SIGIR '87 Proceedings of the 10th annual international ACM SIGIR conference on Research and development in information retrieval
A case study of caching strategies for a distributed full text retrieval system
Information Processing and Management: an International Journal
Data caching strategies for distributed full text retrieval systems
Information Systems
Journal of the American Society for Information Science
Information retrieval in the World-Wide Web: making client-based searching feasible
Selected papers of the first conference on World-Wide Web
The case for persistent-connection HTTP
SIGCOMM '95 Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
Main memory caching of Web documents
Proceedings of the fifth international World Wide Web conference on Computer networks and ISDN systems
Web server workload characterization: the search for invariants
Proceedings of the 1996 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Using predictive prefetching to improve World Wide Web latency
ACM SIGCOMM Computer Communication Review
Removal policies in network caches for World-Wide Web documents
Conference proceedings on Applications, technologies, architectures, and protocols for computer communications
Measuring proxy performance with the Wisconsin Proxy benchmark
Computer Networks and ISDN Systems - Selected papers of the 3rd international caching workshop
Retrieval performance of a distributed text database utilizing a parallel processor document server
DPDS '90 Proceedings of the second international symposium on Databases in parallel and distributed systems
Scalable Text Retrieval for Large Digital Libraries
ECDL '97 Proceedings of the First European Conference on Research and Advanced Technology for Digital Libraries
Application-level document caching in the Internet
SDNE '95 Proceedings of the 2nd International Workshop on Services in Distributed and Networked Environments
Characteristics of WWW Client-based Traces
Characteristics of WWW Client-based Traces
User access patterns to NCSA''s World Wide Web server
User access patterns to NCSA''s World Wide Web server
Measuring the capacity of a web server
USITS'97 Proceedings of the USENIX Symposium on Internet Technologies and Systems on USENIX Symposium on Internet Technologies and Systems
Malware resistant networking using system diversity
Proceedings of the 6th conference on Information technology education
Pricing digital content distribution over heterogeneous channels
Decision Support Systems
Hi-index | 0.00 |
Contemporary e-business networks are increasingly implementing the multi-layer security scheme in order to provide a reasonable measure of security for their information systems. The implementation entails formation of a layered architecture (concentric security layers) using packet and application-level filters neither of which provides complimentary functions. The layered architecture provides convenient abstractions and increases the end-to-end latency that results into sub-optimal system performance. In this paper, we present the results of the experiment to quantify the latency introduced by security layering on end-to-end latency and investigate the resulting degree of sub-optimality of system performance in a distributed and switched e-business network.