Abstract
The important role of e-mail in business communication demands a protection of the transmitted information, not only within one company, but in particular across company borders. E-mail encryption using digital certificates provides means to fulfill this demand. The article discusses the obstacles organizations are faced with during the set up and operation of e-mail encryption between companies. Based on the case study of Siemens, experiences made as well as organizational and infrastructural solutions are outlined.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Four Bridges Forum, http://www.the4bf.com.
European Bridge-CA, https://www.bridge-ca.org.
Internet Engineering Task Force: RFC2251, Lightweight Directory Access Protocol v3, 1997, http://www.ietf.org/rfc/rfc2251.txt.
Internet Engineering Task Force: RFC3647, Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework, 2003, http://www.ietf.org/rfc/rfc3647.txt
Internet Engineering Task Force: RFC2633, Secure/Multipurpose Internet Mail Extensions (S/MIME) v3.1, 2004, http://www.ietf.org/rfc/rfc3851.txt.
Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, 2008, http://www.ietf.org/rfc/rfc5280.txt
Transglobal Secure Collaboration Program, http://tscp.org.
Transglobal Secure Collaboration Program: Secure E-Mail Specification, 2008, http://tscp.org/pdfs/SecEmlTechSpecv2-1GR.pdf.
International Organization for Standardization: Information technology - Open Systems Interconnection - The Directory: Public-key and attribute certificate frameworks, ISO/IEC 9594-8, 200.
Editor information
Rights and permissions
Copyright information
© 2010 Vieweg+Teubner | GWV Fachverlage GmbH
About this chapter
Cite this chapter
Wichmann, M., von der Heidt, G., Hille, C., Jacobson, G. (2010). Secure E-Mail Communication across Company Boundaries Experiences and Architectures. In: Pohlmann, N., Reimer, H., Schneider, W. (eds) ISSE 2009 Securing Electronic Business Processes. Vieweg+Teubner. https://doi.org/10.1007/978-3-8348-9363-5_12
Download citation
DOI: https://doi.org/10.1007/978-3-8348-9363-5_12
Publisher Name: Vieweg+Teubner
Print ISBN: 978-3-8348-0958-2
Online ISBN: 978-3-8348-9363-5
eBook Packages: Computer ScienceComputer Science (R0)