Wiegel, 1996 - Google Patents
Secure external references in multimedia email messagesWiegel, 1996
View PDF- Document ID
- 9996427290285916275
- Author
- Wiegel B
- Publication year
- Publication venue
- Proceedings of the 3rd ACM conference on Computer and communications security
External Links
Snippet
Security enhancements tailored for the special needs of Multimedia Email Messages are under development within the BERKOM project funded by the German PIT. To solve the problems caused by transferring high volume, multimedia data External References have …
- 238000004891 communication 0 description 12
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
- G06Q10/107—Computer aided management of electronic mail
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F5/00—Methods or arrangements for data conversion without changing the order or content of the data handled
- G06F5/06—Methods or arrangements for data conversion without changing the order or content of the data handled for changing the speed of data flow, i.e. speed regularising or timing, e.g. delay lines, FIFO buffers; over- or underrun control therefor
- G06F5/10—Methods or arrangements for data conversion without changing the order or content of the data handled for changing the speed of data flow, i.e. speed regularising or timing, e.g. delay lines, FIFO buffers; over- or underrun control therefor having a sequence of storage locations each being individually accessible for both enqueue and dequeue operations, e.g. using random access memory
- G06F5/12—Means for monitoring the fill level; Means for resolving contention, i.e. conflicts between simultaneous enqueue and dequeue operations
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6904521B1 (en) | Non-repudiation of e-mail messages | |
US7796760B2 (en) | Approach for managing access to messages using encryption key management policies | |
US5689566A (en) | Network with secure communications sessions | |
Kent | Internet privacy enhanced mail | |
US6442686B1 (en) | System and methodology for messaging server-based management and enforcement of crypto policies | |
US7277549B2 (en) | System for implementing business processes using key server events | |
US20070174636A1 (en) | Methods, systems, and apparatus for encrypting e-mail | |
US20030237005A1 (en) | Method and system for protecting digital objects distributed over a network by electronic mail | |
US20020046350A1 (en) | Method and system for establishing an audit trail to protect objects distributed over a network | |
US20050138360A1 (en) | Encryption/decryption pay per use web service | |
Davis | Defective Sign & Encrypt in S/MIME, PKCS# 7, MOSS, PEM, PGP, and XML. | |
EP2234323A1 (en) | Information distribution system and program for the same | |
US20030051172A1 (en) | Method and system for protecting digital objects distributed over a network | |
US20120089495A1 (en) | Secure and mediated access for e-services | |
US6968458B1 (en) | Apparatus and method for providing secure communication on a network | |
Wiegel | Secure external references in multimedia email messages | |
Kou | Networking security and standards | |
EP1116368B1 (en) | A secure data transfer system | |
WO2003079165A2 (en) | Ensuring policy enforcement before allowing usage of private key | |
KR100432611B1 (en) | System for providing service to transmit and receive document based on e-mail system and method thereof | |
US20070079114A1 (en) | Method and system for the communication of a message as well as a suitable key generator for this | |
Gluck | Protection of Electronic Mail and Electronic Messages: Challenges andSolutions | |
Varadharajan | Security in a distributed message handling system | |
Devikar et al. | Security enhanced direct store delivery system | |
Herbert | E2S Implementation Architecture |