NSPW '97 Proceedings of the 1997 workshop on New security paradigms
IEEE Internet Computing
Bob Metcalfe on What's Wrong with the Internet: It's the Economy, Stupid
IEEE Internet Computing
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Decentralized Trust Management
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Decentralized Trust Management and Accountability in Federated Systems
HICSS '04 Proceedings of the Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSS'04) - Track 9 - Volume 9
Queue - Distributed Development
An empirical study of spam traffic and the use of DNS black lists
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
Off-the-record communication, or, why not to use PGP
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
Spamming, phishing, authentication, and privacy
Communications of the ACM - The Blogosphere
Johnny 2: a user test of key continuity management with S/MIME and Outlook Express
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
Trust but verify: accountability for network services
Proceedings of the 11th workshop on ACM SIGOPS European workshop
Understanding the network-level behavior of spammers
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
An effective defense against email spam laundering
Proceedings of the 13th ACM conference on Computer and communications security
Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications
RepuScore: collaborative reputation management framework for email infrastructure
LISA'07 Proceedings of the 21st conference on Large Installation System Administration Conference
Hi-index | 0.00 |
Email used to be the "number one killer application" of the Internet. However, misuse and abuse such as spam, phishing, and malware attacks have plagued the email systems. Considering deterrence as important as prevention and protection in countering misuse and abuse, we aim to improve the accountability in the email system beyond identification and non-repudiability. Full accountability should be an intrinsic condition for trust, and it constitutes the basis of deterrence against email misuse and abuse. Therefore, we propose to use a layered trust management framework to help email receivers eliminate their unwitting trust and provide them with accountability support. This helps systems to deter misuses and address wrongdoings. By describing and analyzing how our trust management facilitates email accountability, we also show that it can be used to improve the trustworthiness of the Internet services as a whole.