Indirection Model and Application of Electronic Mail Control System Considering High Availability

고가용성을 고려한 전자메일통제시스템의 우회 모델 및 응용

  • 김영수 (국민대학교 정보관리학과) ;
  • 서정석 (나사렛대학교 인터넷정보학과)
  • Published : 2005.04.01

Abstract

These days, Electronic mail is being used in everyday's life. And on the other hand, we are facing spam mails' problems. Spam mails are widely used by means of marketing in e-Commerce. To block these spam mails, we are using filtering or pricing systems. But these solutions are raising other problems such as impediment in reception or availability caused by false positive or payment resistance. To solve these problems, we propose an Indirect Model on Electronic Mail Control System(IMEMCS) which controls an unsolicited electronic mail and prevents an useful electronic mail from discarding. We design and implement the IMEMCS to enhance the usefulness and the availability. Being tested the IMEMCS to verify the usability and the efficiency, it gave us a very successful result.

전자상거래를 위한 마케팅 수단으로서 전자메일이 보편적으로 사용되면서 스팸메일이 급격히 증가하고 있다. 이의 억제를 위한 전자메일통제시스템은 기술적이고 경제적 대안으로 필터시스템과 과금시스템을 사용하고 있으나 차단오류와 과금저항으로 인한 전자메일의 수신과 가용성을 제한한다. 이의 해결을 위해서 불법적인 전자메일은 억제하지만 송$\cdot$수신자에게 유익하고 합법적인 전자메일이 폐기되고 상실되는 것을 방지할 수 있는 전자메일통제시스템의 우회 모델을 제안하고 이를 사용하여 전자메일의 유용성과 가용성을 높여줄 수 있는 웹기반의 전자메일통제시스템을 구현하여 모델의 실용성을 검증하였다.

Keywords

References

  1. Abadi, M. et al., 'Certified E-mail with a light on Line Trusted Third Party: Design and Implementation,' n Proceedings of the Eleventh International World Wide Web Conference pp.387-3 95, May, 2002
  2. Pollock, S. 'A Rule-Based Message Filtering System,' ACM Transactions on Office Information Systems, pp.232-254, 1998
  3. Cynthia, D. and N, Moni 'Pricing via processing or combatting junk mail,' In Processings of Crypto, pp 139-147, 1992
  4. Mackay, E. 'Diversity inthe Use of Electronic Mail,' ACM Transactions on Office Information Systems, pp.380-397, 1998
  5. Hughes, L. 'Internet E-mail; Protocols, Standards, and Implementation,' Artech house, Norwood, MA, 1998
  6. David, A. M. Daniel 'Controlling spam through lightweight currency,' In Proceedings of the Haeaii Internatio nal Conference on Computer Science, Jan. 2004
  7. 김영수, 메시지보안시스템의 인증 프로토콜 설계 및 검증', 박사학위논문, 국민대학교 대학원, 2003
  8. Jajodia, S., et al., 'Flexible Support for Multiple Access Policies,' ACM Trans. on Database Systems pp. 214-260, Jun.. 2001
  9. Sandhu, R., et al., 'Role Based Access Control Models,' IEEE Computer, 29(2), 1996
  10. Yao. C., 'Theory and applications of trapdoor functions,' In Proceedings of the Twenty-Third Annual IEEE Symposium on Foundations of Computer Science, pp. 80-91, 1982
  11. Abadi, M. et al., 'Certified E-mail with a light on Line Trusted Third Party: Design and Implementation,' Proceedings of the Eleventh International World Wide Web Conference pp.387-395,May, 2002
  12. Telang, R. 'Information Overload and Pricing of Communication Services,' Carnegie Mellon University Working Paper, 2002
  13. Fahlman, S., 'A way to control unwant ed E-mail and telephone calls,' IBM Systems Journal 41, pp.759-766, June, 2002 https://doi.org/10.1147/sj.414.0759
  14. Hoffman, P. 'SMTP service extension for secure SMTP over Transport Layer Security,' RFC3207 Feb., 2002
  15. Jonscher, D., R, Dittrich, 'A Configurable Access Control System Interoperable Environment,' Database Security IX, Chapman and Hall. 1996
  16. Joshi, J.B.D. et al., 'Security Models for Web-based Applications,' Communications of the ACM, 2. pp. 44-52, 2001