Privacy enhanced mail in more detail

  • Zegwaart E
  • 3

    Readers

    Mendeley users who have this article in their library.
  • 2

    Citations

    Citations of this article.

Abstract

Early 1993, four Requests For Comments (RFCs) have been made available as 'proposed standards'. In these RFCs, the specification of the security functions and the related management tasks have been defined to secure the Internet electronic mail system. The software which is being developed based on these RFCs is referred to as PEM software, PEM standing for 'Privacy Enhanced Mail'. This paper deals with a number of technical, functional and organizational aspects of Privacy Enhanced Mail. It sets out to explain what PEM is about, its underlying trust model, the services it offers, its encryption algorithms, its operation, the requirements for using PEM, and the consequences it has for the user's workplace. © 1993.

Author-supplied keywords

  • PEM, certificate
  • certification authority
  • privacy enhanced mail
  • public key cryptology
  • security

Get free article suggestions today

Mendeley saves you time finding and organizing research

Sign up here
Already have an account ?Sign in

Find this document

Authors

  • Erik Zegwaart

Cite this document

Choose a citation style from the tabs below

Save time finding and organizing research with Mendeley

Sign up for free