Publications
Security Aspects of a UNIX PEM Implementation.
Abstract
Trusted Information Systems has designed and implemented a UNIX"-based version of Privacy Enhanced Mail (PEM). The PEM protocols enhance the services provided to users of Internet electronic mail by including the following security services: message in-tegrity, message origin authentication, non-repudiation of origin, and (optional) message confidentiality. These security services provide cryptographic protection to messages transported between end systems by the message transfer system. Of paramount importance is the proper design and implementation of the PEM software, and the proper management and use of the end system hosting the PEM software. The TIS/PEM system is designed and implemented with a number of points of control which can be combined to provide varying levels of protection within a host system.
- Date
- September 14, 1992
- Authors
- James M Galvin, David M Balenson
- Conference
- USENIX Summer