{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T16:10:56Z","timestamp":1775837456584,"version":"3.50.1"},"reference-count":72,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2006,2,1]],"date-time":"2006-02-01T00:00:00Z","timestamp":1138752000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Comput. Syst."],"published-print":{"date-parts":[[2006,2]]},"abstract":"<jats:p>TLS is the protocol of choice for securing today's e-commerce and online transactions but adding TLS to a Web server imposes a significant overhead relative to an insecure Web server on the same platform. We perform a comprehensive study of the performance costs of TLS. Our methodology is to profile TLS Web servers with trace-driven workloads, replace individual components inside TLS with no-ops, and measure the observed increase in server throughput. We estimate the relative costs of each TLS processing stage, identifying the areas for which future optimizations would be worthwhile. Our results show that while the RSA operations represent the largest performance cost in TLS Web servers, they do not solely account for TLS overhead. RSA accelerators are effective for e-commerce site workloads since they experience low TLS session reuse. Accelerators appear to be less effective for sites where all the requests are handled by a TLS server because they have a higher session reuse rate. In this case, investing in a faster CPU might provide a greater boost in performance. Our experiments show that having a second CPU is at least as useful as an RSA accelerator. Our results seem to suggest that, as CPUs become faster, the cryptographic costs of TLS will become dwarfed by the CPU costs of the nonsecurity aspects of a Web server. Optimizations aimed at general purpose Web servers should continue to be a focus of research and would benefit secure Web servers as well.<\/jats:p>","DOI":"10.1145\/1124153.1124155","type":"journal-article","created":{"date-parts":[[2006,5,8]],"date-time":"2006-05-08T16:09:20Z","timestamp":1147104560000},"page":"39-69","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":72,"title":["Performance analysis of TLS Web servers"],"prefix":"10.1145","volume":"24","author":[{"given":"Cristian","family":"Coarfa","sequence":"first","affiliation":[{"name":"Rice University, Houston, TX"}]},{"given":"Peter","family":"Druschel","sequence":"additional","affiliation":[{"name":"Rice University, Houston, TX"}]},{"given":"Dan S.","family":"Wallach","sequence":"additional","affiliation":[{"name":"Rice University, Houston, TX"}]}],"member":"320","published-online":{"date-parts":[[2006,2]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Alteon. 2002. Alteon web switching Portfolio. http:\/\/www.nortelnetworks.com\/products\/01\/alteon\/alt180\/.]]  Alteon. 2002. Alteon web switching Portfolio. http:\/\/www.nortelnetworks.com\/products\/01\/alteon\/alt180\/.]]"},{"key":"e_1_2_1_2_1","unstructured":"Amazon.com. 2001. Amazon.Com releases 2001 first quarter results. Press Release. http:\/\/www.sec.gov\/Archives\/edgar\/data\/1018724\/000095010901500823\/dex991.htm.]]  Amazon.com. 2001. Amazon.Com releases 2001 first quarter results. Press Release. http:\/\/www.sec.gov\/Archives\/edgar\/data\/1018724\/000095010901500823\/dex991.htm.]]"},{"key":"e_1_2_1_3_1","volume-title":"Proceedings of the 15th ACM Symposium on Operating System Principles","author":"Anderson E. W.","unstructured":"Anderson , E. W. and Pasquale , J . 1995. The performance of the container shipping I\/O system . In Proceedings of the 15th ACM Symposium on Operating System Principles . Copper Mountain, CO, ACM, 229.]] 10.1145\/224056.225831 Anderson, E. W. and Pasquale, J. 1995. The performance of the container shipping I\/O system. In Proceedings of the 15th ACM Symposium on Operating System Principles. Copper Mountain, CO, ACM, 229.]] 