[{"volume":3,"author":[{"first_name":"Guido","id":"72850","full_name":"Schryen, Guido","last_name":"Schryen"}],"oa":"1","date_updated":"2022-01-06T07:02:22Z","intvolume":"         3","page":"66-90","citation":{"ama":"Schryen G. Do anti-spam measures effectively cover the e-mail communication network? A formal approach. <i>The Journal of Information Systems Security (AIS Special Interest Group in Security)</i>. 2007;3(2):66-90.","ieee":"G. Schryen, “Do anti-spam measures effectively cover the e-mail communication network? A formal approach,” <i>The Journal of Information Systems Security (AIS Special Interest Group in Security)</i>, vol. 3, no. 2, pp. 66–90, 2007.","chicago":"Schryen, Guido. “Do Anti-Spam Measures Effectively Cover the e-Mail Communication Network? A Formal Approach.” <i>The Journal of Information Systems Security (AIS Special Interest Group in Security)</i> 3, no. 2 (2007): 66–90.","short":"G. Schryen, The Journal of Information Systems Security (AIS Special Interest Group in Security) 3 (2007) 66–90.","bibtex":"@article{Schryen_2007, title={Do anti-spam measures effectively cover the e-mail communication network? A formal approach}, volume={3}, number={2}, journal={The Journal of Information Systems Security (AIS Special Interest Group in Security)}, author={Schryen, Guido}, year={2007}, pages={66–90} }","mla":"Schryen, Guido. “Do Anti-Spam Measures Effectively Cover the e-Mail Communication Network? A Formal Approach.” <i>The Journal of Information Systems Security (AIS Special Interest Group in Security)</i>, vol. 3, no. 2, 2007, pp. 66–90.","apa":"Schryen, G. (2007). Do anti-spam measures effectively cover the e-mail communication network? A formal approach. <i>The Journal of Information Systems Security (AIS Special Interest Group in Security)</i>, <i>3</i>(2), 66–90."},"has_accepted_license":"1","file_date_updated":"2018-12-18T13:25:12Z","extern":"1","department":[{"_id":"277"}],"user_id":"61579","_id":"5655","status":"public","type":"journal_article","title":"Do anti-spam measures effectively cover the e-mail communication network? A formal approach","date_created":"2018-11-14T14:51:41Z","year":"2007","issue":"2","language":[{"iso":"eng"}],"keyword":["e-mail","spam","e-mail infrastructure","anti-spam measures","spamming options"],"ddc":["000"],"file":[{"content_type":"application/pdf","relation":"main_file","creator":"hsiemes","date_created":"2018-12-18T13:25:12Z","date_updated":"2018-12-18T13:25:12Z","file_id":"6324","access_level":"open_access","file_name":"Do anti-spam measures effectively cover the e-mail communication - Journal version.pdf","file_size":100448}],"abstract":[{"text":"Spam e-mails have become a serious technological and economic problem. Up to now, by deploying complementary anti-spam measures, we have been reasonably able to withstand spam e-mails and use the Internet for regular communication. However, if we are to avert the danger of losing the Internet e-mail service in its capacity as a valuable, free and worldwide medium of open communication, anti-spam activities should be performed more systematically than is currently the case regarding the mainly heuristic, anti-spam measures in place. A formal framework, within which the existing delivery routes that a spam e-mail may take, and anti-spam measures and their effectiveness can be investigated, will perhaps encourage a shift in methodology and pave the way for new, holistic anti-spam measures. This paper presents a model of the Internet e-mail infrastructure as a directed graph and a deterministic finite automaton and draws on automata theory to formally derive the spam delivery routes. The most important anti-spam measures are then described. Methods controlling only specific delivery routes are evaluated in terms of how effectively they cover the modeled e-mail infrastructure; methods operating independently of any particular routes receive a more general assessment.","lang":"eng"}],"publication":"The Journal of Information Systems Security (AIS Special Interest Group in Security)"}]
