Quality of protection evaluation of security mechanisms

B Ksiezopolski, T Zurek… - The Scientific World …, 2014 - Wiley Online Library
Recent research indicates that during the design of teleinformatic system the tradeoff
between the systems performance and the system protection should be made. The …

On the efficiency modelling of cryptographic protocols by means of the Quality of Protection Modelling Language (QoP-ML)

B Ksiezopolski, D Rusinek, A Wierzbicki - Information and Communication …, 2013 - Springer
The problem of efficiency in the IT systems is now widely discussed. One of the factors
affecting the performance of IT systems is implementation and maintaining a high level of …

On the modelling of Kerberos protocol in the Quality of Protection Modelling Language (QoP-ML)

B Księżopolski, D Rusinek… - … Universitatis Mariae Curie …, 2012 - journals.umcs.pl
The security modelling of IT systems is a very complicated task. One of the issues which
must be analysed is the performance of IT systems. In many cases the guaranteed security …

Modeling of security and risk assessment in information and communication system

BY Korniyenko, LP Galata, OW Kozuberda - Sciences of Europe, 2016 - cyberleninka.ru
Important issues as security of information systems and risk assessment are discussed in
this article. Information processing technology are being continuously improving, and with …

Adaptive approach to network security

B Ksiezopolski, Z Kotulski, P Szalachowski - Computer Networks: 16th …, 2009 - Springer
The security of information exchange between the parts in the teleinformatic infrastructure is
one of the crucial topics. During the protecting the infrastructure of the organization, one can …

AQoPA: Automated Quality of Protection Analysis framework for complex systems

D Rusinek, B Ksiezopolski, A Wierzbicki - Computer Information Systems …, 2015 - Springer
Abstract Analysis of security economics for the IT systems is one of the important issues to
be solved. The quality of protection (QoP) of IT System can be achieved on different levels …

Optimization of tls security protocol using the adaptable security model

P Szalachowski, B Ksiezopolski… - Annales Universitatis …, 2009 - search.proquest.com
Security protocols used in todays communication are complex and it is very dicult to analyze
and optimize them. Literature reports some results which optimize security protocols. In the …

[PDF][PDF] The Model for Calculating the Quantitative Criteria for Assessing the Security Level of Information and Telecommunication Systems.

S Gnatyuk, O Yudin, V Sydorenko, T Smirnova… - IntelITSIS, 2022 - ceur-ws.org
The subject of the article is methods and models for assessing the criticality of industry
information and telecommunication systems (ITS). The purpose of the article is to analyze …

Performance evaluation of security techniques in web services

D Rodrigues, DF Pigatto, JC Estrella… - Proceedings of the 13th …, 2011 - dl.acm.org
This paper proposes an evaluation and comparison of guidelines and techniques that allow
the creation of secure Web services to determine whether the application has the desired …

[PDF][PDF] Method of Forming the Functional Security Profile for the Sectoral Information and Telecommunication Systems.

S Gnatyuk, O Yudin, V Sydorenko, A Polozhentsev… - IT&I Workshops, 2021 - ceur-ws.org
Global trends of increasing and improving the quality of cyberattacks have led to the
actualization of the Information and Telecommunications Systems (ITS) protection, in …