Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJuly 2014
Anonymous encryption with partial‐order subset delegation and its application in privacy email systems
IET Information Security (ISE2), Volume 8, Issue 4July 2014, Pages 240–249https://doi.org/10.1049/iet-ifs.2013.0045In privacy‐carrying email systems, the authors should guarantee that the email content is confidential and sometimes the sender/receiver identities are hidden. Also, they require that the key generation is flexible and manageable. In this study, first, ...
- research-articleNovember 2013
Office 365: tips to avoid turbulence while moving faculty and staff to the cloud
SIGUCCS '13: Proceedings of the 41st annual ACM SIGUCCS conference on User servicesNovember 2013, Pages 131–136https://doi.org/10.1145/2504776.2504813Moving more than 23,500 locally hosted Exchange email and calendar accounts to Microsoft's cloud-based Office 365, with almost no disruption to the work of Cornell University's faculty and staff, was a carefully choreographed, well-practiced yet dynamic ...
- research-articleSeptember 2013
Mining Artful Processes from Knowledge Workers' Emails
IEEE Internet Computing (IEEECS_INTERNET), Volume 17, Issue 5September 2013, Pages 10–20https://doi.org/10.1109/MIC.2013.60MailOfMine aims at automatically building a set of workflow models--which represent the artful processes behind knowledge workers' activities--on top of a collection of email messages. Such models formalize the unspecified agile processes that knowledge ...
- articleJanuary 2013
Secure multicast key protocol for electronic mail systems with providing perfect forward secrecy
Security and Communication Networks (SACN), Volume 6, Issue 1January 2013, Pages 100–107https://doi.org/10.1002/sec.536Electronic mail (e-mail) systems are widely used in the Internet. A user usually needs to send an e-mail to a group of users. In this paper, a secure multicast key protocol for e-mail systems with providing perfect forward secrecy is proposed to ensure ...
- research-articleOctober 2012
Google apps for education: Valparaiso University's migration experience
SIGUCCS '12: Proceedings of the 40th annual ACM SIGUCCS conference on User servicesOctober 2012, Pages 203–208https://doi.org/10.1145/2382456.2382506Many campuses are investigating cloud-based or hosted email solutions. This paper will cover Valparaiso University's decision to move to the Google Apps for Education platform and our campus migration strategy. Google Apps offers significant savings in ...
-
- ArticleAugust 2011
TRAP: open decentralized distributed spam filtering
TrustBus'11: Proceedings of the 8th international conference on Trust, privacy and security in digital businessAugust 2011, Pages 86–97Spam is a significant problem in the day-to-day operations of large networks and information systems, as well as a common conduit for malicious software. The problem of detecting and eliminating spam remains of great interest, both commercially and in a ...
- research-articleMay 2011
Should I open this email?: inbox-level cues, curiosity and attention to email
CHI '11: Proceedings of the SIGCHI Conference on Human Factors in Computing SystemsMay 2011, Pages 3439–3448https://doi.org/10.1145/1978942.1979456The quantity of email people receive each day can be overwhelming. Previous research suggests that when handling email, individuals prioritize certain messages for attention over others. Since people generally make this decision about which message to ...
- rfcDecember 2010
RFC 6047: iCalendar Message-Based Interoperability Protocol (iMIP)
This document, "iCalendar Message-Based Interoperability Protocol (iMIP)", specifies a binding from the iCalendar Transport-independent Interoperability Protocol (iTIP) to Internet email-based transports. Calendaring entries defined by the iCalendar ...
- articleDecember 2010
Innovative ICT to improve student learning support: the case of an Austral-Asian University
International Journal of Learning Technology (IJLT), Volume 5, Issue 3December 2010, Pages 289–309https://doi.org/10.1504/IJLT.2010.037308This paper investigates the influences of information and communication technologies (ICT) on student learning advisers in their jobs and communication with students at an Austral-Asian University. The findings indicate that emergent technologies such ...
- research-articleOctober 2010
Experience with individual receipt confirmation system and the university primary mail service
SIGUCCS '10: Proceedings of the 38th annual ACM SIGUCCS fall conference: navigation and discoveryOctober 2010, Pages 65–70https://doi.org/10.1145/1878335.1878352Before experiencing last year's H1N1 pandemic, we had happened to realize the need for a reliable communication method to provide all staff members and students with information about disease and emergency situations.
