Browse by author
Lookup NU author(s): Dr Charles Snow
Full text for this publication is not currently held within this repository. Alternative links are provided below where available.
New Internet applications and new releases of existing Internet applications appear with bewildering rapidity. Adding functionality to such applications can therefore be a time-consuming process. By contrast, Internet protocols are significantly less volatile. In some circumstances, the additional functionality can be provided by `tapping into' the protocol exchanges rather than modifying the applications themselves. We claim that this represents a more manageable approach to the problem of adding additional facilities to applications. We demonstrate this approach using the example of e-mail security. Whenever possible, a proxy sitting between a mail client and server signs and encrypts outgoing mail. Incoming secured mail is automatically decrypted and verified. This means that any software that works with standard mail protocols gains security without requiring separate upgrading. The proxy attempts to keep the amount of user interaction required to a minimum providing security functionality for users without the need to learn a complex new user interface.
Author(s): Brown I, Snow CR
Publication type: Article
Publication status: Published
Journal: Software: Practice and Experience
Print publication date: 29/09/1999
ISSN (print): 0038-0644
ISSN (electronic): 1097-024X
Publisher: John Wiley & Sons Ltd.
Altmetrics provided by Altmetric