By Topic

Dynamic authentication for high-performance networked applications

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Schneck, P.A. ; Coll. of Comput., Georgia Inst. of Technol., Atlanta, GA, USA ; Schwan, K.

Focuses on the integrity and protection of information exchanged in high-performance networked computing applications. For these applications, security procedures are often omitted in the interest of performance. Since this may not be acceptable when using public communications media, our research makes explicit and then utilizes the inherent tradeoffs in realizing performance vs. security in communications. Toward this end, we expand the notion of QoS to include the level of security that can be offered within performance and CPU resource availability constraints. To address performance and security tradeoffs in asymmetric and dynamic client-server environments, we developed Authenticast, a dynamically configurable user-level communication protocol offering variable levels of security throughout the execution. Authenticast comprises multiple heuristics to realize dynamic security levels and to decide when and how to apply dynamic security. To demonstrate this protocol, we have implemented a prototype of a high-performance privacy system. This prototype offers a novel security control abstraction with which tradeoffs in security vs. performance may be made explicit and then utilized with dynamic client-server asymmetries. Authenticast uses the “security thermostat” to enable adaptive security processing. The results demonstrate increased scalability and improved performance when adaptive security is applied to the client-server platform with varying numbers of clients and varying resource availabilities at clients

Published in:

Quality of Service, 1998. (IWQoS 98) 1998 Sixth International Workshop on

Date of Conference:

18-20 May 1998