Skip to main content

Controlling Spam by Secure Internet Content Selection

  • Conference paper
Book cover Security in Communication Networks (SCN 2004)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3352))

Included in the following conference series:

Abstract

Unsolicited and undesirable e-mail (spam) is a growing problem for Internet users and service providers. We present the Secure Internet Content Selection (SICS) protocol, an efficient cryptographic mechanism for spam-control, based on allocation of responsibility (liability). With SICS, e-mail is sent with a content label, and a cryptographic protocol ensures labels are authentic and penalizes falsely labeled e-mail (spam). The protocol supports trusted senders (penalized by loss of trust) and unknown senders (penalized financially). The recipient can determine the compensation amount for falsely labeled e-mail (spam). SICS is practical, with negligible overhead, gradual adoption path, and use of existing relationships; it is also flexible and appropriate for most scenarios, including deployment by end users and/or ISPs and support for privacy (including encrypted e-mail) and legitimate, properly labeled commercial e-mail. SICS improves on other crypto-based proposals for spam controls, and complements non-cryptographic spam controls.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Anderson, R., Needham, R.: Robustness principles for public key protocols. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 236–247. Springer, Heidelberg (1995), http://citeseer.nj.nec.com/article/anderson95robustness.html

    Google Scholar 

  2. The Coordinated Spam Reduction Initiative, Microsoft corporation (February 2004)

    Google Scholar 

  3. DesAutels, P. (ed.): Yang-hua Chu, Brian LaMacchia and Peter Lipp, PICS Signed Labels (DSig) 1.0 Specification, W3C Recommendation (May 1998), http://www.w3.org/TR/REC-DSig-label

  4. Duchovni, V., Gilmore, J., Herzberg, A., Laurie, B., Metzger, P.: others, messages to the cryptography@metzdowd.com list (January 2004)

    Google Scholar 

  5. Dwork, C., Goldberg, A., Naor, M.: On Memory-Bound Functions for Fighting Spam. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 426–444. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  6. Dwork, C., Naor, M.: Pricing via Processing or Combating Junk Mail. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 139–147. Springer, Heidelberg (1993)

    Google Scholar 

  7. Gabber, E., Jakobsson, M., Matias, Y., Mayer, A.: Curbing junk E-mail via secure classification. In: Hirschfeld, R. (ed.) FC 1998. LNCS, vol. 1465, pp. 198–213. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  8. Herzberg, A.: Micropayments. In: Kou, W. (ed.) Payment Technologies for E-Commerce, pp. 245–280. Springer, Heidelberg (2003)

    Google Scholar 

  9. Herzberg, A.: Controlling spam by secure internet content selection (full version) (in preparation)

    Google Scholar 

  10. McCurley, K.: Deterrence Measures for Spam. In: presented at the RSA Conference (January 1998)

    Google Scholar 

  11. Miller, J. (ed.): Tim Krauskopf, Paul Resnick and Win Treese, PICS Label Distribution Label Syntax and Communication Protocols Version 1.1, W3C Recommendation (October 1996), http://www.w3.org/TR/REC-PICS-labels

  12. Miller, J. (ed.): Paul Resnick and David Singer, Rating Services and Rating Systems and Their Machine Readable Descriptions Version 1.1, W3C Recommendation (October 1996), http://www.w3.org/TR/REC-PICS-services

  13. Ramsdell, B. (ed.): Request for comments 2633, S/MIME Version 3 Message Specification (June 1999)

    Google Scholar 

  14. Crocker, D.: Request For Comments 822, Standard for the Format of ARPA Internet Text Messages (August 1982), http://www.ietf.org/rfc/rfc822.txt

  15. Schiavone, V., Brussin, D., Koenig, J., Cobb, S., Everett-Church, R.: Trusted Email Open Standard - A Comprehensive Policy and Technology Proposal for Email Reform, An ePrivacy Group White Paper (May 2003), available at http://www.eprivacygroup.net/teos/teos_release.pdf

  16. Schwartz, A., Garfinkel, S.: Stopping Spam. O’Reilly & Associates, Sebastopol (1998)

    Google Scholar 

  17. Technical responses to spam, Taughnnock Networks whitepaper (November 2003)

    Google Scholar 

  18. An overview of E-Postage, Taughnnock Networks whitepaper (June 2003), Updated (February 2004)

    Google Scholar 

  19. Zimmerman, P.R.: The Official PGP User’s Guide. MIT Press, Boston (1995)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Herzberg, A. (2005). Controlling Spam by Secure Internet Content Selection. In: Blundo, C., Cimato, S. (eds) Security in Communication Networks. SCN 2004. Lecture Notes in Computer Science, vol 3352. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30598-9_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30598-9_24

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-24301-4

  • Online ISBN: 978-3-540-30598-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics