Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Simplex Email: Controlled Access of an Email Account among the Users of a Cluster

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Shirisha Kakarla, Archana Nagelli, Geeta Vemula

Archana Nagelli Shirisha Kakarla and Geeta Vemula. Simplex Email: Controlled Access of an Email Account among the Users of a Cluster. International Journal of Computer Applications 141(1):5-9, May 2016. BibTeX

	author = {Shirisha Kakarla, Archana Nagelli and Geeta Vemula},
	title = {Simplex Email: Controlled Access of an Email Account among the Users of a Cluster},
	journal = {International Journal of Computer Applications},
	issue_date = {May 2016},
	volume = {141},
	number = {1},
	month = {May},
	year = {2016},
	issn = {0975-8887},
	pages = {5-9},
	numpages = {5},
	url = {},
	doi = {10.5120/ijca2016907742},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


In this paper, we have addressed a scenario, where a group of people are in need to access the common files of enormous size through mails. However, the space constraint observed in the mailbox of an individual, be in the public domain or in the private domain, either due to insufficient remaining space or the allocated space, the considerably large files cannot be communicated. We have proposed a simplex mail account, meant for people within an organization, academic institution, government, etc., wherein the bigger files can easily be stored and accessed through mail. The simplex mail account is a single mail account and can be viewed by number of people with two sets of privileges. Though a single mailbox is accessed with number of people simultaneously, the security issues are as good as the ones being offered by the other mailing systems already available.


  1. Stine, Kevin; Scholl, Matthew. "E-mail Security: An Overview of Threats and Safeguards." Journal of AHIMA 81, no.4, April 2010, pp. 28-30.
  2. Schneier, B. “Secrets and Lies: Digital security in a Networked World”, New York, Wiley, 2000.
  3. National Research Council, “Computers at Risk: Safe Computing in the Information Age”, Washington, D.C: National academy Press, 1991NRC91.
  4. Cai Longzheng, Yu Shengsheng, Zhou Jing-li, "Research and Implementation of Remote Desktop Protocol Service Over SSL VPN", SCC, 2004, Proceedings. 2004 IEEE International Conference on Services Computing, Proceedings, 2004, pp. 502-505, doi:10.1109/SCC.2004.1358052
  5. Charlie Russell, Craig Zacker , “Introducing Windows Server 2008 R2”, published by Microsoft Press, 2010 , pp. 47-58.
  6. Santiago, J., Vigneron, L., “Study for Automatically Analyzing Non-repudiation”, ACI Sécurité SATIN and the IST-2001-39252 AVISPA project.
  7. Robinson, P., Cook, N., Shrivastava, S., “Implementing Fair Non-repudiable Interactions with Web Services”, Proceedings of the 2005 Ninth IEEE International EDOC Enterprise Computing Conference, EDOC 2005, 2005, 0-7695-2441-9/05.
  8. Kemp, M., “Barbarians inside the gates: Addressing internal security threats”, Network Security, 2005 (6), pp. 11-13.
  9. Hayden, M. “The Insider Threat to U.S. Government Information Systems”, National Security Telecommunications and Information Systems Security Committee, 1999.
  10. Bloomsburg University of Pennsylvania. (n.d.). Remote Desktop Connection? Retrieved from


simplex mail account, authorization, two-factor authentication, repudiation, denial of service.