10.1145\/224056.225831"},{"key":"e_1_2_1_4_1","volume-title":"Proceedings of the 18th Conference on Computer Communications","author":"Apostolopoulos G.","unstructured":"Apostolopoulos , G. , Peris , V. , and Saha , D . 1999. Transport layer security, How much does it really cost? In Proceedings of the 18th Conference on Computer Communications . New York, NY.]] Apostolopoulos, G., Peris, V., and Saha, D. 1999. Transport layer security, How much does it really cost? In Proceedings of the 18th Conference on Computer Communications. New York, NY.]]"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1019292504731"},{"key":"e_1_2_1_6_1","volume-title":"Proceedings of the Workshop on Internet Server Performance. Condensed version appears in ACM SIGMETRICS Performance Evaluation Review 26","author":"Banga G.","unstructured":"Banga , G. , Druschel , P. , and Mogul , J. C . 1998. Better operating system features for faster network servers . In Proceedings of the Workshop on Internet Server Performance. Condensed version appears in ACM SIGMETRICS Performance Evaluation Review 26 , 3, 23--30.]] 10.1145\/306225.306234 Banga, G., Druschel, P., and Mogul, J. C. 1998. Better operating system features for faster network servers. In Proceedings of the Workshop on Internet Server Performance. Condensed version appears in ACM SIGMETRICS Performance Evaluation Review 26, 3, 23--30.]] 10.1145\/306225.306234"},{"key":"e_1_2_1_7_1","volume-title":"Proceedings of the 1998 Usenix Technical Conference.]]","author":"Banga G.","unstructured":"Banga , G. and Mogul , J. C . 1998. Scalable kernel performance for Internet servers under realistic loads . In Proceedings of the 1998 Usenix Technical Conference.]] Banga, G. and Mogul, J. C. 1998. Scalable kernel performance for Internet servers under realistic loads. In Proceedings of the 1998 Usenix Technical Conference.]]"},{"key":"e_1_2_1_8_1","volume-title":"Proceeding of the Usenix 1999 Annual Technical Conference","author":"Banga G.","unstructured":"Banga , G. , Mogul , J. C. , and Druschel , P . 1999. A scalable and explicit event delivery mechanism for UNIX . In Proceeding of the Usenix 1999 Annual Technical Conference . Monterey, CA.]] Banga, G., Mogul, J. C., and Druschel, P. 1999. A scalable and explicit event delivery mechanism for UNIX. In Proceeding of the Usenix 1999 Annual Technical Conference. Monterey, CA.]]"},{"key":"e_1_2_1_9_1","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/49.215015","article-title":"A high-performance network architecture for a pa-risc workstation","volume":"11","author":"Banks D.","year":"1993","unstructured":"Banks , D. and Prudence , M. 1993 . A high-performance network architecture for a pa-risc workstation . IEEE J. Selected Area Comm. 11 , 2 (Feb.), 191--202.]] Banks, D. and Prudence, M. 1993. A high-performance network architecture for a pa-risc workstation. IEEE J. Selected Area Comm. 11, 2 (Feb.), 191--202.]]","journal-title":"IEEE J. Selected Area Comm."},{"key":"e_1_2_1_10_1","volume-title":"Proceedings of the 15th ACM Symposium on Operating System Principles. 40--53","author":"Bas A.","year":"1995","unstructured":"Bas , A. , Buch , V. , Vogels , W. , and von Eicken , T. 1995 . U-Net: A user-level network interface for parallel and distributed computing . In Proceedings of the 15th ACM Symposium on Operating System Principles. 40--53 .]] 10.1145\/224056.224061 Bas, A., Buch, V., Vogels, W., and von Eicken, T. 1995. U-Net: A user-level network interface for parallel and distributed computing. In Proceedings of the 15th ACM Symposium on Operating System Principles. 40--53.]] 10.1145\/224056.224061"},{"key":"e_1_2_1_11_1","volume-title":"Proceedings of the RSA Conference","author":"Boneh D.","unstructured":"Boneh , D. and Shacham , H . 