Master of Science thesis Fighting Spam

Master of Science thesis Fighting Spam Master of Science thesis Fighting Spam

29.07.2013 Views

Figur 56 Whitelistfanebladet i hovedvinduet. For at tilføje en emailadresse til listen, indtastes emailadressen i tekstfeltet i bunden af fanebladet. Herefter trykkes på knappen Add . Nu tilføjes emailadressen til whitelisten og email fra denne adresse vil herefter altid modtages. Ønskes det siden hen at fjerne en adresse fra listen, markeres denne ved at klikke i listen. Herefter trykkes på Remove , og adressen fjernes fra listen. 170

Appendiks C Litteratur I følgende referencer optræder en række internetadresser, hvis indhold kan have ændret sig på nuværende tidspunkt. Derfor understreges det, at der er refereret til internetadressernes indhold i Januar og Februar 2005. [1] The Time Overhead of Email, A Ferris Research White Paper, Dec 2003 [2] The Cost of Spam, A Ferris Research White Paper, March 2003 [3] DNS Blacklist [4] Spam Cannibal www.solarwinds.net www.spamcannibal.org. [5] MAPS (Mail Abuse Prevention System) [6] Postini Statistics 171 www.mail-abuse.org www.emcs.net/Protection/statistics.htm [7] Sahami, M., Dumais, S., Heckerman, D., and Horvitz, A Bayesian approach to filtering junk e-mail, 1998. [8] SpamFighter [9] Razor www.spamfighter.com razor.sourceforge.net [10] Distributed Checksum Clearinghouse [11] Brightmail www.rhyolite.com/anti-spam/dcc www.brightmail.com, Symantec corporation, www.symantec.com [12] Filtering Technologies in Symantec Brightmail AntiSpam 6.0, Symantec Corporation. [13] SpamAssassin www.spamassassin.apache.org, [14] C. Dwork et al, Pricing via Processing, Combatting Junk Mail, 1992 [15] C. Dwork et al, On Memory-Bound Functions for Fighting Spam [16] HashCash www.hashcash.org [17] M. Abadi et al, Moderately Hard, Memory-bound Functions [18] IBM Systems Journal Vol 41, No 4, 2002 [19] M.Abadi et al, Certified Email with a Light Online Trusted Third Party: Design and Implementation, Maj 2002 [20] Bruce Schneier & James Riordan, A Certified E-Mail Protocol [21] Cashette www.cashette.com [22] Lorrie Faith Cranor and Brian A. LaMacchia, Spam!, Communications of the ACM. Vol. 41, No. 8, Aug. 1998 [23] GnuPG www.gnupg.org

Appendiks C Litteratur<br />

I følgende referencer optræder en række internetadresser, hvis indhold kan have ændret<br />

sig på nuværende tidspunkt. Derfor understreges det, at der er refereret til<br />

internetadressernes indhold i Januar og Februar 2005.<br />

[1] The Time Overhead <strong>of</strong> Email, A Ferris Research White Paper, Dec 2003<br />

[2] The Cost <strong>of</strong> <strong>Spam</strong>, A Ferris Research White Paper, March 2003<br />

[3] DNS Blacklist<br />

[4] <strong>Spam</strong> Cannibal<br />

www.solarwinds.net<br />

www.spamcannibal.org.<br />

[5] MAPS (Mail Abuse Prevention System)<br />

[6] Postini Statistics<br />

171<br />

www.mail-abuse.org<br />

www.emcs.net/Protection/statistics.htm<br />

[7] Sahami, M., Dumais, S., Heckerman, D., and Horvitz, A Bayesian approach to<br />

filtering junk e-mail, 1998.<br />

[8] <strong>Spam</strong>Fighter<br />

[9] Razor<br />

www.spamfighter.com<br />

razor.sourceforge.net<br />

[10] Distributed Checksum Clearinghouse<br />

[11] Brightmail<br />

www.rhyolite.com/anti-spam/dcc<br />

www.brightmail.com, Symantec corporation, www.symantec.com<br />

[12] Filtering Technologies in Symantec Brightmail Anti<strong>Spam</strong> 6.0, Symantec<br />

Corporation.<br />

[13] <strong>Spam</strong>Assassin<br />

www.spamassassin.apache.org,<br />

[14] C. Dwork et al, Pricing via Processing, Combatting Junk Mail, 1992<br />

[15] C. Dwork et al, On Memory-Bound Functions for <strong>Fighting</strong> <strong>Spam</strong><br />

[16] HashCash<br />

www.hashcash.org<br />

[17] M. Abadi et al, Moderately Hard, Memory-bound Functions<br />

[18] IBM Systems Journal Vol 41, No 4, 2002<br />

[19] M.Abadi et al, Certified Email with a Light Online Trusted Third Party: Design<br />

and Implementation, Maj 2002<br />

[20] Bruce Schneier & James Riordan, A Certified E-Mail Protocol<br />

[21] Cashette<br />

www.cashette.com<br />

[22] Lorrie Faith Cranor and Brian A. LaMacchia, <strong>Spam</strong>!, Communications <strong>of</strong> the<br />

ACM. Vol. 41, No. 8, Aug. 1998<br />

[23] GnuPG<br />

www.gnupg.org

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!