Policy Specification and Enforcement for Detection of Security Violations in a Mail Service

Author(s):  
A. Murali M Rao
1998 ◽  
Vol 37 (03) ◽  
pp. 247-253 ◽  
Author(s):  
K. Ohe ◽  
S. Kaihara ◽  
T. Kiuchi

AbstractWWW-based user interface is presented for secure electronic mail service for healthcare users. Using this method, communications between an electronic mail (WWW) server and users (WWW browsers) can be performed securely using Secure Socket Layer protocol-based Hypertext Transfer Protocol (SSL-HTIP). The mail can be encrypted, signed, and sent to the recipients and vice versa on the remote WWW server. The merit of this method is that many healthcare users can use a secure electronic mail system easily and immediately, because SSL-compatible WWW browsers are widely used and this system can be made available simply by installing a WWW-based mail user agent on a mail server. We implemented a WWWbased mail user agent which is compatible with PEM-based secure mail and made it available to about 16,000 healthcare users. We believe this approach is effective in facilitating secure network-based information exchange among medical professionals.


Author(s):  
Olexandr Grebenuk ◽  
Volodymyr Pavlenko

The application of ports and adapters architecture (other names bulbous, layered, hexagonal) in iterative software development is considered in accordance with the requirements that come in chronological order in the practical example. Each iteration is supported by the schema architecture, problems encountered and their solution. The expediency of using the considered architecture in the iterative development of software with time constraints is shown. The system of collecting data on the concentration of carbon dioxide of the environment and air temperature in real time from a distributed network of sensors with a predetermined geolocation for medical institutions was developed. Put sensor information (ID, commissioning date and end date) in the Google Sheets spreadsheet. The data from the sensors should be collected on the server by REST service. The process of PPP in a specific project with significant time constraints is investigated, applying the rules and principles laid down in the architecture of ports and adapters, using the basic metrics to evaluate the complexity of adding new functionality, testing, concurrent development, speed and ease of development; draw conclusions about the conditions when it is appropriate to apply the chosen software design approach, and the ability of such an approach to perceive software requirements changes. The architecture of ports and adapters is useful if the system has many external integrations (mail service, push messages, databases, reporting system, etc.). The one-way communication with adapters guarantees the integrity of the main algorithmic part of the program. A thorough knowledge of the domain allows you to immediately determine the domain layer. Building a system structure that optimally reflects the domain requires the most time, and it will be costly in the future to correct errors made during the process of defining system layers (interfaces and systems). Domain logic testing is fast due to Unit tests, other tests are easy to write due to the small connectivity between layers. This architecture is not a completely new approach, but it takes the best of OOP, SOLID, DDD and determines how to apply these principles in the best way.


2010 ◽  
Author(s):  
Henry DeYoung ◽  
Deepak Garg ◽  
Limin Jia ◽  
Dilsun Kaynar ◽  
Anupam Datta

Author(s):  
Jean-François Fava-Verde

The paper examines the early development of the Victorian inland telegraph, and more precisely the telegraphic despatches, or telegrams, as they became widely known. The first telegram service in Britain was launched by the Electric Telegraph Company two decades before nationalization of the telegraphs in 1870. It is argued that this service was not as innovative as the electric telegraph technology that underpinned it. Attention is drawn to the parallels between the telegram and mail services. To this end, the evolution of postal communication is first explored, with a focus on the nineteenth century, when innovations such as mail-trains and prepayment by stamp considerably accelerated the mail and increased the volume of letters from 67 million in 1839 to a staggering 741 million in 1865. It was in this context that the telegram service was introduced to the public. The operating model adopted by the Electric Telegraph Company to deliver this service is deconstructed to show the similarities with the mail service and to demonstrate that a telegram was not always faster than letter post.


2005 ◽  
Vol 8 (4) ◽  
pp. 351-387 ◽  
Author(s):  
Xinwen Zhang ◽  
Francesco Parisi-Presicce ◽  
Ravi Sandhu ◽  
Jaehong Park

Sign in / Sign up

Export Citation Format

Share Document