Distributed Quota Enforcement for Spam
#1

Distributed Quota Enforcement for Spam
Abstract

Spam, by overwhelming inboxes, has made email a less reliable medium than it was just a few years ago. Spam filters are undeniably useful but unfortunately can flag non-spam as spam. To restore email\'s reliability, a recent spam control approach grants quotas of stamps to senders and has the receiver communicate with a well-known quota enforcer to verify that the stamp on the email is fresh and to cancel the stamp to prevent reuse. . The literature has several proposals based on this general idea but no complete system design and implementation that: scales to today\'s email load (which requires the enforcer to be distributed over many hosts and to tolerate faults in them), imposes minimal trust assumptions, resists attack, and upholds today\'s email privacy. DQE\'s enforcer occupies a point in the design spectrum notable for simplicity: mutually untrusting nodes implement a storage abstraction but avoid neighbor maintenance, replica maintenance, and heavyweight cryptography.The DQE`s are based on a managed distributed hash table (DHT) interface, showing that it can be used in conjunction with electronic stamps (for quota allocation) to ensure that any non-negligible reuse of stamps will be detected
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: jamming and antijamming technologies for law enforcement doc, free online training classes for law enforcement, jamming and anti jamming technologies for law enforcement pdf, voice spam protection**agement ppt bca level, advantages of jamming and anti jamming technology for law enforcement, download spam rules for outlook, email for spam,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Data Security in Local Network using Distributed Firewalls computer science crazy 10 15,041 30-03-2014, 04:40 AM
Last Post: Guest
Thumbs Up Fiber Distributed Data Interface Computer Science Clay 1 8,296 23-01-2013, 03:48 PM
Last Post: seminar details
  Distributed Cache Updating for the Dynamic Source Routing Protocol seminar class 3 2,286 17-11-2012, 01:26 PM
Last Post: seminar details
  distributed database full report project report tiger 3 5,252 05-09-2012, 04:04 PM
Last Post: acceriott
  Automated and distributed management applications with Jiro technology computer girl 0 948 08-06-2012, 12:25 PM
Last Post: computer girl
  Distributed Data Mining in Credit Card Fraud Detection seminar class 2 2,570 09-02-2012, 11:21 AM
Last Post: seminar addict
  DISTRIBUTED WIRELESS COMMUNICATION SYSTEM (Download Full Report And Abstract) computer science crazy 8 8,046 07-10-2011, 09:32 AM
Last Post: seminar addict
  A Comparison of Distributed Systems: ChorusOS and Amoeba seminar class 0 989 05-05-2011, 11:33 AM
Last Post: seminar class
  Plan For No Spam seminar class 1 2,679 23-04-2011, 10:27 AM
Last Post: seminar class
  Distributed Computing Using Virtual Machines seminar class 1 1,285 13-04-2011, 05:31 PM
Last Post: pieterjons

Forum Jump: