Quality of Protection Evaluation of Security Mechanisms

نویسندگان

  • Bogdan Ksiezopolski
  • Tomasz Zurek
  • Michail Mokkas
چکیده

Recent research indicates that during the design of teleinformatic system the tradeoff between the systems performance and the system protection should be made. The traditional approach assumes that the best way is to apply the strongest possible security measures. Unfortunately, the overestimation of security measures can lead to the unreasonable increase of system load. This is especially important in multimedia systems where the performance has critical character. In many cases determination of the required level of protection and adjustment of some security measures to these requirements increase system efficiency. Such an approach is achieved by means of the quality of protection models where the security measures are evaluated according to their influence on the system security. In the paper, we propose a model for QoP evaluation of security mechanisms. Owing to this model, one can quantify the influence of particular security mechanisms on ensuring security attributes. The methodology of our model preparation is described and based on it the case study analysis is presented. We support our method by the tool where the models can be defined and QoP evaluation can be performed. Finally, we have modelled TLS cryptographic protocol and presented the QoP security mechanisms evaluation for the selected versions of this protocol.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analysis and Evaluation of Privacy Protection Behavior and Information Disclosure Concerns in Online Social Networks

Online Social Networks (OSN) becomes the largest infrastructure for social interactions like: making relationship, sharing personal experiences and service delivery. Nowadays social networks have been widely welcomed by people. Most of the researches about managing privacy protection within social networks sites (SNS), observes users as owner of their information. However, individuals cannot co...

متن کامل

Sicherheitsaspekte in virtuellen Welten: IT-Sicherheitsanalyse und Anforderungsdefinition unter Berücksichtigung der Faktoren für Unterhaltungserleben

Virtual Worlds are socio-technical systems, which means that they are IT-systems that are specifically catered to the users. This PhD thesis provides a systematic IT-Security analysis for Virtual Worlds with a client-server architecture and defines security requirements taking into account the different factors for perceived entertainment. IT-Security focuses on the protection of digital assets...

متن کامل

Multilevel Security and Quality of Protection

Constraining how information may flow within a system is at the heart of many protection mechanisms and many security policies have direct interpretations in terms of information flow and multilevel security style controls. However, while conceptually simple, multilevel security controls have been difficult to achieve in practice. In this paper we explore how the traditional assurance measures ...

متن کامل

بررسی فرآیند حمایت حقوقی از اطلاعات بالینی و آزمایشگاهی داروها در حقوق ایران، اتحادیه اروپا و ایالات متحده آمریکا

One of the most important new evidence of intellectual property that had always plenty of differences behind it regarding the protection or non-protection is the new medicine laboratory information that is presented to the competent state authority for consideration and registry. The original purpose of intellectual property is to protect all property that derives from human intellectual leakin...

متن کامل

Analyzing Tools and Algorithms for Privacy Protection and Data Security in Social Networks

The purpose of this research, is to study factors influencing privacy concerns about data security and protection on social network sites and its’ influence on self-disclosure. 100 articles about privacy protection, data security, information disclosure and Information leakage on social networks were studied. Models and algorithms types and their repetition in articles have been distinguished a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره 2014  شماره 

صفحات  -

تاریخ انتشار 2014