Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Fighting the spam wars: a remailer approach with restrictive aliasing
Gburzynski P., Maitan J. ACM Transactions on Internet Technology4 (1):1-30,2004.Type:Article
Date Reviewed: Nov 15 2004

Gburzynski and Maitan set out to provide an economical solution to the growing problem of spam, or unsolicited commercial email, on the Internet. Their intent is to design a solution that works within the constraints of the current simple mail transfer protocol (SMTP)-enabled infrastructure, thus leveraging the technological investments at both the Internet service provider (ISP) and end-user levels, and supporting the phased implementation of their proposed solution, while supporting interoperability with current email standards.

To achieve this admirable goal, the authors describe an automated process for assigning unique transactional email addresses to conversations, rather than users. The software they have developed links those conversational addresses to the actual email addresses of users participating in the conversations, and proxies the delivery of such email to the appropriate parties. While the concept of managing email through the use of party-specific addresses is not new (I’ve been doing it manually for years), the extension of an automated and transparent approach to general end users could have a substantial impact.

While there are implementation issues yet to be resolved, the authors are cognizant of this, and have highlighted vulnerabilities of which they are already aware. Due to the procedural complexities that must be addressed by the users (reminiscent of similar issues with pretty good privacy (PGP)), I am not convinced their prototype qualifies as a solution just yet. However, this documentation of their approach will be invaluable to other researchers in the field, and is recommended accordingly.

Reviewer:  Lee Imrey Review #: CR130421 (0504-0449)
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Applications (SMTP, FTP, etc.) (C.2.2 ... )
 
 
Abuse And Crime Involving Computers (K.4.1 ... )
 
 
Electronic Mail (H.4.3 ... )
 
 
Internet (C.2.5 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Applications (SMTP, FTP, etc.)": Date
X.400 and SMTP
Rhoton J., Digital Press, Newton, MA, 1997. Type: Book (9781555581657)
Jun 1 1998
WAPcam --- using a WAP application in student education
Kargl F., Illman T., Raschke A., Schlott S., Weber M. ACM SIGOIS Bulletin 22(1): 12-15, 2001. Type: Article
May 3 2002
Web protocols and practice: HTTP/1.1, Networking protocols, caching, and traffic measurement
Krishnamurthy B., Rexford J., Addison-Wesley Longman Publishing Co., Inc., Boston, MA, 2001.  642, Type: Book (9780201710885)
Jun 7 2002
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy