{"id":"https://openalex.org/W2293748320","doi":"https://doi.org/10.1109/mic.2003.1200305","title":"Security performance","display_name":"Security performance","publication_year":2003,"publication_date":"2003-05-01","ids":{"openalex":"https://openalex.org/W2293748320","doi":"https://doi.org/10.1109/mic.2003.1200305","mag":"2293748320"},"language":"en","primary_location":{"id":"doi:10.1109/mic.2003.1200305","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mic.2003.1200305","pdf_url":null,"source":{"id":"https://openalex.org/S205899252","display_name":"IEEE Internet Computing","issn_l":"1089-7801","issn":["1089-7801","1941-0131"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5033786275","display_name":"Daniel A. Menasc\u00e9","orcid":"https://orcid.org/0000-0002-4085-6212"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"D.A. Menasce","raw_affiliation_strings":["George Mason University, USA"],"affiliations":[{"raw_affiliation_string":"George Mason University, USA","institution_ids":["https://openalex.org/I162714631"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5033786275"],"corresponding_institution_ids":["https://openalex.org/I162714631"],"apc_list":null,"apc_paid":null,"fwci":8.8974,"has_fulltext":false,"cited_by_count":64,"citation_normalized_percentile":{"value":0.97426263,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"7","issue":"3","first_page":"84","last_page":"87"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.18279999494552612,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.18279999494552612,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7012601494789124},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.385585218667984}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7012601494789124},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.385585218667984}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mic.2003.1200305","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mic.2003.1200305","pdf_url":null,"source":{"id":"https://openalex.org/S205899252","display_name":"IEEE Internet Computing","issn_l":"1089-7801","issn":["1089-7801","1941-0131"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5400000214576721,"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W110458095","https://openalex.org/W1518749691","https://openalex.org/W1688809187","https://openalex.org/W2132317085","https://openalex.org/W4285719527","https://openalex.org/W6604413514"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2478288626","https://openalex.org/W2350741829","https://openalex.org/W2530322880","https://openalex.org/W1596801655"],"abstract_inverted_index":{"Several":[0],"protocols":[1],"and":[2,30,34,44,63,92,100],"mechanisms":[3,29],"aims":[4,101],"to":[5,17,32,102],"enforce":[6],"the":[7,46,80,88,104],"various":[8],"dimensions":[9],"of":[10,49,83,90,106,114],"security":[11,56,74,85,110],"in":[12,87,98],"applications":[13,33],"ranging":[14],"from":[15],"e-mail":[16],"e-commerce":[18],"transactions.":[19],"Most":[20],"use":[21],"encryption":[22],"as":[23],"a":[24,108,118],"basic":[25],"component.":[26],"Adding":[27],"such":[28],"procedures":[31],"systems":[35],"does":[36],"not":[37,71],"come":[38],"cheaply,":[39],"however.":[40],"Security":[41],"is":[42,57,96],"intrusive":[43],"increases":[45],"total":[47],"cost":[48],"computer-system":[50],"ownership.":[51],"He":[52],"also":[53],"indicates":[54],"that":[55,64],"about":[58],"trade-offs,":[59],"rather":[60],"than":[61,75],"absolutes,":[62],"we":[65],"should":[66],"strive":[67],"for":[68,72],"good-enough":[69],"security,":[70],"more":[73],"necessary.":[76],"This":[77],"thought":[78],"underlies":[79],"following":[81],"description":[82],"some":[84],"trade-offs":[86],"areas":[89],"performance":[91],"scalability.":[93],"My":[94],"analysis":[95],"quantitative":[97],"nature":[99],"illustrate":[103],"effect":[105],"using":[107],"specific":[109],"protocol":[111],"or":[112],"set":[113],"cryptographic":[115],"algorithms":[116],"on":[117],"computer":[119],"system's":[120],"performance.":[121]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":4},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":5}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
