681 research outputs found

    A Practical Study of E-mail Communication through SMTP

    Get PDF
    Simple Mail Transfer Protocol (SMTP) is an application layer protocol for e-mail communication. It has been adopted as a standard by Internet Engineering Task Force (IETF). SMTP has set conversational and grammatical rules for exchanging messages between connected computers. It has evolved through several revisions and extensions since its formation by Jon Postel in 1981. In SMTP, the sender establishes a full-duplex transmission channel with a receiver. The receiver may be either the ultimate destination or an intermediate forwarding agent. SMTP commands are issued by the sender and are sent to the receiver, which responds to these commands through codes. Each SMTP session between the sender and the receiver consists of three phases namely: connection establishment, mail transactions and connection termination. This paper describes and illustrates the process of e-mail communication through SMTP by issuing the individual SMTP commands directly to transmit e-mail messages. It also describes individual SMTP commands and extensions with practical implementation using a Telnet client

    Session-ocaml: a session-based library with polarities and lenses

    Get PDF
    We propose session-ocaml, a novel library for session-typed concurrent/distributed programming in OCaml. Our technique solely relies on parametric polymorphism, which can encode core session type structures with strong static guarantees. Our key ideas are: ( ) polarised session types, which give an alternative formulation of duality enabling OCaml to automatically infer an appropriate session type in a session with a reasonable notational overhead; and ( ) a parameterised monad with a data structure called ‘slots’ manipulated with lenses, which can statically enforce session linearity and delegations. We show applications of session-ocaml including a travel agency usecase and an SMTP protocol

    A security analysis of email communications

    Get PDF
    The objective of this report is to analyse the security and privacy risks of email communications and identify technical countermeasures capable of mitigating them effectively. In order to do so, the report analyses from a technical point of view the core set of communication protocols and standards that support email communications in order to identify and understand the existing security and privacy vulnerabilities. On the basis of this analysis, the report identifies and analyses technical countermeasures, in the form of newer standards, protocols and tools, aimed at ensuring a better protection of the security and privacy of email communications. The practical implementation of each countermeasure is evaluated in order to understand its limitations and identify potential technical and organisational constrains that could limit its effectiveness in practice. The outcome of the above mentioned analysis is a set of recommendations regarding technical and organisational measures that when combined properly have the potential of more effectively mitigating the privacy and security risks of today's email communications.JRC.G.6-Digital Citizen Securit

    Session Kotlin: A hybrid session type embedding in Kotlin

    Get PDF
    Concurrency and distribution have become essential for building modern applications. However, developing and maintaining these apps is not an easy task. Communication errors are a common source of problems: unexpected messages cause runtime errors, and mutual dependencies lead to deadlocks. To address these issues, developers can define communication protocols that detail the structure and order of the transmitted messages, but maintaining protocol fidelity can be complex if carried out manually. Session types formalize this concept by materializing the communication protocol as a type that can be enforced by the language’s type system. In this thesis we present the first embedding of session types in Kotlin: we propose a Domain-Specific Language (DSL) for multiparty ses- sion types that lets developers write safe concurrent applications, with built-in validation and integrating code generation in the language’s framework.A concorrĂȘncia e a distribuição tĂȘm-se tornado essenciais na construção de aplicaçÔes modernas. No entanto, desenvolver e manter estas aplicaçÔes nĂŁo Ă© tarefa fĂĄcil. Erros de comunicação sĂŁo uma fonte comum de problemas: mensagens inesperadas causam erros durante a execução de cĂłdigo, e dependĂȘncias mĂștuas levam a deadlocks. Para resolver estas questĂ”es, Ă© tipico definir protocolos de comunicação que detalham a estrutura e a ordem das mensagens transmitidas, mas garantir o seu cumprimento pode ser complexo se feito manualmente. Os tipos de sessĂŁo formalizam este conceito ao materializar o protocolo de comunicação como um tipo que pode ser gerido pelo sistema de tipos da linguagem. Nesta tese apresentamos o primeiro embedding de tipos de sessĂŁo em Kotlin: propomos uma Linguagem de DomĂ­nio EspecĂ­fica para tipos de sessĂŁo com mĂșltiplos participantes que permite aos programadores a escrita de aplicaçÔes concorrentes seguras, incorporando validação e integrando a geração de cĂłdigo no framework da linguagem

    Information sharing architecture using internet\u27s XML and SOAP

    Get PDF
    Businesses should be able to share information among each other irrespective of the platform, operating systems and programming languages. Using Internet as the Information Systems Architecture has many values. Internet is affordable, easily available and is not tied to any specific vendor. Internet is simple and runs under any kind of operating system. Information sharing across the Internet is challenging but rewarding. Data Transfer using the Internet requires structure and discipline. To integrate diverse group of systems we need specialized protocols that can connect different platforms that use different languages together. Extensible Markup Language enables the creation of application dependent vocabulary which can be used to store data and information in a structured fashion. Simple Object Access Protocol can be used to carry information electronically from one end to the other. Simple Object Access Protocol uses the World Wide Web\u27s extensible Markup Language in encoding the message contents and its Hypertext Transport Protocol in carrying the message packet. This thesis work is focused upon sharing of information among enterprises using extensible Markup Language, Simple Object Access Protocol and decentralized database systems. An online Shopping cart application has been implemented using the notion of XML and SOAP. SOAP is used as a protocol to share information between AsiStore and its business partners Store 1 and Store2. XML have been used as a part of the application to drive the shopping cart, which users can view on the web browser

    Internet of Infringing Things: The Effect of Computer Interface Copyrights on Technology Standards

    Get PDF
    You connect to the Internet via your Wi-Fi access point. You surf the Web using a browser and send emails through your email server. You probably use some USB peripherals-say a mouse, keyboard, or printer. Maybe you even watch cable or broadcast television. Under current case law, each of those computer systems and devices may very well be copyright-infringing contraband. This is through no fault of your own-you need not be pirating music or streaming illegal movies to infringe a copyright. The infringement simply exists, hard-wired within each of those devices and many more that you use, a result of the devices\u27 basic operations: connecting to Wi-Fi, displaying web pages, sending email, connecting peripherals, or receiving broadcasts

    Applications of internet technology for requirements elicitation

    Get PDF
    During the Requirements Elicitation part of a project various stakeholders need to be able to communicate their requirements to the developers, and the developers need to be able communicate their understanding back to the stakeholders. Communication between the various members of the project is the key factor during the Requirements Elicitation part of a project. Easing communications between stakeholders and developers makes the process of eliciting requirement easier, leading to better requirements specification and eventually a better product. The Requirements Elicitation Process through Internet (REPI) web site has been designed and implemented to explore this idea. The prototype version of REPI guides project members through the elicitation phase using the Software Engineering Institute\u27s framework for Requirements Elicitation. The REPI web site forces stakeholders to explicitly describe the requirements and encourage early discussion between stakeholders and developers. This decreases the likelihood of misunderstood requirements, leading to better requirements specification
    • 

    corecore