Security performance

Several protocols and mechanisms aims to enforce the various dimensions of security in applications ranging from e-mail to e-commerce transactions. Most use encryption as a basic component. Adding such mechanisms and procedures to applications and systems does not come cheaply, however. Security is...

Full description

Saved in:
Bibliographic Details
Published in:IEEE internet computing Vol. 7; no. 3; pp. 84 - 87
Main Author: Menasce, D.A.
Format: Journal Article
Language:English
Published: Los Alamitos IEEE 01-05-2003
IEEE Computer Society
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Several protocols and mechanisms aims to enforce the various dimensions of security in applications ranging from e-mail to e-commerce transactions. Most use encryption as a basic component. Adding such mechanisms and procedures to applications and systems does not come cheaply, however. Security is intrusive and increases the total cost of computer-system ownership. He also indicates that security is about trade-offs, rather than absolutes, and that we should strive for good-enough security, not for more security than necessary. This thought underlies the following description of some security trade-offs in the areas of performance and scalability. My analysis is quantitative in nature and aims to illustrate the effect of using a specific security protocol or set of cryptographic algorithms on a computer system's performance.
Bibliography:ObjectType-Article-2
SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 23
ISSN:1089-7801
1941-0131
DOI:10.1109/MIC.2003.1200305