2001. Improving SSL handshake performance via batching . In Proceedings of the RSA Conference . San Francisco, CA.]] Boneh, D. and Shacham, H. 2001. Improving SSL handshake performance via batching. In Proceedings of the RSA Conference. San Francisco, CA.]]"},{"key":"e_1_2_1_12_1","volume-title":"Tech. Rep. CSTR-95-021. University of Bristol.]]","author":"Bradley J.","year":"1995","unstructured":"Bradley , J. and Davies , N . 1995 . Analysis of the SSL protocol. Tech. Rep. CSTR-95-021. University of Bristol.]] Bradley, J. and Davies, N. 1995. Analysis of the SSL protocol. Tech. Rep. CSTR-95-021. University of Bristol.]]"},{"key":"e_1_2_1_13_1","first-page":"2","article-title":"Hardware\/software organization of a high-performance atm host interface","volume":"11","author":"Brendan C.","year":"1993","unstructured":"Brendan , C. , Traw , S. , and Smith , J. M. 1993 . Hardware\/software organization of a high-performance atm host interface . IEEE J. Selected Area Comm. 11 , 2 (Feb.), 240--253.]] Brendan, C., Traw, S., and Smith, J. M. 1993. Hardware\/software organization of a high-performance atm host interface. IEEE J. Selected Area Comm. 11, 2 (Feb.), 240--253.]]","journal-title":"IEEE J. Selected Area Comm."},{"key":"e_1_2_1_14_1","volume-title":"Proceedings of the 6th Network and Distributed Systems Security Symposium","author":"Buhler P.","unstructured":"Buhler , P. , Eirich , T. , Steiner , M. , and Waidner , M . 2000. Secure password-based cipher suite for TLS . In Proceedings of the 6th Network and Distributed Systems Security Symposium . San Diego, CA, 129--142.]] Buhler, P., Eirich, T., Steiner, M., and Waidner, M. 2000. Secure password-based cipher suite for TLS. In Proceedings of the 6th Network and Distributed Systems Security Symposium. San Diego, CA, 129--142.]]"},{"key":"e_1_2_1_15_1","volume-title":"Proceedings of the 1996 Usenix Technical Conference.]]","author":"Chankhunthod A.","unstructured":"Chankhunthod , A. , Danzig , P. B. , Neerdaels , C. , Schwartz , M. F. , and Worrell , K. J . 1996. A hierarchical Internet object cache . In Proceedings of the 1996 Usenix Technical Conference.]] Chankhunthod, A., Danzig, P. B., Neerdaels, C., Schwartz, M. F., and Worrell, K. J. 1996. A hierarchical Internet object cache. In Proceedings of the 1996 Usenix Technical Conference.]]"},{"key":"e_1_2_1_16_1","volume-title":"Proceedings of the 14th ACM Symposium on Operating Systems Principles. 120--133","author":"Chen J. B.","unstructured":"Chen , J. B. and Bershad , B. N . 1993. The impact of operating system structure on memory system performance . In Proceedings of the 14th ACM Symposium on Operating Systems Principles. 120--133 .]] 10.1145\/168619.168629 Chen, J. B. and Bershad, B. N. 1993. The impact of operating system structure on memory system performance. In Proceedings of the 14th ACM Symposium on Operating Systems Principles. 120--133.]] 10.1145\/168619.168629"},{"key":"e_1_2_1_17_1","volume-title":"Proceedings of the 1996 USENIX Technical Conference","author":"Chu J.","year":"1996","unstructured":"Chu , J. 1996 . Zero-copy TCP in Solaris . In Proceedings of the 1996 USENIX Technical Conference . San Diego, CA.]] Chu, J. 1996. Zero-copy TCP in Solaris. In Proceedings of the 1996 USENIX Technical Conference. San Diego, CA.]]"},{"key":"e_1_2_1_18_1","unstructured":"Compaq. 2001. The AXL300 RSA accelerator. http:\/\/www.compaq.com\/products\/servers\/security\/axl300\/.]]  Compaq. 2001. The AXL300 RSA accelerator. http:\/\/www.compaq.com\/products\/servers\/security\/axl300\/.]]"},{"key":"e_1_2_1_19_1","volume-title":"Proceedings of the 7th Network and Distributed System Security Symposium","author":"Dean D.","unstructured":"Dean , D. , Berson , T. , Franklin , M. , Smetters , D. , and Spreitzer , M . 