Issue No. 03 - May/June (2003 vol. 7)
<p>Several protocols and mechanisms aim to enforce the various dimensions of security in applications ranging from email to e-commerce transactions. Adding such mechanisms and proceduresto applications and systems does not come cheaply, however, as they impose security trade-offs in the areas of performance and scalability.</p>
D. Menasc?, "Security Performance," in IEEE Internet Computing, vol. 7, no. , pp. 84-87, 2003.