TY - GEN
T1 - Access revocation and prevention of false repudiation in secure email exchanges
AU - Bai, L.
AU - Achuthanandam, R.
AU - Kam, M.
N1 - Publisher Copyright:
© 2001 IEEE.
PY - 2001
Y1 - 2001
N2 - A secure email protocol (SEP) is introduced to provide a decentralized means of revoking trust access and preventing false repudiation. Verification of the exchange of a message between sender and recipient is accomplished through an identification cookie (IC) and an encryption key (EK) handled by Verification and Authentication Agents (VAAs). The communicated narrative is encrypted by the EK. The augmented message is then encrypted again using one of the widely available encryption algorithms, such as the Pretty Good Privacy (PGP) scheme, and sent to the addressee. The extracted IC serves as a label which the addressee uses to obtain the EK from the sender's VAA. Once the addressee possesses the message's EK, s/he is able to decrypt the narrative, verify that the IC is correct, and the process is complete. Quick revocation of access privileges and cancellation of old messages is achieved by deleting ICs not requested by the addressee. The structure of the message body is written in the eXtensive Markup Language (XML) to take advantage of the language's extendibility and compatibility features.
AB - A secure email protocol (SEP) is introduced to provide a decentralized means of revoking trust access and preventing false repudiation. Verification of the exchange of a message between sender and recipient is accomplished through an identification cookie (IC) and an encryption key (EK) handled by Verification and Authentication Agents (VAAs). The communicated narrative is encrypted by the EK. The augmented message is then encrypted again using one of the widely available encryption algorithms, such as the Pretty Good Privacy (PGP) scheme, and sent to the addressee. The extracted IC serves as a label which the addressee uses to obtain the EK from the sender's VAA. Once the addressee possesses the message's EK, s/he is able to decrypt the narrative, verify that the IC is correct, and the process is complete. Quick revocation of access privileges and cancellation of old messages is achieved by deleting ICs not requested by the addressee. The structure of the message body is written in the eXtensive Markup Language (XML) to take advantage of the language's extendibility and compatibility features.
UR - http://www.scopus.com/inward/record.url?scp=84964009104&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84964009104&partnerID=8YFLogxK
U2 - 10.1109/ISADS.2001.917447
DO - 10.1109/ISADS.2001.917447
M3 - Conference contribution
AN - SCOPUS:84964009104
T3 - Proceedings - 5th International Symposium on Autonomous Decentralized Systems, ISADS 2001
SP - 419
EP - 425
BT - Proceedings - 5th International Symposium on Autonomous Decentralized Systems, ISADS 2001
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 5th International Symposium on Autonomous Decentralized Systems, ISADS 2001
Y2 - 26 March 2001 through 28 March 2001
ER -