ThesaHelp: ACM references a-e
ThesaHelp: references a-b
Topic: computational mail
Topic: security issues with electronic mail
Topic: security leaks and weaknesses
Topic: security by secure domains
Group: input/output
| |
Reference
Borenstein, N.S.,
"Computational mail as network infrastructure for computer- supported cooperative work",
ACM 1992 Conference on Computer Supported Cooperative Work, SIGCHI & SIGOIS, pp. 67-74, November 1992.
Google
Quotations
68 ;;Quote: for computational email, send a program in a well-defined language; executed by the recipient
| 70 ;;Quote: computational email needs to be secure; at least compared to generally accepted risks
| 70+;;Quote: email users accept risks of resource deprivation and non-technical attacks
| 70 ;;Quote: risks for computational email--destruction of resources, theft of resources, and deprivation of resources
| 70 ;;Quote: devise a secure language by constructing secure input/output facilities for a conventional language
| 70+;;Quote: secure, computational email by restricted access to a single subdirectory; e.g., limit size and number of created files
| 70+;;Quote: secure, computational email by disallowing nonprintable characters
|
Related Topics
ThesaHelp: ACM references a-e (259 items)
ThesaHelp: references a-b (396 items)
Topic: computational mail (11 items)
Topic: security issues with electronic mail (18 items)
Topic: security leaks and weaknesses (56 items)
Topic: security by secure domains (42 items)
Group: input/output (4 topics, 74 quotes)
|