Cargando…

Quality of Protection Evaluation of Security Mechanisms

Recent research indicates that during the design of teleinformatic system the tradeoff between the systems performance and the system protection should be made. The traditional approach assumes that the best way is to apply the strongest possible security measures. Unfortunately, the overestimation...

Descripción completa

Detalles Bibliográficos
Autores principales: Ksiezopolski, Bogdan, Zurek, Tomasz, Mokkas, Michail
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Hindawi Publishing Corporation 2014
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4127209/
https://www.ncbi.nlm.nih.gov/pubmed/25136683
http://dx.doi.org/10.1155/2014/725279
_version_ 1782329997467320320
author Ksiezopolski, Bogdan
Zurek, Tomasz
Mokkas, Michail
author_facet Ksiezopolski, Bogdan
Zurek, Tomasz
Mokkas, Michail
author_sort Ksiezopolski, Bogdan
collection PubMed
description Recent research indicates that during the design of teleinformatic system the tradeoff between the systems performance and the system protection should be made. The traditional approach assumes that the best way is to apply the strongest possible security measures. Unfortunately, the overestimation of security measures can lead to the unreasonable increase of system load. This is especially important in multimedia systems where the performance has critical character. In many cases determination of the required level of protection and adjustment of some security measures to these requirements increase system efficiency. Such an approach is achieved by means of the quality of protection models where the security measures are evaluated according to their influence on the system security. In the paper, we propose a model for QoP evaluation of security mechanisms. Owing to this model, one can quantify the influence of particular security mechanisms on ensuring security attributes. The methodology of our model preparation is described and based on it the case study analysis is presented. We support our method by the tool where the models can be defined and QoP evaluation can be performed. Finally, we have modelled TLS cryptographic protocol and presented the QoP security mechanisms evaluation for the selected versions of this protocol.
format Online
Article
Text
id pubmed-4127209
institution National Center for Biotechnology Information
language English
publishDate 2014
publisher Hindawi Publishing Corporation
record_format MEDLINE/PubMed
spelling pubmed-41272092014-08-18 Quality of Protection Evaluation of Security Mechanisms Ksiezopolski, Bogdan Zurek, Tomasz Mokkas, Michail ScientificWorldJournal Research Article Recent research indicates that during the design of teleinformatic system the tradeoff between the systems performance and the system protection should be made. The traditional approach assumes that the best way is to apply the strongest possible security measures. Unfortunately, the overestimation of security measures can lead to the unreasonable increase of system load. This is especially important in multimedia systems where the performance has critical character. In many cases determination of the required level of protection and adjustment of some security measures to these requirements increase system efficiency. Such an approach is achieved by means of the quality of protection models where the security measures are evaluated according to their influence on the system security. In the paper, we propose a model for QoP evaluation of security mechanisms. Owing to this model, one can quantify the influence of particular security mechanisms on ensuring security attributes. The methodology of our model preparation is described and based on it the case study analysis is presented. We support our method by the tool where the models can be defined and QoP evaluation can be performed. Finally, we have modelled TLS cryptographic protocol and presented the QoP security mechanisms evaluation for the selected versions of this protocol. Hindawi Publishing Corporation 2014 2014-07-17 /pmc/articles/PMC4127209/ /pubmed/25136683 http://dx.doi.org/10.1155/2014/725279 Text en Copyright © 2014 Bogdan Ksiezopolski et al. https://creativecommons.org/licenses/by/3.0/ This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
spellingShingle Research Article
Ksiezopolski, Bogdan
Zurek, Tomasz
Mokkas, Michail
Quality of Protection Evaluation of Security Mechanisms
title Quality of Protection Evaluation of Security Mechanisms
title_full Quality of Protection Evaluation of Security Mechanisms
title_fullStr Quality of Protection Evaluation of Security Mechanisms
title_full_unstemmed Quality of Protection Evaluation of Security Mechanisms
title_short Quality of Protection Evaluation of Security Mechanisms
title_sort quality of protection evaluation of security mechanisms
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4127209/
https://www.ncbi.nlm.nih.gov/pubmed/25136683
http://dx.doi.org/10.1155/2014/725279
work_keys_str_mv AT ksiezopolskibogdan qualityofprotectionevaluationofsecuritymechanisms
AT zurektomasz qualityofprotectionevaluationofsecuritymechanisms
AT mokkasmichail qualityofprotectionevaluationofsecuritymechanisms