David P. Anderson and Domenico Ferrari and P. Venkat Rangan and B. Sartirana

EECS Department, University of California, Berkeley

Technical Report No. UCB/CSD-87-350

, 1987

http://www2.eecs.berkeley.edu/Pubs/TechRpts/1987/CSD-87-350.pdf

Performance considerations played an important role in the design of the Authenticated Datagram Protocol (ADP), a subtransport-level host-to-host datagram protocol that contains cryptographic mechanisms for end-to-end authentication and, optionally, privacy of messages. Several performance-motivated features were introduced into ADP. This paper describes the first phase of a measurement-based study of ADP intended to determine the actual effects of each of those features on the protocol's performance. The experiments were trace-driven, and took place between two workstations in a laboratory setting. The results in every case demonstrated the usefulness of the features in question, but not always for the reasons that motivated their introduction into the design.


BibTeX citation:

@techreport{Anderson:CSD-87-350,
    Author= {Anderson, David P. and Ferrari, Domenico and Rangan, P. Venkat and Sartirana, B.},
    Title= {The Empirical Evaluation of a Security-Oriented Datagram Protocol},
    Year= {1987},
    Month= {Apr},
    Url= {http://www2.eecs.berkeley.edu/Pubs/TechRpts/1987/5205.html},
    Number= {UCB/CSD-87-350},
    Abstract= {Performance considerations played an important role in the design of the Authenticated Datagram Protocol (ADP), a subtransport-level host-to-host datagram protocol that contains cryptographic mechanisms for end-to-end authentication and, optionally, privacy of messages. Several performance-motivated features were introduced into ADP. This paper describes the first phase of a measurement-based study of ADP intended to determine the actual effects of each of those features on the protocol's performance. The experiments were trace-driven, and took place between two workstations in a laboratory setting. The results in every case demonstrated the usefulness of the features in question, but not always for the reasons that motivated their introduction into the design.},
}

EndNote citation:

%0 Report
%A Anderson, David P. 
%A Ferrari, Domenico 
%A Rangan, P. Venkat 
%A Sartirana, B. 
%T The Empirical Evaluation of a Security-Oriented Datagram Protocol
%I EECS Department, University of California, Berkeley
%D 1987
%@ UCB/CSD-87-350
%U http://www2.eecs.berkeley.edu/Pubs/TechRpts/1987/5205.html
%F Anderson:CSD-87-350