email-security.net
What Email Needs
http://www.email-security.net/papers/what_email_needs.htm
This is a public discussion paper. It may change frequently. An up-to-date copy is available at http:/ email-security.net/papers/what email needs.htm. E Gerck, Ph.D. This is a public discussion paper on email security. The paper is published in sections, each section presented after sufficient time for feedback. Join the discussion in the Blog. And help shape this paper and its conclusions. 1 Why Is Email Encryption Not Used? Other sections to be published). Many medicines is a sign of no cure. However, ...
email-security.net
Papers
http://www.email-security.net/papers/index.html
30 days free secure email for desktop, web, and mobile. We build stable and secure web applications tailored to your business needs. Take Five" In Internet Security. Read the Compact Version. The top security problem facing Internet users today is not email or even about email, however it deeply affects email security. This problem is well-known yet we meekly accept it "as it is" everyday. But the paradigm may shift in five minutes. Ed Gerck, Ph.D. and Vernon Neppe, M.D., Ph.D. Ed Gerck, Ph.D. This work ...
email-security.net
Compact Version: "Take Five" In Internet Security
http://email-security.net/papers/takefivecompact.htm
Take Five" In Internet Security. This is a compact version of the full paper. Read the Full Paper. Ed Gerck, Ph.D. Vernon Neppe, M.D., Ph.D. Published online at http:/ email-security.net/papers/takefivecompact.htm. We need your help. We are conducting a study of user login and access control systems using this methodology. You may participate anonymously. Please Post Your System's Answer To The Five Questions. Q1: Can you use strong authentication as provided by cryptography to control user access? Let's...
email-security.net
"Take Five" In Internet Security
http://www.email-security.net/papers/takefive.htm
Take Five" In Internet Security. This is a public discussion paper. It may change frequently. Read the Compact Version. Ed Gerck, Ph.D. Vernon Neppe, M.D., Ph.D. Published online at http:/ email-security.net/papers/takefive.htm. We need your help. We are conducting a study of user login and access control systems using this methodology. You may participate anonymously. Please Post Your System's Answer To The Five Questions. Q2: How is user access controlled? For example, an employee, a technician? A: Our...
email-security.net
COMPARISON OF SECURE EMAIL TECHNOLOGIES X.509 / PKI, PGP, andIBE
http://www.email-security.net/papers/pki-pgp-ibe.htm
Replace Postini for Google Apps with ZSentry for Message Encryption. Also for Gmail, Android, iPhone, and more. NEW PAPER: "Take Five" In Internet Security. Comparison Of Secure Email Technologies. X509 / PKI, PGP, and IBE. This work is now expanded in:. Gerck, E., Secure Email Technologies X.509/PKI, PGP, IBE and Zmail, in Corporate Email Management, Chapter 12, edited by Krishna SJ, Raju E. Hyderabad, India, ICFAI University Press, 2007, pp. 171-196. Read the reprint (PDF). Please see the Blog. Notwith...