The impact of security layering on end-to-end latency and system performance in switched and distributed e-business environments

被引:2
作者
Iheagwara, C
Blyth, A
机构
[1] Silver Spring, MD 20910, 8715 First Avenue
来源
COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING | 2002年 / 39卷 / 06期
关键词
network security; latency; authentication; retrieval;
D O I
10.1016/S1389-1286(02)00250-5
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Contemporary e-business networks are increasingly implementing the multi-layer security scheme in order to provide a reasonable measure of security for their information systems. The implementation entails formation of a layered architecture (concentric security layers) using packet and application-level filters neither of which provides complimentary functions. The layered architecture provides convenient abstractions and increases the end-to-end latency that results into sub-optimal system performance. In this paper, we present the results of the experiment to quantify the latency introduced by security layering on end-to-end latency and investigate the resulting degree of sub-optimality of system performance in a distributed and switched e-business network. (C) 2002 Published by Elsevier Science B.V.
引用
收藏
页码:827 / 840
页数:14
相关论文
共 27 条
[1]  
ABRAMS M, 1996, P ACM SIGCOMMM 96 C
[2]  
ALMEIDA J, 1997, MEASURING PROXY PERF
[3]  
[Anonymous], P USENIX S INT TECHN
[4]  
[Anonymous], P 4 INT WORLD WID WE
[5]  
ARLITT MF, 1996, P SIGMETRICS PHIL PA
[6]  
BESTAVROS A, 1995, P 2 INT WORKSH SERV
[7]  
BOWMAN CM, 1994, P 2 WORLD WID WEB C
[8]  
BURKOWSKI FJ, 1990, P INT S DAT PAR DIST
[9]  
COUVREUR TR, 1994, J AM SOC INFORM SCI, V45, P443, DOI 10.1002/(SICI)1097-4571(199408)45:7<443::AID-ASI1>3.0.CO
[10]  
2-O