Authentication email has already been sent, please check your email box: and activate it as soon as possible.
You can login to My Profile and manage your email alerts.
If you haven’t received the email, please:
|
|
There are 2 papers published in subject: > since this site started. |
Results per page: |
Select Subject |
Select/Unselect all | For Selected Papers |
Saved Papers
Please enter a name for this paper to be shown in your personalized Saved Papers list
|
1. Analysis and design of secure email system | |||
SAMASSI Alassane,XIN Yang | |||
Computer Science and Technology 15 June 2015 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:This paper describes a secure email system especially how to design his personal email system by handling both symmetric-key and public-key techniques. The system consists of a mail server to manage the sending and receipt of the email, a data base to manage the certificates corresponding to different emails. A model is implemented to check the certificate from the certification authority then save it into the database, then another model implemented to encrypt the email by using first the symmetric-key with AES encryption then use the public key technique to encrypt the symmetric-key with RSA encryption technology before sending. A model is designed to sign the email with the sender's private key to minimize spam and others virus and threats, to be sure of the email source. With all its commands, the library OpenSSL will be a very important toolkit. As a result of the project on building automation, the tool interface used is the command line interface. All the sending email process must be transparent to the user, easily handy and especially reliable with all security precautions. | |||
TO cite this article:SAMASSI Alassane,XIN Yang. Analysis and design of secure email system[OL].[15 June 2015] http://en.paper.edu.cn/en_releasepaper/content/4643782 |
2. Research and Implementation based on RBAC role-based access model-based permissions system | |||
Liang Yongchao,Liu Peizhi | |||
Computer Science and Technology 29 September 2013 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:RBAC (Role-Based Access Control, RBAC) role-based access technology is the study of R & D results funded by the U.S. Department of Defense (Department of Defense, DoD)-. The initial research is proposed in order to prevent system-specific confidential information from unauthorized access, recent policy is applied to these applications as a commercial field.This model of system permission control contribute to better use of resources in the system and maintain system security. | |||
TO cite this article:Liang Yongchao,Liu Peizhi. Research and Implementation based on RBAC role-based access model-based permissions system[OL].[29 September 2013] http://en.paper.edu.cn/en_releasepaper/content/4561673 |
Select/Unselect all | For Selected Papers |
Saved Papers
Please enter a name for this paper to be shown in your personalized Saved Papers list
|
Results per page: |
About Sciencepaper Online | Privacy Policy | Terms & Conditions | Contact Us
© 2003-2012 Sciencepaper Online. unless otherwise stated