{"language":[{"iso":"eng"}],"oa":"1","date_updated":"2022-01-06T07:02:22Z","department":[{"_id":"277"}],"title":"Do anti-spam measures effectively cover the e-mail communication network? A formal approach","citation":{"ieee":"G. Schryen, “Do anti-spam measures effectively cover the e-mail communication network? A formal approach,” The Journal of Information Systems Security (AIS Special Interest Group in Security), vol. 3, no. 2, pp. 66–90, 2007.","short":"G. Schryen, The Journal of Information Systems Security (AIS Special Interest Group in Security) 3 (2007) 66–90.","mla":"Schryen, Guido. “Do Anti-Spam Measures Effectively Cover the e-Mail Communication Network? A Formal Approach.” The Journal of Information Systems Security (AIS Special Interest Group in Security), vol. 3, no. 2, 2007, pp. 66–90.","bibtex":"@article{Schryen_2007, title={Do anti-spam measures effectively cover the e-mail communication network? A formal approach}, volume={3}, number={2}, journal={The Journal of Information Systems Security (AIS Special Interest Group in Security)}, author={Schryen, Guido}, year={2007}, pages={66–90} }","apa":"Schryen, G. (2007). Do anti-spam measures effectively cover the e-mail communication network? A formal approach. The Journal of Information Systems Security (AIS Special Interest Group in Security), 3(2), 66–90.","ama":"Schryen G. Do anti-spam measures effectively cover the e-mail communication network? A formal approach. The Journal of Information Systems Security (AIS Special Interest Group in Security). 2007;3(2):66-90.","chicago":"Schryen, Guido. “Do Anti-Spam Measures Effectively Cover the e-Mail Communication Network? A Formal Approach.” The Journal of Information Systems Security (AIS Special Interest Group in Security) 3, no. 2 (2007): 66–90."},"type":"journal_article","year":"2007","page":"66-90","issue":"2","_id":"5655","intvolume":" 3","has_accepted_license":"1","status":"public","date_created":"2018-11-14T14:51:41Z","volume":3,"file":[{"access_level":"open_access","date_created":"2018-12-18T13:25:12Z","file_name":"Do anti-spam measures effectively cover the e-mail communication - Journal version.pdf","relation":"main_file","content_type":"application/pdf","date_updated":"2018-12-18T13:25:12Z","file_id":"6324","creator":"hsiemes","file_size":100448}],"author":[{"id":"72850","last_name":"Schryen","full_name":"Schryen, Guido","first_name":"Guido"}],"keyword":["e-mail","spam","e-mail infrastructure","anti-spam measures","spamming options"],"publication":"The Journal of Information Systems Security (AIS Special Interest Group in Security)","file_date_updated":"2018-12-18T13:25:12Z","user_id":"61579","ddc":["000"],"abstract":[{"text":"Spam e-mails have become a serious technological and economic problem. Up to now, by deploying complementary anti-spam measures, we have been reasonably able to withstand spam e-mails and use the Internet for regular communication. However, if we are to avert the danger of losing the Internet e-mail service in its capacity as a valuable, free and worldwide medium of open communication, anti-spam activities should be performed more systematically than is currently the case regarding the mainly heuristic, anti-spam measures in place. A formal framework, within which the existing delivery routes that a spam e-mail may take, and anti-spam measures and their effectiveness can be investigated, will perhaps encourage a shift in methodology and pave the way for new, holistic anti-spam measures. This paper presents a model of the Internet e-mail infrastructure as a directed graph and a deterministic finite automaton and draws on automata theory to formally derive the spam delivery routes. The most important anti-spam measures are then described. Methods controlling only specific delivery routes are evaluated in terms of how effectively they cover the modeled e-mail infrastructure; methods operating independently of any particular routes receive a more general assessment.","lang":"eng"}],"extern":"1"}