The Community for Technology Leaders
RSS Icon
Issue No.03 - May/June (2003 vol.7)
pp: 84-87
<p>Several protocols and mechanisms aim to enforce the various dimensions of security in applications ranging from email to e-commerce transactions. Adding such mechanisms and proceduresto applications and systems does not come cheaply, however, as they impose security trade-offs in the areas of performance and scalability.</p>
Daniel Menasc?, "Security Performance", IEEE Internet Computing, vol.7, no. 3, pp. 84-87, May/June 2003, doi:10.1109/MIC.2003.1200305
26 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool