This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Security Performance
May/June 2003 (vol. 7 no. 3)
pp. 84-87

Several protocols and mechanisms aim to enforce the various dimensions of security in applications ranging from email to e-commerce transactions. Adding such mechanisms and proceduresto applications and systems does not come cheaply, however, as they impose security trade-offs in the areas of performance and scalability.

Citation:
Daniel Menasc?, "Security Performance," IEEE Internet Computing, vol. 7, no. 3, pp. 84-87, May-June 2003, doi:10.1109/MIC.2003.1200305
Usage of this product signifies your acceptance of the Terms of Use.