Abstract
The problem of efficiency in the IT systems is now widely discussed. One of the factors affecting the performance of IT systems is implementation and maintaining a high level of security. In many cases the guaranteed security level is too high in relation to the real threats. The implementation and maintenance of this protection level is expensive in terms of both productivity and financial costs.
The paper presents the analysis of TLS Handshake protocol in terms of quality of protection performed by the Quality of Protection Modelling Language (QoP-ML). The analysis concerns efficiency.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Jaquith, A.: Security Metrics: Replacing Fear, Uncertainty, and Doubt. Addison Wesley (2007)
Jürjens, J.: Secure System Development with UML. Springer (2007)
Jürjens, J.: Tools for Secure Systems Development with UML. International Journal on Software Tools for Technology Transfer 9, 527–544 (2007)
Ksiezopolski, B.: QoP-ML: Quality of Protection modelling language for cryptographic protocols. Computers & Security 31(4), 569–596 (2012)
Ksiezopolski, B., Kotulski, Z.: Adaptable security mechanism for the dynamic environments. Computers & Security 26, 246–255 (2007)
Ksiezopolski, B., Kotulski, Z., Szalachowski, P.: Adaptive approach to network security. Communications in Computer and Information Science 158, 233–241 (2009)
Lambrinoudakis, C., Gritzalis, S., Dridi, F., Pernul, G.: Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy 2003. Computers & Security 26, 1873–1883 (2003)
LeMay, E., Unkenholz, W., Parks, D.: Adversary-Driven State-Based System Security Evaluation. In: Workshop on Security Metrics - MetriSec (2010)
Lindskog, S.: Modeling and Tuning Security from a Quality of Service Perspective. PhD dissertation, Department of Computer Science and Engineering, Chalmers University of Technology, Goteborg, Sweden (2005)
Luo, A., Lin, C., Wang, K., Lei, L., Liu, C.: Quality of protection analysis and performance modeling in IP multimedia subsystem. Computers Communications 32, 1336–1345 (2009)
Openssl Project: http://www.openssl.org/
Petriu, D.C., Woodside, C.M., Petriu, D.B., Xu, J., Israr, T., Georg, G., France, R., Bieman, J.M., Houmb, S.H., Jürjens, J.: Performance Analysis of Security Aspects in UML Models. In: Sixth International Workshop on Software and Performance. ACM, Buenos Aires (2007)
Sun, Y., Kumar, A.: Quality od Protection(QoP): A quantitative methodology to grade security services. In: 28th Confrence on Distributed Computing Systems Workshop, pp. 394–399 (2008)
Szalachowski, P., Ksiezopolski, B., Kotulski, Z.: CMAC, CCM and GCM/GMAC: advanced modes of operation of symmetric block ciphers in the Wireless Sensor Networks. Information Processing Letters 110, 247–251 (2010)
Theoharidou, M., Kotzanikolaou, P., Gritzalis, S.: A multi-layer Criticality Assessment methodology based on interdependencies. Computers & Security 29, 643–658 (2010)
RFC 5246: The Transport Layer Security (TLS) Protocol v.1.2 (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ksiezopolski, B., Rusinek, D., Wierzbicki, A. (2013). On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML). In: Mustofa, K., Neuhold, E.J., Tjoa, A.M., Weippl, E., You, I. (eds) Information and Communication Technology. ICT-EurAsia 2013. Lecture Notes in Computer Science, vol 7804. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36818-9_27
Download citation
DOI: https://doi.org/10.1007/978-3-642-36818-9_27
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-36817-2
Online ISBN: 978-3-642-36818-9
eBook Packages: Computer ScienceComputer Science (R0)