Please use this identifier to cite or link to this item: http://theses.ncl.ac.uk/jspui/handle/10443/1311
Full metadata record
DC FieldValueLanguage
dc.contributor.authorZhao, Yishi-
dc.date.accessioned2012-07-02T11:06:10Z-
dc.date.available2012-07-02T11:06:10Z-
dc.date.issued2011-
dc.identifier.urihttp://hdl.handle.net/10443/1311-
dc.descriptionPhD Thesisen_US
dc.description.abstractTrade-off between security and performance has become an intriguing area in recent years in both the security and performance communities. As the security aspects of security protocol research is fully- edged, this thesis is therefore devoted to conducting a performance study of these protocols. The long term objective is to translate formal de nitions of security protocols to formal performance models automatically, then analysing by relevant techniques. In this thesis, we take a preliminary step by studying five typical security protocols, and exploring the methodology of construction and analysis of their models by using the Markovian process algebra PEPA. Through these case studies, an initial framework of performance analysis of security protocol is established. Firstly, a key distribution centre is investigated. The basic model su ers from the commonly encountered state space explosion problem, and so we apply some efficient solution techniques, which include model reduction techniques and ordinary di fferential equation based fluid flow analysis. Finally, we evaluate a utility function for this secure key exchange model. Then, we explore two non-repudiation protocols. Mean value analysis has been applied here for a class of PEPA models, and it is compared with an ODE approximation. After that, an optimistic nonrepudiation protocol with off-line third trust party is studied. The PEPA model has been formulated using a concept of multi-threaded servers with functional rates. The nal case study is a cross-realm Kerberos protocol. A simplified technique of aggregation with an ODE approximation is performed to do efficient cient analysis. All these modelling and analysis methods are illustrated through numerical examples.en_US
dc.language.isoenen_US
dc.publisherNewcastle Universityen_US
dc.titlePractical applications of performance modelling of security protocols using PEPAen_US
dc.typeThesisen_US
Appears in Collections:School of Computing Science

Files in This Item:
File Description SizeFormat 
Yishi Zhao11.pdfThesis2.19 MBAdobe PDFView/Open
dspacelicence.pdfLicence43.82 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.