[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Wiegel, 1996 - Google Patents

Secure external references in multimedia email messages

Wiegel, 1996

View PDF
Document ID
9996427290285916275
Author
Wiegel B
Publication year
Publication venue
Proceedings of the 3rd ACM conference on Computer and communications security

External Links

Snippet

Security enhancements tailored for the special needs of Multimedia Email Messages are under development within the BERKOM project funded by the German PIT. To solve the problems caused by transferring high volume, multimedia data External References have …
Continue reading at dl.acm.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
    • G06Q10/107Computer aided management of electronic mail
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F5/00Methods or arrangements for data conversion without changing the order or content of the data handled
    • G06F5/06Methods or arrangements for data conversion without changing the order or content of the data handled for changing the speed of data flow, i.e. speed regularising or timing, e.g. delay lines, FIFO buffers; over- or underrun control therefor
    • G06F5/10Methods or arrangements for data conversion without changing the order or content of the data handled for changing the speed of data flow, i.e. speed regularising or timing, e.g. delay lines, FIFO buffers; over- or underrun control therefor having a sequence of storage locations each being individually accessible for both enqueue and dequeue operations, e.g. using random access memory
    • G06F5/12Means for monitoring the fill level; Means for resolving contention, i.e. conflicts between simultaneous enqueue and dequeue operations

Similar Documents

Publication Publication Date Title
US6904521B1 (en) Non-repudiation of e-mail messages
US7796760B2 (en) Approach for managing access to messages using encryption key management policies
US5689566A (en) Network with secure communications sessions
Kent Internet privacy enhanced mail
US6442686B1 (en) System and methodology for messaging server-based management and enforcement of crypto policies
US7277549B2 (en) System for implementing business processes using key server events
US20070174636A1 (en) Methods, systems, and apparatus for encrypting e-mail
US20030237005A1 (en) Method and system for protecting digital objects distributed over a network by electronic mail
US20020046350A1 (en) Method and system for establishing an audit trail to protect objects distributed over a network
US20050138360A1 (en) Encryption/decryption pay per use web service
Davis Defective Sign & Encrypt in S/MIME, PKCS# 7, MOSS, PEM, PGP, and XML.
EP2234323A1 (en) Information distribution system and program for the same
US20030051172A1 (en) Method and system for protecting digital objects distributed over a network
US20120089495A1 (en) Secure and mediated access for e-services
US6968458B1 (en) Apparatus and method for providing secure communication on a network
Wiegel Secure external references in multimedia email messages
Kou Networking security and standards
EP1116368B1 (en) A secure data transfer system
WO2003079165A2 (en) Ensuring policy enforcement before allowing usage of private key
KR100432611B1 (en) System for providing service to transmit and receive document based on e-mail system and method thereof
US20070079114A1 (en) Method and system for the communication of a message as well as a suitable key generator for this
Gluck Protection of Electronic Mail and Electronic Messages: Challenges andSolutions
Varadharajan Security in a distributed message handling system
Devikar et al. Security enhanced direct store delivery system
Herbert E2S Implementation Architecture