Mail Infrastructure using Trusted Identities
Not what you're looking for?
How can we secure mail infrastructure using trusted identities?
What can be the trust criterias?
How mail transfer works and how the notion of trust should be introduced?
Why do we need identity based trust?
What can be the related works?
What can be a new approach to secure mail infrastructure?
Purchase this Solution
Solution Summary
How can we secure mail infrastructure using trusted identities?
Solution Preview
How can we secure mail infrastructure using trusted identities?
In an identity-based encryption scheme, data is encrypted using an arbitrary string as the key. For decryption, a decryption key is mapped to the arbitrary encryption key by a key authority. An email message is encrypted using the recipient's email address as the public key. It is not necessary that the recipient has already installed any software or generated a pair of keys.
When the encrypted email arrives, the recipient can request - upon authentication - a private key that allows them to decrypt all emails encrypted using their email address as the public key.
Certificates and certificate authorities are not necessary for communication to be secure. Authentication between recipient and key authority is crucial, however.
Reference: http://email.about.com/od/secureemailbyencryption/g/ibe.htm
What can be the trust criterias?
For a new identity that is hired in the organization, ie, a new employee, trust is obtained as part of the HR process. If the identity is external, such as a vendor or customer, trust has to be ...
Education
- BCom, SGTB Khalsa College, University of Delhi
- MBA, Rochester Institute of Technology
Recent Feedback
- "Thank you. "
- "Thank you"
- "Thank you. I got 20/20 last week for my discussion you help me out with."
- "Thank you. Great Job. "
- "Thank you. Great Job. "
Purchase this Solution
Free BrainMass Quizzes
C++ Operators
This quiz tests a student's knowledge about C++ operators.
Basic Networking Questions
This quiz consists of some basic networking questions.
Word 2010: Table of Contents
Ever wondered where a Table of Contents in a Word document comes from? Maybe you need a refresher on the topic? This quiz will remind you of the keywords and options used when working with a T.O.C. in Word 2010.
Basic Computer Terms
We use many basic terms like bit, pixel in our usual conversations about computers. Are we aware of what these mean? This little quiz is an attempt towards discovering that.
Excel Introductory Quiz
This quiz tests your knowledge of basics of MS-Excel.