2002
DOI: 10.1145/581271.581275
|View full text |Cite
|
Sign up to set email alerts
|

A methodology for analyzing the performance of authentication protocols

Abstract: Performance, in terms of user response time and the consumption of processing and communications resources, is an important factor to be considered when designing authentication protocols. The mix of public key and secret key encryption algorithms typically included in these protocols makes it difficult to model performance using conventional analytical methods. In this article, we develop a validated modeling methodology to be used for analyzing authentication protocol features, and we use two examples to ill… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2008
2008
2010
2010

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 20 publications
(6 citation statements)
references
References 19 publications
0
6
0
Order By: Relevance
“…Harbitter and Menascé [4] have drawn attention to the performance evaluation of the Kerberos Security Protocol in two different achievements.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Harbitter and Menascé [4] have drawn attention to the performance evaluation of the Kerberos Security Protocol in two different achievements.…”
Section: Related Workmentioning
confidence: 99%
“…There are efforts to enhance the security capability of the Kerberos authentication mechanism.. These efforts are of two categories; public key assistance and the addition of a proxy server [4].…”
mentioning
confidence: 99%
“…This section has the aim to underline the advantages that software engineers can have by using our library as a support for their decisions related to the performance vs security trade-off. From a general viewpoint, our experiment follows standard practices to conduct a performance modelling analysis: construct the model, validate the model, vary modelling parameters, and analyze the results [7].…”
Section: Experimentationmentioning
confidence: 99%
“…Apostolopoulos et al [28] studied the cost of the TLS protocol. In [29], Harbitter and Menasce propose a methodology for analyzing the performance of authentication protocols, using Kerberos [30] as a case study. Additional work on performance measures of security can be found in [31], [32].…”
Section: Introductionmentioning
confidence: 99%