TITLE

A free way to establish identity

PUB. DATE
July 1999
SOURCE
Network World;07/05/99, Vol. 16 Issue 27, p58
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Proposes the use of digital signatures as a way to control unsolicited commercial e-mail or spam. Use of digital signatures to establish the identity of the e-mail sender; Need to establish a way to authorize digital certificate issuers; Factors that are expected to boost the demand for digital certificates.
ACCESSION #
2685676

 

Related Articles

  • Internet Irregularities. Denes, Shary // Rural Telecommunications;Jul/Aug2003, Vol. 22 Issue 4, p9 

    Discusses the results of a survey conducted by Tenax Inc., an information technology consulting company, on its members' use of the Internet and electronic mail (e-mail) systems. Amount of downloaded and installed software by respondents from the Internet; Percentage of e-mail sent by...

  • Spamonomics 101. Evans, M. Stanton // Consumers' Research Magazine;Jul2003, Vol. 86 Issue 7, p5 

    Comments on the growing spam or unsolicited E-mail messages crisis. Problems posed by spam to E-mail recipients; Array of schemes available to fight spam; Criticism on the existing E-mail grid.

  • Spam Invades India.  // Information Management Journal;May/Jun2006, Vol. 40 Issue 3, p16 

    The article reports on the increase in the number of Indian Internet users that are receiving spam in 2006, according to e-mail security company MessageLabs' Intelligence Report. The increase can be deduced from the fact that since spammers found it increasingly difficult to practice their trade...

  • ETC show explores authentication. Sturdevant, Cameron // eWeek;7/12/2004, Vol. 21 Issue 28, p61 

    Center stage at the first E-mail Technology Conference held in San Francisco, Francisco, was the issue of trust between message senders and receivers. Several facets of this thorny spam-related issue shared the spotlight. Authenticating sender identity is edging closer to commercial viability....

  • Microsoft stops McDonald serving spam. Nettleton, Ewan; Jensen, William // Journal of Database Marketing & Customer Strategy Management;Apr2007, Vol. 14 Issue 3, p254 

    Spam is a global problem. Having come about as an unwanted side effect of the ease of use of the internet and e-mailing, it is more than a mere inconvenience to e-mail recipients and their IT Departments. Recent estimates suggest that between 50 and 60 per cent of all e-mails sent today are...

  • WAR ON SPAM. Overholt, Alison // Fast Company;Jul2003, Issue 72, p32 

    Presents information on the formation of the Anti-Spam Research Group, a global group which aims to eliminate spam. Prevalence of spam, according to a study conducted by ASRG.

  • You've got mail--tons of it. Johnson, Dave // Industrial Safety & Hygiene News;Aug2003, Vol. 37 Issue 8, p6 

    Editorial. Presents viewpoints concerning the challenges faced by information technology managers on electronic mail downtime in Great Britain. Percentage rate of increase of spam sent worldwide; Consideration of the name-change idea on a list-service; Estimation of the amount of hours spent...

  • Keep It? Delete It? Forward It? Brill, Alan // Young Lawyer;Apr2009, Vol. 13 Issue 6, p1 

    The article offers suggestions on for streamlining e-mail communications. It is stated that if one receives too much of spam that the information technology (IT) of the company to run software that removes such e-mail arriving at a company. It is stated that e-mail is not a particularly secure...

  • Making E-mail Identity Work. Udell, Jon // InfoWorld;3/15/2004, Vol. 26 Issue 11, p31 

    This article criticizes the failure of information technology (IT) departments to eradicate spam messages. The scheme requires the sender to send Central Processing Unit cycles generating an identification number for each message. Every time an identity-spoofing worm shows up, IT experts...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics