A compositional approach to performance modelling
A compositional approach to performance modelling
Cryptography and network security (2nd ed.): principles and practice
Cryptography and network security (2nd ed.): principles and practice
Probabilistic modelling
Using encryption for authentication in large networks of computers
Communications of the ACM
Performance of Computer Communication Systems: A Model-Based Approach
Performance of Computer Communication Systems: A Model-Based Approach
An Experimental Analysis of Cryptographic Overhead in Performance-Critical Systems
MASCOTS '99 Proceedings of the 7th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems
Fluid Flow Approximation of PEPA models
QEST '05 Proceedings of the Second International Conference on the Quantitative Evaluation of Systems
QEST '07 Proceedings of the Fourth International Conference on Quantitative Evaluation of Systems
Approximate Solution of a PEPA Model of a Key Distribution Centre
SIPEW '08 Proceedings of the SPEC international workshop on Performance Evaluation: Metrics, Models and Benchmarks
Securing Statically-verified Communications Protocols Against Timing Attacks
Electronic Notes in Theoretical Computer Science (ENTCS)
Performance analysis of stochastic Process algebra models using stochastic simulation
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Performance and security tradeoff
SFM'10 Proceedings of the Formal methods for quantitative aspects of programming languages, and 10th international conference on School on formal methods for the design of computer, communication and software systems
Formal performance modelling: from protocols to people
EPEW'12 Proceedings of the 9th European conference on Computer Performance Engineering
Formal performance modelling: from protocols to people
EPEW'12 Proceedings of the 9th European conference on Computer Performance Engineering
Hi-index | 0.00 |
In this paper we explore the trade-off between security and performance in considering a model of a key distribution centre. The model is specified using the Markovian process algebra PEPA. The basic model suffers from the commonly encountered state space explosion problem, and so we apply some efficient techniques to solve it. First, we use model reduction techniques and approximation to give a form of the model (in fact, a closed queueing network model) which is more scalable. We then consider the use of a fluid flow approximation based on ordinary differential equations (ODEs) derived from an alternative form of the simplified model. Finally, we evaluate a utility function of this secure key exchange model. Three questions have been proposed; how many clients can a given KDC configure support? how much service capacity must we provide at a KDC to satisfy a given number of clients? and what is the maximum rate at which keys can be refreshed before the KDC performance begins to degrade under a given demand on a given system? These questions are explored through numerical examples.