Stone et al., 2004 - Google Patents
Instant Messaging or Instant Headache? IM has found a home within the enterprise, but it's far from secure.Stone et al., 2004
View PDF- Document ID
- 11943623114544402755
- Author
- Stone J
- Merrion S
- Publication year
- Publication venue
- Queue
External Links
Snippet
It'sa reality. You have IM (instant messaging) clients in your environment. You have already recognized that it is eating up more and more of your network bandwidth and with Microsoft building IM capability into its XP operating system and applications, you know this will only …
- 206010019233 Headache 0 title description 6
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/58—Message switching systems, e.g. electronic mail systems
- H04L12/581—Real time or near real time messaging, e.g. instant messaging [IM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/58—Message switching systems, e.g. electronic mail systems
- H04L12/5825—Message adaptation based on network or terminal capabilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/58—Message switching systems, e.g. electronic mail systems
- H04L12/589—Message switching systems, e.g. electronic mail systems unified messaging, e.g. interactions between instant messaging [IM], e-mail or other types of messages such as Converged IP Messaging [CPM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/28—Details regarding addressing issues
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
- H04L51/046—Real-time or near real-time messaging, e.g. instant messaging [IM] interacting with other applications or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
- H04L51/043—Real-time or near real-time messaging, e.g. instant messaging [IM] use or manipulation of presence information in messaging
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/24—Presence management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/14—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages with selective forwarding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/38—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages in combination with wireless systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/06—Message adaptation based on network or terminal capabilities
- H04L51/066—Message adaptation based on network or terminal capabilities with adaptation of format
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Mannan et al. | Secure public instant messaging: A survey | |
Haber et al. | Attack vectors | |
Stone et al. | Instant Messaging or Instant Headache? IM has found a home within the enterprise, but it’s far from secure. | |
Dubrawsky | How to cheat at securing your network | |
CISM et al. | IM instant messaging security | |
Bixenstine | Employment Law Implications of a Remote Workplace. | |
Ollmann | Securing against the ‘threat’of instant | |
Sachs et al. | Securing IM and P2P Applications for the Enterprise | |
Mohseni | Network Security for Small Businesses | |
Granneman | Working from Home: A Hacker's Perspective | |
Broucek et al. | A Forensic Computing perspective on the need for improved user education for information systems security management | |
Wei et al. | Foggy: a new anonymous communication architecture based on microservices | |
Gibson | CISSP Rapid Review | |
Dholakia | Zeroing in on Zero Trust Architecture. | |
Broucek | for Information Systems | |
Xiao | Improving home-user security through outsourced services | |
Miltenburg et al. | Preventing Common Attacks on Critical Infrastructure | |
William | An Introduction to Internet Security and Firewall Policies | |
Park et al. | Security Analyses for Enterprise Instant Messaging (EIM) Systems. | |
Fink | E-Commerce Security | |
Gilliland | Understanding the IM security threat | |
Nyakomitta et al. | Empirical investigation of instant messaging security in a virtual environment | |
Ahmed | Future Internet (FI) Infrastructure and its security: A case study | |
Spinellis | System Security Implementation | |
INFORMATIONSYSTEMSSEC | Understanding the IM Security Threat |