Our legacy mail system was good for ...
- tutorialJuly 2010
Information retrieval for e-discovery
SIGIR '10: Proceedings of the 33rd international ACM SIGIR conference on Research and development in information retrievalJuly 2010, Page 913https://doi.org/10.1145/1835449.1835685Discovery, the process under which parties to legal cases must reveal documents relevant to the disputed issues is a core aspect of trials in the United States, and a lesser but important factor in other countries. Discovery on documents stored in ...
- research-articleJuly 2010
Personalized Email Prioritization Based on Content and Social Network Analysis
IEEE Intelligent Systems (IEEECS-INTELLI-NEW), Volume 25, Issue 4July 2010, Pages 12–18https://doi.org/10.1109/MIS.2010.56The proposed system combines unsupervised clustering, social network analysis, semisupervised feature induction, and supervised classification to model user priorities among incoming email messages.
- rfcFebruary 2010
RFC 5782: DNS Blacklists and Whitelists
The rise of spam and other anti-social behavior on the Internet has led to the creation of shared blacklists and whitelists of IP addresses or domains. The DNS has become the de-facto standard method of distributing these blacklists and whitelists. This ...
- rfcJanuary 2010
RFC 5755: An Internet Attribute Certificate Profile for Authorization
This specification defines a profile for the use of X.509 Attribute Certificates in Internet Protocols. Attribute certificates may be used in a wide range of applications and environments covering a broad spectrum of interoperability goals and a broader ...
- research-articleMarch 2009
Clustering malware-generated spam emails with a novel fuzzy string matching algorithm
SAC '09: Proceedings of the 2009 ACM symposium on Applied ComputingMarch 2009, Pages 889–890https://doi.org/10.1145/1529282.1529473In this paper, a fuzzy-matching clustering algorithm is introduced to group subjects found in spam emails which are generated by malware. A modified scoring strategy is applied in dynamic programming to find subjects that are similar to each other. A ...
- articleFebruary 2009
Making Space for a New Medium: On the Use of Electronic Mail in a Newspaper Newsroom
Computer Supported Cooperative Work (KLU-COSU), Volume 18, Issue 1February 2009, Pages 1–46https://doi.org/10.1007/s10606-008-9082-7Within the field of computer-supported cooperative work, there are a continuously growing number of studies of the use of electronic media in groups and organisations. Despite the existence of this impressive body of research, there have been ...
- rfcOctober 2008
RFC 5322: Internet Message Format
This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of "electronic mail" messages. This specification is a revision of Request For Comments (RFC) 2822, which ...
- research-articleMarch 2008
Detection of networks blocks used by the Storm Worm botnet
ACM-SE 46: Proceedings of the 46th Annual Southeast Regional Conference on XXMarch 2008, Pages 356–360https://doi.org/10.1145/1593105.1593200Storm Worm is a prolific web-spread Trojan virus that infects computers and turns them into nodes (called bots) of a botnet. The bots then can be used to distribute spam messages, launch DOS attacks, host phishing web sites, etc. This paper investigated ...
- research-articleMarch 2008
Mining spam email to identify common origins for forensic application
SAC '08: Proceedings of the 2008 ACM symposium on Applied computingMarch 2008, Pages 1433–1437https://doi.org/10.1145/1363686.1364019In recent years, spam email has become a major tool for criminals to conduct illegal business on the Internet. Therefore, in this paper we describe a new research approach that uses data mining techniques to study spam emails with the focus on law ...
- ArticleJuly 2007
Users dealing with spam and spam filters: some observations and recommendations
CHINZ '07: Proceedings of the 8th ACM SIGCHI New Zealand chapter's international conference on Computer-human interaction: design centered HCIJuly 2007, Pages 67–72https://doi.org/10.1145/1278960.1278970The email communication system is threatened by unsolicited commercial email aka spam. In response, spam filters have been deployed widely to help reduce the amount of spam users have to cope with. This paper describes work towards helping users better ...