet. 1.
Article
An abstract is not available.