A tradeoff is a situation that involves losing one quality or aspect of something in return for gaining another quality or aspect. Speaking about the tradeoff between performance and security indicates that both, performance and security, can be measured, and that to increase one, we have to pay in terms of the other. While established metrics for performance of systems exist this is not quite the case for security. In this chapter we present standard performance metrics and discuss proposed security metrics that are suitable for quantification. The dilemma of inferior metrics can be solved by considering indirect metrics such as computation cost of security mechanisms. Security mechanisms such as encryption or security protocols come at...
Ideally, a measure of the security of a system should capture quantitatively the intuitive notion of...
In this dissertation, we attempt to understand and predict the performance of security devices. More...
Security has traditionally been thought of as a system or network attribute that was the result of t...
Performance modelling and evaluation has long been considered of paramount importance to computer n...
All Internet-accessible computing systems are currently faced with incessant threats ranging from si...
Cyber-Physical Systems (CPS) are formed through interconnected components capable of computation, co...
We study the nature of the relationship between performance measures and privacy guarantees in the c...
The new opportunities that come with the Internet as a worldwide network bring the new threats and r...
Quite often failures in network based services and server systems may not be accidental, but rather ...
The development of the IT industry and computing resources allows the formation of cyberphysical soc...
In this paper we identify several areas in which the satisfaction of security requirements can aect ...
This paper documents and analyses a number of security metrics currently in popular use. These will ...
Abstract—Performance analysis and the design of computer and networking systems have traditionally a...
Abstract. We use an enhanced operational semantics to infer quantitative measures on systems describ...
Abstract—Secure computation (SC) are cryptographic proto-cols that enable multiple parties to perfor...
Ideally, a measure of the security of a system should capture quantitatively the intuitive notion of...
In this dissertation, we attempt to understand and predict the performance of security devices. More...
Security has traditionally been thought of as a system or network attribute that was the result of t...
Performance modelling and evaluation has long been considered of paramount importance to computer n...
All Internet-accessible computing systems are currently faced with incessant threats ranging from si...
Cyber-Physical Systems (CPS) are formed through interconnected components capable of computation, co...
We study the nature of the relationship between performance measures and privacy guarantees in the c...
The new opportunities that come with the Internet as a worldwide network bring the new threats and r...
Quite often failures in network based services and server systems may not be accidental, but rather ...
The development of the IT industry and computing resources allows the formation of cyberphysical soc...
In this paper we identify several areas in which the satisfaction of security requirements can aect ...
This paper documents and analyses a number of security metrics currently in popular use. These will ...
Abstract—Performance analysis and the design of computer and networking systems have traditionally a...
Abstract. We use an enhanced operational semantics to infer quantitative measures on systems describ...
Abstract—Secure computation (SC) are cryptographic proto-cols that enable multiple parties to perfor...
Ideally, a measure of the security of a system should capture quantitatively the intuitive notion of...
In this dissertation, we attempt to understand and predict the performance of security devices. More...
Security has traditionally been thought of as a system or network attribute that was the result of t...