DocumentCode :
3431590
Title :
Dynamic authentication for high-performance networked applications
Author :
Schneck, Phyllis A. ; Schwan, Karsten
Author_Institution :
Coll. of Comput., Georgia Inst. of Technol., Atlanta, GA, USA
fYear :
1998
fDate :
18-20 May 1998
Firstpage :
127
Lastpage :
136
Abstract :
Focuses on the integrity and protection of information exchanged in high-performance networked computing applications. For these applications, security procedures are often omitted in the interest of performance. Since this may not be acceptable when using public communications media, our research makes explicit and then utilizes the inherent tradeoffs in realizing performance vs. security in communications. Toward this end, we expand the notion of QoS to include the level of security that can be offered within performance and CPU resource availability constraints. To address performance and security tradeoffs in asymmetric and dynamic client-server environments, we developed Authenticast, a dynamically configurable user-level communication protocol offering variable levels of security throughout the execution. Authenticast comprises multiple heuristics to realize dynamic security levels and to decide when and how to apply dynamic security. To demonstrate this protocol, we have implemented a prototype of a high-performance privacy system. This prototype offers a novel security control abstraction with which tradeoffs in security vs. performance may be made explicit and then utilized with dynamic client-server asymmetries. Authenticast uses the “security thermostat” to enable adaptive security processing. The results demonstrate increased scalability and improved performance when adaptive security is applied to the client-server platform with varying numbers of clients and varying resource availabilities at clients
Keywords :
client-server systems; computer network management; data privacy; electronic data interchange; message authentication; performance evaluation; telecommunication services; Authenticast; CPU resource availability constraints; adaptive security processing; asymmetric dynamic client-server environments; dynamic authentication; dynamic security levels; dynamically configurable user-level communication protocol; high-performance networked computing applications; high-performance privacy system; information exchange; information integrity; information protection; multiple heuristics; public communications media; resource availability; scalability; security control abstraction; security procedures; security thermostat; service quality; tradeoffs; Authentication; Availability; Communication system security; Computer applications; Computer networks; Information security; Privacy; Protection; Protocols; Prototypes;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Quality of Service, 1998. (IWQoS 98) 1998 Sixth International Workshop on
Conference_Location :
Napa, CA
Print_ISBN :
0-7803-4482-0
Type :
conf
DOI :
10.1109/IWQOS.1998.675229
Filename :
675229
Link To Document :
بازگشت