Toggle Main Menu Toggle Search

Open Access padlockePrints

Proxy approach to e-mail security

Lookup NU author(s): Dr Charles Snow


Full text for this publication is not currently held within this repository. Alternative links are provided below where available.


New Internet applications and new releases of existing Internet applications appear with bewildering rapidity. Adding functionality to such applications can therefore be a time-consuming process. By contrast, Internet protocols are significantly less volatile. In some circumstances, the additional functionality can be provided by `tapping into' the protocol exchanges rather than modifying the applications themselves. We claim that this represents a more manageable approach to the problem of adding additional facilities to applications. We demonstrate this approach using the example of e-mail security. Whenever possible, a proxy sitting between a mail client and server signs and encrypts outgoing mail. Incoming secured mail is automatically decrypted and verified. This means that any software that works with standard mail protocols gains security without requiring separate upgrading. The proxy attempts to keep the amount of user interaction required to a minimum providing security functionality for users without the need to learn a complex new user interface.

Publication metadata

Author(s): Brown I, Snow CR

Publication type: Article

Publication status: Published

Journal: Software: Practice and Experience

Year: 1999

Volume: 29

Issue: 12

Pages: 1049-1060

Print publication date: 29/09/1999

ISSN (print): 0038-0644

ISSN (electronic): 1097-024X

Publisher: John Wiley & Sons Ltd.


DOI: 10.1002/(SICI)1097-024X(199910)29:12<1049::AID-SPE271>3.0.CO;2-1


Altmetrics provided by Altmetric