2001. Cryptology as a network service . In Proceedings of the 7th Network and Distributed System Security Symposium . San Diego, CA.]] Dean, D., Berson, T., Franklin, M., Smetters, D., and Spreitzer, M. 2001. Cryptology as a network service. In Proceedings of the 7th Network and Distributed System Security Symposium. San Diego, CA.]]"},{"key":"e_1_2_1_20_1","volume-title":"Proceedings of the 7th Network and Distributed System Security Symposium","author":"Dean D.","unstructured":"Dean , D. and Stubblefield , A . 2001. Using client puzzles to protect TLS . In Proceedings of the 7th Network and Distributed System Security Symposium . San Diego, CA.]] Dean, D. and Stubblefield, A. 2001. Using client puzzles to protect TLS. In Proceedings of the 7th Network and Distributed System Security Symposium. San Diego, CA.]]"},{"key":"e_1_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Dierks T. and Allen C. 1999. The TLS Protocol Version 1.0. Internet Engineering Task Force. RFC-2246 ftp:\/\/ftp.isi.edu\/in-notes\/rfc2246.txt.]]   Dierks T. and Allen C. 1999. The TLS Protocol Version 1.0. Internet Engineering Task Force. RFC-2246 ftp:\/\/ftp.isi.edu\/in-notes\/rfc2246.txt.]]","DOI":"10.17487\/rfc2246"},{"key":"e_1_2_1_22_1","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","article-title":"New directions in cryptography","volume":"22","author":"Diffie W.","year":"1976","unstructured":"Diffie , W. and Hellman , M. E. 1976 . New directions in cryptography . IEEE Trans. Inform. Theory 22 , 6, 644 -- 654 .]] Diffie, W. and Hellman, M. E. 1976. New directions in cryptography. IEEE Trans. Inform. Theory 22, 6, 644--654.]]","journal-title":"IEEE Trans. Inform. Theory"},{"key":"e_1_2_1_24_1","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/65.224051","article-title":"Network subsystem design","volume":"7","author":"Druschel P.","year":"1993","unstructured":"Druschel , P. , Abbott , M. B. , Pagels , M. A. , and Peterson , L. L. 1993 . Network subsystem design . IEEE Network 7 , 4 (July), 8--17.]] Druschel, P., Abbott, M. B., Pagels, M. A., and Peterson, L. L. 1993. Network subsystem design. IEEE Network 7, 4 (July), 8--17.]]","journal-title":"IEEE Network"},{"key":"e_1_2_1_25_1","volume-title":"Proceedings of the SIGCOMM 1994 Conference","author":"Druschel P.","year":"1903","unstructured":"Druschel , P. , Davie , B. S. , and Peterson , L. L . 1994. Experiences with a high-speed network adaptor: A software perspective . In Proceedings of the SIGCOMM 1994 Conference . London, UK, 2--13.]] 10.1145\/ 1903 14.190315 Druschel, P., Davie, B. S., and Peterson, L. L. 1994. Experiences with a high-speed network adaptor: A software perspective. In Proceedings of the SIGCOMM 1994 Conference. London, UK, 2--13.]] 10.1145\/190314.190315"},{"key":"e_1_2_1_26_1","volume-title":"Proceedings of the 14th ACM Symposium on Operating Systems Principles. 189--202","author":"Druschel P.","unstructured":"Druschel , P. and Peterson , L. L . 1993. Fbufs: A high-bandwidth cross-domain transfer facility . In Proceedings of the 14th ACM Symposium on Operating Systems Principles. 189--202 .]] 10.1145\/168619.168634 Druschel, P. and Peterson, L. L. 1993. Fbufs: A high-bandwidth cross-domain transfer facility. In Proceedings of the 14th ACM Symposium on Operating Systems Principles. 189--202.]] 10.1145\/168619.168634"},{"key":"e_1_2_1_27_1","volume-title":"Proceedings of the 12th International Conference on Distributed Computing Systems","author":"Druschel P.","unstructured":"Druschel , P. , Peterson , L. L. , and Hutchinson , N. C . 1992. Beyond micro-kernel design: Decoupling modularity and protection in Lipto . In Proceedings of the 12th International Conference on Distributed Computing Systems . Yokohama, Japan.]] Druschel, P., Peterson, L. L., and Hutchinson, N. C. 1992. Beyond micro-kernel design: Decoupling modularity and protection in Lipto. In Proceedings of the 12th International Conference on Distributed Computing Systems. Yokohama, Japan.]]"