The Empirical Evaluation of a Security-Oriented Datagram Protocol
David P. Anderson and Domenico Ferrari and P. Venkat Rangan and B. Sartirana
EECS Department, University of California, Berkeley
Technical Report No. UCB/CSD-87-350
, 1987
http://www2.eecs.berkeley.edu/Pubs/TechRpts/1987/CSD-87-350.pdf
Performance considerations played an important role in the design of the Authenticated Datagram Protocol (ADP), a subtransport-level host-to-host datagram protocol that contains cryptographic mechanisms for end-to-end authentication and, optionally, privacy of messages. Several performance-motivated features were introduced into ADP. This paper describes the first phase of a measurement-based study of ADP intended to determine the actual effects of each of those features on the protocol's performance. The experiments were trace-driven, and took place between two workstations in a laboratory setting. The results in every case demonstrated the usefulness of the features in question, but not always for the reasons that motivated their introduction into the design.
BibTeX citation:
@techreport{Anderson:CSD-87-350, Author= {Anderson, David P. and Ferrari, Domenico and Rangan, P. Venkat and Sartirana, B.}, Title= {The Empirical Evaluation of a Security-Oriented Datagram Protocol}, Year= {1987}, Month= {Apr}, Url= {http://www2.eecs.berkeley.edu/Pubs/TechRpts/1987/5205.html}, Number= {UCB/CSD-87-350}, Abstract= {Performance considerations played an important role in the design of the Authenticated Datagram Protocol (ADP), a subtransport-level host-to-host datagram protocol that contains cryptographic mechanisms for end-to-end authentication and, optionally, privacy of messages. Several performance-motivated features were introduced into ADP. This paper describes the first phase of a measurement-based study of ADP intended to determine the actual effects of each of those features on the protocol's performance. The experiments were trace-driven, and took place between two workstations in a laboratory setting. The results in every case demonstrated the usefulness of the features in question, but not always for the reasons that motivated their introduction into the design.}, }
EndNote citation:
%0 Report %A Anderson, David P. %A Ferrari, Domenico %A Rangan, P. Venkat %A Sartirana, B. %T The Empirical Evaluation of a Security-Oriented Datagram Protocol %I EECS Department, University of California, Berkeley %D 1987 %@ UCB/CSD-87-350 %U http://www2.eecs.berkeley.edu/Pubs/TechRpts/1987/5205.html %F Anderson:CSD-87-350