The Community for Technology Leaders
Green Image
Issue No. 03 - May/June (2003 vol. 7)
ISSN: 1089-7801
pp: 84-87
<p>Several protocols and mechanisms aim to enforce the various dimensions of security in applications ranging from email to e-commerce transactions. Adding such mechanisms and proceduresto applications and systems does not come cheaply, however, as they impose security trade-offs in the areas of performance and scalability.</p>
Daniel Menasc?, "Security Performance", IEEE Internet Computing, vol. 7, no. , pp. 84-87, May/June 2003, doi:10.1109/MIC.2003.1200305
88 ms
(Ver 3.3 (11022016))