},{"key":"e_1_2_1_28_1","volume-title":"Proceedings of the SIGCOMM 1994 Conference","author":"Edwards A.","year":"1903","unstructured":"Edwards , A. , Watson , G. , Lumley , J. , Banks , D. , Calamvokis , C. , and Dalton , C . 1994. User-space protocols deliver high performance to applications on a low-cost Gb\/s LAN . In Proceedings of the SIGCOMM 1994 Conference . London, UK.]] 10.1145\/ 1903 14.190316 Edwards, A., Watson, G., Lumley, J., Banks, D., Calamvokis, C., and Dalton, C. 1994. User-space protocols deliver high performance to applications on a low-cost Gb\/s LAN. In Proceedings of the SIGCOMM 1994 Conference. London, UK.]] 10.1145\/190314.190316"},{"key":"e_1_2_1_29_1","unstructured":"Engelschall R. S. 2000. mm - Shared Memory Library. http:\/\/www.engelschall.com\/sw\/mm\/.]]  Engelschall R. S. 2000. mm - Shared Memory Library. http:\/\/www.engelschall.com\/sw\/mm\/.]]"},{"key":"e_1_2_1_30_1","volume-title":"Proceedings of the 16th ACM Symposium on Operating System Principles","author":"Fox A.","unstructured":"Fox , A. , Gribble , S. D. , Chawathe , Y. , Brewer , E. A. , and Gauthier , P . 1997. Cluster-based scalable network services . In Proceedings of the 16th ACM Symposium on Operating System Principles . San Malo, France.]] 10.1145\/268998.266662 Fox, A., Gribble, S. D., Chawathe, Y., Brewer, E. A., and Gauthier, P. 1997. Cluster-based scalable network services. In Proceedings of the 16th ACM Symposium on Operating System Principles. San Malo, France.]] 10.1145\/268998.266662"},{"key":"e_1_2_1_31_1","unstructured":"Freier A. O. Karlton P. and Kocher P. C. 1996. The SSL Protocol Version 3.0. Netscape. http:\/\/home.netscape.com\/eng\/ssl3\/draft302.txt.]]  Freier A. O. Karlton P. and Kocher P. C. 1996. The SSL Protocol Version 3.0. Netscape. http:\/\/home.netscape.com\/eng\/ssl3\/draft302.txt.]]"},{"key":"e_1_2_1_32_1","volume-title":"Proceedings of the Workshop on Internet Server Performance","author":"Goldberg A.","unstructured":"Goldberg , A. , Buff , R. , and Schmitt , A . 1998. Secure Web server performance dramatically improved by caching SSL session keys . In Proceedings of the Workshop on Internet Server Performance . Madison, WI.]] Goldberg, A., Buff, R., and Schmitt, A. 1998. Secure Web server performance dramatically improved by caching SSL session keys. In Proceedings of the Workshop on Internet Server Performance. Madison, WI.]]"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/322510.322514"},{"key":"e_1_2_1_34_1","volume-title":"Proceedings of the 8th Network and Distributed System Security Symposium","author":"Hess A.","unstructured":"Hess , A. , Jacobson , J. , Mills , H. , Wamsley , R. , Seamons , K. E. , and Smith , B . 2002. Advanced client\/server authentication in TLS . In Proceedings of the 8th Network and Distributed System Security Symposium . San Diego, CA.]] Hess, A., Jacobson, J., Mills, H., Wamsley, R., Seamons, K. E., and Smith, B. 2002. Advanced client\/server authentication in TLS. In Proceedings of the 8th Network and Distributed System Security Symposium. San Diego, CA.]]"},{"key":"e_1_2_1_35_1","volume-title":"Proceedings of the 2nd Global Internet Conference.]]","author":"Hu J. C.","unstructured":"Hu , J. C. , Pyrali , I. , and Schmidt , D. C . 1997. Measuring the impact of event dispatching and concurrency models on Web server performance over high-speed networks . In Proceedings of the 2nd Global Internet Conference.]] Hu, J. C., Pyrali, I., and Schmidt, D. C. 1997. Measuring the impact of event dispatching and concurrency models on Web server performance over high-speed networks. In Proceedings of the 2nd Global Internet Conference.]]"