Fundamentals of queueing theory (2nd ed.).
Fundamentals of queueing theory (2nd ed.).
ACM Transactions on Computer Systems (TOCS)
TCP/IP illustrated (vol. 1): the protocols
TCP/IP illustrated (vol. 1): the protocols
Security on the move: indirect authentication using Kerberos
MobiCom '96 Proceedings of the 2nd annual international conference on Mobile computing and networking
Using encryption for authentication in large networks of computers
Communications of the ACM
The performance of public key-enabled kerberos authentication in mobile computing applications
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Scaling for E Business: Technologies, Models, Performance, and Capacity Planning
Scaling for E Business: Technologies, Models, Performance, and Capacity Planning
Capacity Planning for Web Services: metrics, models, and methods
Capacity Planning for Web Services: metrics, models, and methods
IEEE Internet Computing
Security Versus Performance Requirements in Data Communications Systems
ESORICS '94 Proceedings of the Third European Symposium on Research in Computer Security
Proceedings of the International DCE Workshop on DCE - The OSF Distributed Computing Environment, Client/Server Model and Beyond
High-Bandwidth Encryption with Low-Bandwidth Smartcards
Proceedings of the Third International Workshop on Fast Software Encryption
Distributed Authentication in Kerberos Using Public Key Cryptography
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
Performance Evaluation of a New Hybrid Encryption Protocol for Authentication and Key Distribution
ISCC '99 Proceedings of the The Fourth IEEE Symposium on Computers and Communications
Performance of Public-Key-Enabled Kerberos Authentication in Large Networks
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Internet protocol performance over networks with wireless links
IEEE Network: The Magazine of Global Internetworking
Towards a library of composable models to estimate the performance of security solutions
WOSP '08 Proceedings of the 7th international workshop on Software and performance
An architectural framework for analyzing tradeoffs between software security and performance
ISARCS'10 Proceedings of the First international conference on Architecting Critical Systems
Hi-index | 0.00 |
Performance, in terms of user response time and the consumption of processing and communications resources, is an important factor to be considered when designing authentication protocols. The mix of public key and secret key encryption algorithms typically included in these protocols makes it difficult to model performance using conventional analytical methods. In this article, we develop a validated modeling methodology to be used for analyzing authentication protocol features, and we use two examples to illustrate the methodology. In the first example, we analyze the environmental parameters that favor one proposed public-key-enabled Kerberos variant over another in the context of a large, multiple-realm network. In the second example, we propose a Kerberos variant for a mobile computing environment and analyze the performance benefits realized by introducing a proxy to offload processing and communications workload.