Scaling for E Business: Technologies, Models, Performance, and Capacity Planning
Scaling for E Business: Technologies, Models, Performance, and Capacity Planning
Good-Enough Security: Toward a Pragmatic Business-Driven Discipline
IEEE Internet Computing
An Experimental Analysis of Cryptographic Overhead in Performance-Critical Systems
MASCOTS '99 Proceedings of the 7th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems
Web Server Software Architectures
IEEE Internet Computing
Performance analysis of security aspects in UML models
WOSP '07 Proceedings of the 6th international workshop on Software and performance
Protecting RFID communications in supply chains
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
A hybrid closed queuing network model for multi-threaded dataflow architecture
Computers and Electrical Engineering
A framework for utility-based service oriented design in SASSY
Proceedings of the first joint WOSP/SIPEW international conference on Performance engineering
BIOS security analysis and a kind of trusted BIOS
ICICS'07 Proceedings of the 9th international conference on Information and communications security
Achieving high security and efficiency in RFID-tagged supply chains
International Journal of Applied Cryptography
Security and scalability of remote entrusting protection
MMM-ACNS'10 Proceedings of the 5th international conference on Mathematical methods, models and architectures for computer network security
A secret sharing based privacy enforcement mechanism for untrusted social networking operators
MiFor '11 Proceedings of the 3rd international ACM workshop on Multimedia in forensics and intelligence
Self-star Properties in Complex Information Systems
An architectural framework for analyzing tradeoffs between software security and performance
ISARCS'10 Proceedings of the First international conference on Architecting Critical Systems
Proceedings of the 3rd international ACM SIGSOFT symposium on Architecting Critical Systems
Hi-index | 0.01 |
Several protocols and mechanisms aim to enforce the various dimensions of security in applications ranging from email to e-commerce transactions. Adding such mechanisms and proceduresto applications and systems does not come cheaply, however, as they impose security trade-offs in the areas of performance and scalability.