},{"key":"e_1_2_1_36_1","unstructured":"Intel. 2002. Intel(R) AAD8125Y and AAD8120Y e-Commerce Directors. http:\/\/developer.intel.com\/design\/network\/products\/security\/aad812x.htm.]]  Intel. 2002. Intel(R) AAD8125Y and AAD8120Y e-Commerce Directors. http:\/\/developer.intel.com\/design\/network\/products\/security\/aad812x.htm.]]"},{"key":"e_1_2_1_37_1","volume-title":"Proceedings of the 10th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-X)","author":"Kim H.","unstructured":"Kim , H. , Pai , V. S. , and Rixner , S . 2002. Increasing Web server throughput with network interface data caching . In Proceedings of the 10th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-X) . San Jose, CA.]] 10.1145\/605397.605423 Kim, H., Pai, V. S., and Rixner, S. 2002. Increasing Web server throughput with network interface data caching. In Proceedings of the 10th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-X). San Jose, CA.]] 10.1145\/605397.605423"},{"key":"e_1_2_1_38_1","volume-title":"Apache: The Definitive Guide","author":"Laurie B.","year":"1999","unstructured":"Laurie , B. and Laurie , P . 1999 . Apache: The Definitive Guide , 2 nd Ed. O'Reilly , Cambridge, MA .]] Laurie, B. and Laurie, P. 1999. Apache: The Definitive Guide, 2nd Ed. O'Reilly, Cambridge, MA.]]","edition":"2"},{"key":"e_1_2_1_39_1","volume-title":"Proceedings of the ACM SIGMETRICS '1997 Conference","author":"Maltzahn C.","unstructured":"Maltzahn , C. , Richardson , K. J. , and Grunwald , D . 1997. Performance issues of enterprise level Web proxies . In Proceedings of the ACM SIGMETRICS '1997 Conference . Seattle, WA.]] 10.1145\/258612.258668 Maltzahn, C., Richardson, K. J., and Grunwald, D. 1997. Performance issues of enterprise level Web proxies. In Proceedings of the ACM SIGMETRICS '1997 Conference. Seattle, WA.]] 10.1145\/258612.258668"},{"key":"e_1_2_1_40_1","unstructured":"McGrath R. E. 1995. Performance of several HTTP demons on an HP 735 workstation. http:\/\/www.ncsa.uiuc.edu\/InformationServers\/Performance\/V1.4\/report.html.]]  McGrath R. E. 1995. Performance of several HTTP demons on an HP 735 workstation. http:\/\/www.ncsa.uiuc.edu\/InformationServers\/Performance\/V1.4\/report.html.]]"},{"key":"e_1_2_1_41_1","volume-title":"Proceedings of the SIGCOMM 1992 Conference","author":"McKenney P.","unstructured":"McKenney , P. and Dove , K . 1992. Efficient demultiplexing of incoming TCP packets . In Proceedings of the SIGCOMM 1992 Conference . Baltimore, MD, 269--279.]] 10.1145\/144179.144299 McKenney, P. and Dove, K. 1992. Efficient demultiplexing of incoming TCP packets. In Proceedings of the SIGCOMM 1992 Conference. Baltimore, MD, 269--279.]] 10.1145\/144179.144299"},{"key":"e_1_2_1_42_1","volume-title":"Proceedings of the 2002 USENIX Technical Conference","author":"Miltchev S.","unstructured":"Miltchev , S. and Ioannidis , S . 2002. A study of the relative costs of network security protocols . In Proceedings of the 2002 USENIX Technical Conference . Monterey, CA.]] Miltchev, S. and Ioannidis, S. 2002. A study of the relative costs of network security protocols. In Proceedings of the 2002 USENIX Technical Conference. Monterey, CA.]]"},{"key":"e_1_2_1_43_1","volume-title":"Proceedings of the Computer Aided Verification. 71--76","author":"Mitchell J. C.","year":"1998","unstructured":"Mitchell , J. C. 1998 . Finite-state analysis of security protocols . In Proceedings of the Computer Aided Verification. 71--76 .]] Mitchell, J. C. 1998. Finite-state analysis of security protocols. In Proceedings of the Computer Aided Verification. 71--76.]]"},{"key":"e_1_2_1_45_1","volume-title":"Scout: A communications-oriented operating system. Tech. Rep. TR 94-20, Department of Computer Science","author":"Montz A. B.","year":"1994","unstructured":"Montz , A. B. , Mosberger , D. , O'Malley , S. W. , Peterson , L. L. , and Proebsting , T. A . 