姓名 |
李冠錚(Kuan-Cheng Li)
查詢紙本館藏 |
畢業系所 |
軟體工程研究所 |
論文名稱 |
基於白名單機制之電子郵件附件存取控制及自動解密系統 (Access Control and Automatic Decryption for Encrypted E-Mail Attachments based on Whitelist Policy)
|
相關論文 | |
檔案 |
[Endnote RIS 格式]
[Bibtex 格式]
[相關文章] [文章引用] [完整記錄] [館藏目錄] [檢視] [下載]- 本電子論文使用權限為同意立即開放。
- 已達開放權限電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。
- 請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。
|
摘要(中) |
目前網際網路上的電子郵件是目前傳遞訊息的熱門方法之一。企業因導入相關的知識文件管理與保護系統使企業內部文件受到安全保障及保護,但也使得以電子郵件寄送至企業外部時針因夾帶受保護的檔案,會使對方收件人無法直接閱覽,造成使用上的不便。本系統架構將以成為SMTP其中一個MTA節點的方式使既有的郵件系統能基於多階層白名單規則進行附件的存取控管及自動解除檔案保護,並針對一封同時擁有多個收件人的信件得以個別檢測收件人並確保相對應的存取控管、自動解密及維持收件人列表的一致性。 |
摘要(英) |
Currently, sending emails via the internet is the most popular method all over the world. To protect internal documents, most enterprises would deploy relevant Document Management and Protection systems. However, this in turn, creates a problem and an inconvenience for other external users as they are unable to open the emails with the protected files directly. In this thesis, our system architecture will enable the existing mail system to perform access control and automatic decryption on attachments based on multi-level whitelist rules in a way that becomes one of the MTA mail relay nodes of SMTP. For an email that has multiple recipients at the same time, it is possible to individually detect the recipient and ensure the corresponding access control and automatic decryption of the attachments are consistent with the recipient list. |
關鍵字(中) |
★ 電子郵件 ★ 白名單策略 ★ 存取控制 ★ 附件解密 |
關鍵字(英) |
★ Email ★ Whitelist policy ★ Access control ★ Attachment decryption |
論文目次 |
中文摘要 i
Abstract ii
目錄 iii
圖目錄 v
表目錄 vi
符號說明 vii
一、緒論 1
1-1 研究背景 1
1-2 研究動機與實作目標 2
1-3 研究貢獻 5
1-4 論文架構 6
二、相關研究 7
2-1 電子郵件標準及架構 7
2-2 加解密及雜湊演算法 10
三、系統架構及元件介紹 12
3-1 系統架構模型 12
3-2 系統流程 14
3-3 NCU Mail Filter 15
四、實驗環境及量測 19
4-1 實驗環境及架構 19
4-2 實驗環境假設 21
4-3 DMP Emulator 22
4-4 處理效能實驗 23
4-5 吞吐量實驗 27
五、結論與未來研究方向 29
六、參考文獻 30 |
參考文獻 |
[1] J. Klensin, “Simple Mail Transfer Protocol”, RFC 5321, October, 2008
[2] 以柔資訊有限公司, “知識文件管理與保護系統(DMP)”, Accessed: June 20, 2018. [Online]. Available:
http://www.wnjsoft.com/02_solution/02_detaildfb4.html
[3] A. Ashok Kumar, Santhosha, A. Jagan, “Two layer security for data storage in cloud”, February, 2015
[4] Wikipedia, “RSA (cryptosystem)”, Accessed: June 20, 2018. [Online]. Available: https://en.wikipedia.org/wiki/RSA_(cryptosystem)
[5] Wikipedia, “Secure Hash Algorithms”, Accessed: June 20, 2018. [Online]. Available: https://en.wikipedia.org/wiki/Secure_Hash_Algorithms
[6] Wikipedia, “SHA-2”, Accessed: June 20, 2018. [Online]. Available: https://en.wikipedia.org/wiki/SHA-2
[7] Wikipedia, “Advanced Encryption Standard”, Accessed: June 20, 2018. [Online].Available: https://en.wikipedia.org/wiki/Advanced_Encryption_Standard
[8] David H. Crocker, “Standard for the format of ARPA Internet text messages”, RFC 822, August 1982.
[9] “Message size limits in Exchange 2016” Accessed: June 20, 2018. [Online]. Available: https://docs.microsoft.com/en-us/exchange/mail-flow/message-size-limits
[10] 海威資訊, “MFM 郵件稽核系統”,Accessed: June 20, 2018. [Online]. Available: http://www.hwy.com.tw/product/MFM |
指導教授 |
梁德容
王尉任(Deron Liang
Wei-Jen Wang)
|
審核日期 |
2018-8-23 |
推文 |
facebook plurk twitter funp google live udn HD myshare reddit netvibes friend youpush delicious baidu
|
網路書籤 |
Google bookmarks del.icio.us hemidemi myshare
|