Browse > Article

Indirection Model and Application of Electronic Mail Control System Considering High Availability  

Kim Young Soo (국민대학교 정보관리학과)
Suh Jung Seok (나사렛대학교 인터넷정보학과)
Abstract
These days, Electronic mail is being used in everyday's life. And on the other hand, we are facing spam mails' problems. Spam mails are widely used by means of marketing in e-Commerce. To block these spam mails, we are using filtering or pricing systems. But these solutions are raising other problems such as impediment in reception or availability caused by false positive or payment resistance. To solve these problems, we propose an Indirect Model on Electronic Mail Control System(IMEMCS) which controls an unsolicited electronic mail and prevents an useful electronic mail from discarding. We design and implement the IMEMCS to enhance the usefulness and the availability. Being tested the IMEMCS to verify the usability and the efficiency, it gave us a very successful result.
Keywords
스팸메일;전자메일통제시스템;차단시스템;과금시스템;우회모델;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Jajodia, S., et al., 'Flexible Support for Multiple Access Policies,' ACM Trans. on Database Systems pp. 214-260, Jun.. 2001
2 Sandhu, R., et al., 'Role Based Access Control Models,' IEEE Computer, 29(2), 1996
3 Abadi, M. et al., 'Certified E-mail with a light on Line Trusted Third Party: Design and Implementation,' Proceedings of the Eleventh International World Wide Web Conference pp.387-395,May, 2002
4 Telang, R. 'Information Overload and Pricing of Communication Services,' Carnegie Mellon University Working Paper, 2002
5 Hoffman, P. 'SMTP service extension for secure SMTP over Transport Layer Security,' RFC3207 Feb., 2002
6 Mackay, E. 'Diversity inthe Use of Electronic Mail,' ACM Transactions on Office Information Systems, pp.380-397, 1998
7 Fahlman, S., 'A way to control unwant ed E-mail and telephone calls,' IBM Systems Journal 41, pp.759-766, June, 2002   DOI   ScienceOn
8 Jonscher, D., R, Dittrich, 'A Configurable Access Control System Interoperable Environment,' Database Security IX, Chapman and Hall. 1996
9 Joshi, J.B.D. et al., 'Security Models for Web-based Applications,' Communications of the ACM, 2. pp. 44-52, 2001
10 Pollock, S. 'A Rule-Based Message Filtering System,' ACM Transactions on Office Information Systems, pp.232-254, 1998
11 Cynthia, D. and N, Moni 'Pricing via processing or combatting junk mail,' In Processings of Crypto, pp 139-147, 1992
12 Hughes, L. 'Internet E-mail; Protocols, Standards, and Implementation,' Artech house, Norwood, MA, 1998
13 Abadi, M. et al., 'Certified E-mail with a light on Line Trusted Third Party: Design and Implementation,' n Proceedings of the Eleventh International World Wide Web Conference pp.387-3 95, May, 2002
14 김영수, 메시지보안시스템의 인증 프로토콜 설계 및 검증', 박사학위논문, 국민대학교 대학원, 2003
15 David, A. M. Daniel 'Controlling spam through lightweight currency,' In Proceedings of the Haeaii Internatio nal Conference on Computer Science, Jan. 2004
16 Yao. C., 'Theory and applications of trapdoor functions,' In Proceedings of the Twenty-Third Annual IEEE Symposium on Foundations of Computer Science, pp. 80-91, 1982