Premium
A proxy approach to e‐mail security
Author(s) -
Brown Ian,
Snow C. R.
Publication year - 1999
Publication title -
software: practice and experience
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.437
H-Index - 70
eISSN - 1097-024X
pISSN - 0038-0644
DOI - 10.1002/(sici)1097-024x(199910)29:12<1049::aid-spe271>3.0.co;2-1
Subject(s) - computer science , the internet , proxy (statistics) , proxy server , computer security , software , internet security , world wide web , operating system , security service , information security , machine learning
New Internet applications and new releases of existing Internet applications appear with bewildering rapidity. Adding functionality to such applications can therefore be a time‐consuming process. By contrast, Internet protocols are significantly less volatile. In some circumstances, the additional functionality can be provided by ‘tapping into’ the protocol exchanges rather than modifying the applications themselves. We claim that this represents a more manageable approach to the problem of adding additional facilities to applications. We demonstrate this approach using the example of e‐mail security. Whenever possible, a proxy sitting between a mail client and server signs and encrypts outgoing mail. Incoming secured mail is automatically decrypted and verified. This means that any software that works with standard mail protocols gains security without requiring separate upgrading. The proxy attempts to keep the amount of user interaction required to a minimum providing security functionality for users without the need to learn a complex new user interface.Copyright © 1999 John Wiley & Sons, Ltd.