Limits...
Quality of protection evaluation of security mechanisms.

Ksiezopolski B, Zurek T, Mokkas M - ScientificWorldJournal (2014)

Bottom Line: The methodology of our model preparation is described and based on it the case study analysis is presented.We support our method by the tool where the models can be defined and QoP evaluation can be performed.Finally, we have modelled TLS cryptographic protocol and presented the QoP security mechanisms evaluation for the selected versions of this protocol.

View Article: PubMed Central - PubMed

Affiliation: Institute of Computer Science, Maria Curie-Sklodowska University, Plac Marii Curie-Sklodowskiej 5, 20-031 Lublin, Poland ; Polish-Japanese Institute of Information Technology, Koszykowa 86, 02-008 Warsaw, Poland.

ABSTRACT
Recent research indicates that during the design of teleinformatic system the tradeoff between the systems performance and the system protection should be made. The traditional approach assumes that the best way is to apply the strongest possible security measures. Unfortunately, the overestimation of security measures can lead to the unreasonable increase of system load. This is especially important in multimedia systems where the performance has critical character. In many cases determination of the required level of protection and adjustment of some security measures to these requirements increase system efficiency. Such an approach is achieved by means of the quality of protection models where the security measures are evaluated according to their influence on the system security. In the paper, we propose a model for QoP evaluation of security mechanisms. Owing to this model, one can quantify the influence of particular security mechanisms on ensuring security attributes. The methodology of our model preparation is described and based on it the case study analysis is presented. We support our method by the tool where the models can be defined and QoP evaluation can be performed. Finally, we have modelled TLS cryptographic protocol and presented the QoP security mechanisms evaluation for the selected versions of this protocol.

Show MeSH
The methodology of QoP evaluation of security mechanisms.
© Copyright Policy - open-access
Related In: Results  -  Collection


getmorefigures.php?uid=PMC4127209&req=5

fig1: The methodology of QoP evaluation of security mechanisms.

Mentions: The QoP evaluation of security mechanisms is a process which can be divided into four stages: QoP modelling, linking, configuration, and QoP evaluation. In Figure 1 the methodology of the process is presented.


Quality of protection evaluation of security mechanisms.

Ksiezopolski B, Zurek T, Mokkas M - ScientificWorldJournal (2014)

The methodology of QoP evaluation of security mechanisms.
© Copyright Policy - open-access
Related In: Results  -  Collection

Show All Figures
getmorefigures.php?uid=PMC4127209&req=5

fig1: The methodology of QoP evaluation of security mechanisms.
Mentions: The QoP evaluation of security mechanisms is a process which can be divided into four stages: QoP modelling, linking, configuration, and QoP evaluation. In Figure 1 the methodology of the process is presented.

Bottom Line: The methodology of our model preparation is described and based on it the case study analysis is presented.We support our method by the tool where the models can be defined and QoP evaluation can be performed.Finally, we have modelled TLS cryptographic protocol and presented the QoP security mechanisms evaluation for the selected versions of this protocol.

View Article: PubMed Central - PubMed

Affiliation: Institute of Computer Science, Maria Curie-Sklodowska University, Plac Marii Curie-Sklodowskiej 5, 20-031 Lublin, Poland ; Polish-Japanese Institute of Information Technology, Koszykowa 86, 02-008 Warsaw, Poland.

ABSTRACT
Recent research indicates that during the design of teleinformatic system the tradeoff between the systems performance and the system protection should be made. The traditional approach assumes that the best way is to apply the strongest possible security measures. Unfortunately, the overestimation of security measures can lead to the unreasonable increase of system load. This is especially important in multimedia systems where the performance has critical character. In many cases determination of the required level of protection and adjustment of some security measures to these requirements increase system efficiency. Such an approach is achieved by means of the quality of protection models where the security measures are evaluated according to their influence on the system security. In the paper, we propose a model for QoP evaluation of security mechanisms. Owing to this model, one can quantify the influence of particular security mechanisms on ensuring security attributes. The methodology of our model preparation is described and based on it the case study analysis is presented. We support our method by the tool where the models can be defined and QoP evaluation can be performed. Finally, we have modelled TLS cryptographic protocol and presented the QoP security mechanisms evaluation for the selected versions of this protocol.

Show MeSH