1 |
Abadi, M. et al., "Certified E-mail with a light on Line Trusted Third Party: Design and Implementation," Proceedings of the Eleventh International World Wide Web Conference, Vol.2, pp.387-395, May, 2002.
|
2 |
Pollock, S. "A Rule-Based Message Filtering System," ACM Transactions on Office Information Systems, vol. 6, no. 3, pp.232-254, July 1988.
DOI
|
3 |
Cynthia, D. and N, Moni "Pricing via processing or combatting junk mail," In Proceedings of Advances in Cryptology - CRYPTO' 92, pp 139-147, 1992.
|
4 |
Wendy E. Mackay, "Diversity in the Use of Electronic Mail:A preliminary Inquiry," ACM Transactions on Office Information Systems, vol. 6, no. 4, pp.380-397, Oct. 1988.
DOI
|
5 |
Lawrence E. Hughes, "Internet E-mail; Protocols, Standards, and Implementation," Artech House, 1998.
|
6 |
Young soo, kim, "Design and Implementation of Authentication Protocol in the Message Security System," Ph.D. of MIS Paper, Kookmin University, 2003.
|
7 |
David A. Turner, Daniel M. Havey, Controlling spam through lightweight currency," In Proceedings of the Hawaii International Conference on Computer Sciences, pp.1-9, 2003.
|
8 |
Jajodia, S., et al., "Flexible Support for Multiple Access control Policies," ACM Trans. on Database Systems, vol. 26, no. 2, pp. 214-260, June 2001.
DOI
ScienceOn
|
9 |
Sandhu, R., et al., "Role Based Access Control Models," IEEE Computer, vol. 29, no. 2, pp. 38-47, Feb. 1996.
|
10 |
Yao. C., "Theory and applications of trapdoor functions," in Proceedings of the Twenty-Third Annual IEEE Symposium on Foundations of Computer Science, pp. 80-91, 1982.
|
11 |
Telang, R. "Information Overload and Pricing of Communication Services," Carnegie Mellon University Working Paper, 2002.
|
12 |
Fahlman, S., "A way to control unwanted E-mail and telephone calls," IBM Systems Journal, vol. 41, no. 4, pp.759-766, June, 2002.
DOI
ScienceOn
|
13 |
Hoffman, P. "SMTP service extension for secure SMTP over Transport Layer Security," IETF, RFC3207, Feb. 2002.
|
14 |
Jonscher, D., R, Dittrich, "A Configurable Access Control System Interoperable Environment," In Proceedings of the ninth annual IFIP TC11 WG11.3 working conference on Database security IX, pp43-60, 1996.
|
15 |
Joshi, J.B.D. et al., "Security Models for Web-based Applications," Communications of the ACM, vol. 44, no. 2, pp. 38-44, Feb. 2001.
|