ACM Transactions on Computer Systems (TOCS)
Formal analysis of modern security protocols
Information Sciences—Informatics and Computer Science: An International Journal
Risky trust: risk-based analysis of software systems
SESS '05 Proceedings of the 2005 workshop on Software engineering for secure systems—building trustworthy applications
Quality of protection for mobile multimedia applications
ICME '03 Proceedings of the 2003 International Conference on Multimedia and Expo - Volume 1
Mobile Networks and Applications
Quality-of-Protection (QoP): A Quantitative Methodology to Grade Security Services
ICDCSW '08 Proceedings of the 2008 The 28th International Conference on Distributed Computing Systems Workshops
Automated Security Protocol Analysis With the AVISPA Tool
Electronic Notes in Theoretical Computer Science (ENTCS)
Hi-index | 0.00 |
Security protocols used in today's communication are complex and it is very difficult to analyze and optimize them. Literature reports some results which optimize security protocols. In the case of devices with limited resources (mobile phones, PDA, sensors) the speed and efficiency of the process is crucial for their stable work. Security methods used during transporting the data between parties are crucial as for as efficiency is concerned. However, optimization cannot significantly reduce the security of the process. We must remember that in many fields (e.g. e-banking, e-court etc.) security level will always be the main factor. In this paper, we show how to optimize security protocols in terms of the security level. We present the visualization tool for the adaptable security model, which defines the protection level of the transmitted data. These elements help us analyze and optimize a cryptographic protocol. The presented optimization results are based on the TLS protocol. We describe this protocol by the adaptable model and we create different versions of the protocol. Finally, we discuss differences between them and their impact on the protection level.