Map
Index
Random
Help
th

QuoteRef: boreNS11_1992

topics > all references > ThesaHelp: references a-b



ThesaHelp:
ACM references a-e
ThesaHelp:
references a-b
Topic:
computational mail
Topic:
security issues with electronic mail
Topic:
security leaks and weaknesses
Topic:
security by secure domains
Group:
input/output

Reference

Borenstein, N.S., "Computational mail as network infrastructure for computer- supported cooperative work", ACM 1992 Conference on Computer Supported Cooperative Work, SIGCHI & SIGOIS, pp. 67-74, November 1992. Google

Quotations
68 ;;Quote: for computational email, send a program in a well-defined language; executed by the recipient
70 ;;Quote: computational email needs to be secure; at least compared to generally accepted risks
70+;;Quote: email users accept risks of resource deprivation and non-technical attacks
70 ;;Quote: risks for computational email--destruction of resources, theft of resources, and deprivation of resources
70 ;;Quote: devise a secure language by constructing secure input/output facilities for a conventional language
70+;;Quote: secure, computational email by restricted access to a single subdirectory; e.g., limit size and number of created files
70+;;Quote: secure, computational email by disallowing nonprintable characters


Related Topics up

ThesaHelp: ACM references a-e (259 items)
ThesaHelp: references a-b (396 items)
Topic: computational mail (11 items)
Topic: security issues with electronic mail (18 items)
Topic: security leaks and weaknesses (56 items)
Topic: security by secure domains (42 items)
Group: input/output   (4 topics, 74 quotes)

Collected barberCB 3/93
Copyright © 2002-2008 by C. Bradford Barber. All rights reserved.
Thesa is a trademark of C. Bradford Barber.