Fischer, Daniel; Markscheffel, Bernd; Scherr, Kilian:
Secure e-mail communication - comparison and selection of encryption solutions using an utility value analysis approach
In: 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST) - 12. International Conference for Internet Technology and Secured Transactions (Cambridge, 11.-14.12.2017); 12. ICITST (Cambridge, 11.-14.12.2017); Chaos-based Data Protection, Data Security and Hiding in Multimedia Communications (CDP-DSHMC) (Cambridge, 11.-14.12.2017); 8. International Workshop on Cloud Applications and Security (CAS) (Cambridge, 11.-14.12.2017) - Piscataway, NJ: IEEE, 2017, pp. 433 - 435
2017Conference paper in Conference proceedingsClosed Access
Technische Universität Ilmenau (1992-) » Department of Economic Sciences and Media (2014-) » Institute for Business Information Systems Engineering (1992-) » Fachgebiet Informations- und Wissensmanagement (2002-)
Title in English:
Secure e-mail communication - comparison and selection of encryption solutions using an utility value analysis approach
Author:
Fischer, DanielTU
GND
136702791
ORCID
0009-0001-0617-1826ORCID iD
SCOPUS
57193715381
Other
connected with university
;
Markscheffel, BerndTU
GND
1218263296
ORCID
0000-0001-9144-7948ORCID iD
ResearcherID
A-9598-2010
SCOPUS
24723153900
Other
connected with university
;
Scherr, Kilian
SCOPUS
57202372063
Year of publication:
2017
Open-Access-Way of publication:
Closed Access
IEEE ID
Scopus ID
PPN:
Language of text:
English
Keyword, Topic:
comparing ; e-mail ; encryption solutions ; selecting ; utility value analysis
Media:
online resources
Type of resource:
Text
Peer Reviewed:
Yes
Part of statistic:
Yes

Abstract in English:

E-mail is one of the most frequently used means of communication. Confidentiality, integrity and authenticity are often indispensable in e-mail communication, especially in business use. However, these security objectives can only be guaranteed with the help of additional encryption solutions. Today, there are a variety of client, gateway and software-as-a-service solutions for e-mail encryption. Companies are faced with the challenge of finding the most suitable solution for them. Our research work presents findings from a utility value analysis which provides a comprehensive process for selecting an appropriate solution for securing e-mail traffic. We present the basic principles behind the utility value analysis and how it is used for the evaluation and selection process of e-mail encryption solutions. In addition, we document how our methodology was applied in a practice-based project to make a selection decision between six existing encryption solutions.