On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML)

نویسندگان

  • Bogdan Ksiezopolski
  • Damian Rusinek
  • Adam Wierzbicki
چکیده

The problem of efficiency in the IT systems is now widely discussed. One of the factors affecting the performance of IT systems is implementation and maintaining a high level of security. In many cases the guaranteed security level is too high in relation to the real threats. The implementation and maintenance of this protection level is expensive in terms of both productivity and financial costs. The paper presents the analysis of TLS Handshake protocol in terms of quality of protection performed by the Quality of Protection Modelling Language (QoP-ML). The analysis concerns efficiency.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the modelling of Kerberos protocol in the Quality of Protection Modelling Language (QoP-ML)

The security modelling of IT systems is a very complicated task. One of the issues which must be analysed is the performance of IT systems. In many cases the guaranteed security level is too high in relation to the real threats. The overestimation of security measures can decrease system performance. The paper presents the analysis of Kerberos cryptographic protocol in terms of quality of prote...

متن کامل

Modelling of the spatial distribution of the rare plant Lilium ledebourii

The aim of this study was modelling the spatial distribution ofLilium ledebourii (Baker) Boiss. based on ecological characteristics, in order to predict potential habitats for conservation of a rare plant. Knowledge of the spatial distributions of rare and threatened species and the underlying ecological factors plays an important role in regional conservation assessments and development planni...

متن کامل

Secure Energy Tradeoffs with Low Power Consumption in Data Transmission of Wireless Sensor Networks

Sensitivity of the Wireless Sensor Networks (WSN) is the main emerging concept in real time application for data transmission and other operations in process of networks. Security in WSN is challenging issue in recent network applications in design and implementation. A new extremely scalable key organization plan for Wireless Sensor Network. For that objective, we create use, for the very firs...

متن کامل

Quality of Protection Evaluation of Security Mechanisms

Recent research indicates that during the design of teleinformatic system the tradeoff between the systems performance and the system protection should be made. The traditional approach assumes that the best way is to apply the strongest possible security measures. Unfortunately, the overestimation of security measures can lead to the unreasonable increase of system load. This is especially imp...

متن کامل

AN APPLICATION OF FUZZY NUMBERS TO THE ASSESSMENT OF MATHEMATICAL MODELLING SKILLS

In this paper we use the Triangular and Trapezoidal Fuzzy Numbers as tools for assessing student Mathematical Modelling (MM) skills. Fuzzy Numbers play a fundamental role in fuzzy mathematics analogous to the role played by the ordinary numbers in classical mathematics, On the other hand, MM appears today as a dynamic tool for teaching and learning mathematics, because it connects mathematics w...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013