Implementation of secure email server in cloud environment
In the recent virtual communication world, the email services play a vital role as a basic content of heterogeneous networking infrastructure. Whereby, multiple platforms are connecting each other. Mail Server refers to computer performing Mail Transfer Agent functions. MTA is software that delivers...
| Main Authors: | Madi, Nadim K. M., Salehian, Solmaz, Masoumiyan, Farzaneh, Abdullah, Azizol |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
IEEE
2012
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/60435/ http://psasir.upm.edu.my/id/eprint/60435/1/Implementation%20of%20secure%20email%20server%20in%20cloud%20environment.pdf |
Similar Items
Energy-efficient intrusion detection in wireless sensor network
by: Salehian, Solmaz, et al.
Published: (2012)
by: Salehian, Solmaz, et al.
Published: (2012)
Load balancing and server consolidation in cloud computing environments: a meta-study
by: Fadhil, Mohammed Alaa, et al.
Published: (2019)
by: Fadhil, Mohammed Alaa, et al.
Published: (2019)
Intrusion detection system in secure shell traffic in cloud environment
by: Barati, Mehdi, et al.
Published: (2014)
by: Barati, Mehdi, et al.
Published: (2014)
Cloud web server for IoT smart laboratory system
by: Lee, Yi Ming
Published: (2022)
by: Lee, Yi Ming
Published: (2022)
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
by: Azhar, Nur Huwaina
Published: (2019)
by: Azhar, Nur Huwaina
Published: (2019)
Hierarchical secure virtualization model for cloud.
by: Manavi, Sina, et al.
Published: (2012)
by: Manavi, Sina, et al.
Published: (2012)
Guideline for privacy and security in Cloud First Security Environment
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
Secured email using steganography / Syaiful Annuar Omar
by: Syaiful Annuar, Omar
Published: (2005)
by: Syaiful Annuar, Omar
Published: (2005)
Mobility and handover technique in heterogeneous wireless networks
by: Abdullah, Radhwan M., et al.
Published: (2015)
by: Abdullah, Radhwan M., et al.
Published: (2015)
Development of A Secured Database Access on Application Server
by: Ab Rashid, Siti Rosmaniza, et al.
Published: (2011)
by: Ab Rashid, Siti Rosmaniza, et al.
Published: (2011)
Unequal clustering by improved particle swarm optimization in wireless sensor network
by: Salehian, Solmaz, et al.
Published: (2015)
by: Salehian, Solmaz, et al.
Published: (2015)
Mosquitto: server and client implementation of the MQTT protocol
by: Light, Roger A.
Published: (2017)
by: Light, Roger A.
Published: (2017)
SDN based security solution for legislative email communications: Safe guarding communication
by: Rupasinghe, P., et al.
Published: (2017)
by: Rupasinghe, P., et al.
Published: (2017)
Critical security challenges in cloud computing environment: An appraisal
by: Mir, Mohammad Shuaib, et al.
Published: (2017)
by: Mir, Mohammad Shuaib, et al.
Published: (2017)
Security assessment of FTMSK web server / Md Nazri Hashim
by: Hashim, Md Nazri
Published: (2005)
by: Hashim, Md Nazri
Published: (2005)
Implementation of embedded web server for mobile robot system
by: Ahmad Salleh, Noor Azurati, et al.
Published: (2007)
by: Ahmad Salleh, Noor Azurati, et al.
Published: (2007)
The contribution of email volume, email management strategies and propensity to worry in predicting email stress among academics
by: Jerejian, Ailsa, et al.
Published: (2013)
by: Jerejian, Ailsa, et al.
Published: (2013)
A model for client recommendation to a desktop grid server
by: Shafazand, Mohammad Yaser, et al.
Published: (2013)
by: Shafazand, Mohammad Yaser, et al.
Published: (2013)
Workplace communication technology focusing on implementing accurate language in emails
by: Nazifah Hamidun,, et al.
Published: (2017)
by: Nazifah Hamidun,, et al.
Published: (2017)
An offline email implementation based on delay tolerant network (DTN)
by: Mohd Khairun Nasir, Bin Sa'adi.
Published: (2013)
by: Mohd Khairun Nasir, Bin Sa'adi.
Published: (2013)
A review of cloud security based on cryptographic mechanisms
by: Abd, Sura Khalil, et al.
Published: (2014)
by: Abd, Sura Khalil, et al.
Published: (2014)
Implementation of server virualization to build energy efficient data centers
by: Uddin, Mueen, et al.
Published: (2014)
by: Uddin, Mueen, et al.
Published: (2014)
Study on Security Testing-as-a-Service (TaaS) in Cloud Environment
by: Ponkoodalingan, Kannan, et al.
Published: (2018)
by: Ponkoodalingan, Kannan, et al.
Published: (2018)
MARKCLOUD - Software for data confidentiality and security in cloud computing environments
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
Agent-based pricing determination for cloud services in multi-tenant environment
by: Hussin, Masnida, et al.
Published: (2014)
by: Hussin, Masnida, et al.
Published: (2014)
Robust reputation based trust management framework for federated-cloud environments
by: Derahman, Mohd Noor, et al.
Published: (2016)
by: Derahman, Mohd Noor, et al.
Published: (2016)
An Integrated Firewall System Model In A Multiclient-Server Environment
by: Al-Kazwini, Hussein A. Taqi
Published: (2005)
by: Al-Kazwini, Hussein A. Taqi
Published: (2005)
Embedded web server
by: Ahmad, Muhammad Shukri
Published: (2004)
by: Ahmad, Muhammad Shukri
Published: (2004)
XAIRF-WFP: a novel XAI-based random forest classifier for advanced email spam detection
by: Bouke, Mohamed Aly, et al.
Published: (2024)
by: Bouke, Mohamed Aly, et al.
Published: (2024)
A comparison of ontology servers
by: Ahmad, M. Nazir, et al.
Published: (2006)
by: Ahmad, M. Nazir, et al.
Published: (2006)
Overview of ontology server research
by: Ahmad, Mohamad Nazir, et al.
Published: (2007)
by: Ahmad, Mohamad Nazir, et al.
Published: (2007)
Email is evil! Behavioural responses towards permission-based direct email marketing and gender differences
by: Mahmoud, A. B., et al.
Published: (2019)
by: Mahmoud, A. B., et al.
Published: (2019)
A systematic mapping on risks and techniques to enhance security in multi-cloud environments
by: Gonzalez Alberto, Ana Y
Published: (2017)
by: Gonzalez Alberto, Ana Y
Published: (2017)
Secure multi-authority attribute-based encryption with cache-aware scheduling for mobile cloud access control
by: Jamal, Fara, et al.
Published: (2020)
by: Jamal, Fara, et al.
Published: (2020)
Email Phishing Detection Model using CNN Model
by: Gurumurthy, M., et al.
Published: (2024)
by: Gurumurthy, M., et al.
Published: (2024)
Implementing Privacy-Preserving Record Linkage in a Cloud
Computing Environment
by: Brown, Adrian Paul
Published: (2021)
by: Brown, Adrian Paul
Published: (2021)
Performance analysis of cloud-based cve communication architecture in comparison with the traditional client server, p2p and hybrid models
by: Gital, Abdulsam Ya'u, et al.
Published: (2014)
by: Gital, Abdulsam Ya'u, et al.
Published: (2014)
Machine learning for email filtering and categorising
by: Tan, Kai Qin
Published: (2023)
by: Tan, Kai Qin
Published: (2023)
A review on cloud computing security
by: Teo, Marry, et al.
Published: (2018)
by: Teo, Marry, et al.
Published: (2018)
Systematic literature review: leveraging data deduplication strategies & hashing techniques to eliminate data redundancy in cloud environments
by: M. A., Fazlina, et al.
Published: (2019)
by: M. A., Fazlina, et al.
Published: (2019)
Similar Items
-
Energy-efficient intrusion detection in wireless sensor network
by: Salehian, Solmaz, et al.
Published: (2012) -
Load balancing and server consolidation in cloud computing environments: a meta-study
by: Fadhil, Mohammed Alaa, et al.
Published: (2019) -
Intrusion detection system in secure shell traffic in cloud environment
by: Barati, Mehdi, et al.
Published: (2014) -
Cloud web server for IoT smart laboratory system
by: Lee, Yi Ming
Published: (2022) -
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
by: Azhar, Nur Huwaina
Published: (2019)