1994 . Scout: A communications-oriented operating system. Tech. Rep. TR 94-20, Department of Computer Science , University of Arizona .]] Montz, A. B., Mosberger, D., O'Malley, S. W., Peterson, L. L., and Proebsting, T. A. 1994. Scout: A communications-oriented operating system. Tech. Rep. TR 94-20, Department of Computer Science, University of Arizona.]]"},{"key":"e_1_2_1_46_1","volume-title":"Proceedings of the SIGCOMM '1996 Conference","author":"Mosberger D.","year":"1996","unstructured":"Mosberger , D. , Peterson , L. , Bridges , P. , and O'Malley , S. 1996 . Analysis of techniques to improve protocol latency . In Proceedings of the SIGCOMM '1996 Conference . Palo Alto, CA.]] 10.1145\/248156.248164 Mosberger, D., Peterson, L., Bridges, P., and O'Malley, S. 1996. Analysis of techniques to improve protocol latency. In Proceedings of the SIGCOMM '1996 Conference. Palo Alto, CA.]] 10.1145\/248156.248164"},{"key":"e_1_2_1_47_1","volume-title":"Proceedings of the 17th Annual Computer Security Applications Conference","author":"Mraz R.","year":"2001","unstructured":"Mraz , R. 2001 . Secure Blue: An architecture for a high volume SSL Internet server . In Proceedings of the 17th Annual Computer Security Applications Conference . New Orleans, LA.]] Mraz, R. 2001. Secure Blue: An architecture for a high volume SSL Internet server. In Proceedings of the 17th Annual Computer Security Applications Conference. New Orleans, LA.]]"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.986497"},{"key":"e_1_2_1_49_1","volume-title":"Proceedings of the ACM SIGMETRICS Conference on Measurement and Modeling of Computer Systems","author":"Nahum E. M.","unstructured":"Nahum , E. M. , Rosu , M. , Seshan , S. , and Almeida , J . 2001. The effects of wide-area conditions on WWW server performance . In Proceedings of the ACM SIGMETRICS Conference on Measurement and Modeling of Computer Systems . Cambridge, MA.]] 10.1145\/378420.378790 Nahum, E. M., Rosu, M., Seshan, S., and Almeida, J. 2001. The effects of wide-area conditions on WWW server performance. In Proceedings of the ACM SIGMETRICS Conference on Measurement and Modeling of Computer Systems. Cambridge, MA.]] 10.1145\/378420.378790"},{"key":"e_1_2_1_50_1","unstructured":"NetCraft. 2001. The Netcraft Secure Server Survey. http:\/\/www.netcraft.com\/ssl\/.]]  NetCraft. 2001. The Netcraft Secure Server Survey. http:\/\/www.netcraft.com\/ssl\/.]]"},{"key":"e_1_2_1_51_1","unstructured":"Network Appliance Inc. 2002. Netcache. http:\/www.netapp.com\/products\/netcache.]]  Network Appliance Inc. 2002. Netcache. http:\/www.netapp.com\/products\/netcache.]]"},{"key":"e_1_2_1_52_1","volume-title":"Proceedings of the 8th Conference on Architectural Support for Programming Languages and Operating Systems. ACM","author":"Pai V. S.","unstructured":"Pai , V. S. , Aron , M. , Banga , G. , Svendsen , M. , Druschel , P. , Zwaenepoel , W. , and Nahum , E . 1998. Locality-aware request distribution in cluster-based network servers . In Proceedings of the 8th Conference on Architectural Support for Programming Languages and Operating Systems. ACM , San Jose, CA.]] 10.1145\/291069.291048 Pai, V. S., Aron, M., Banga, G., Svendsen, M., Druschel, P., Zwaenepoel, W., and Nahum, E. 1998. Locality-aware request distribution in cluster-based network servers. In Proceedings of the 8th Conference on Architectural Support for Programming Languages and Operating Systems. ACM, San Jose, CA.]] 10.1145\/291069.291048"},{"key":"e_1_2_1_53_1","volume-title":"Proceeding of the Usenix 1999 Annual Technical Conference","author":"Pai V. S.","unstructured":"Pai , V. S. , Druschel , P. , and Zwaenepoel , W . 1999a. Flash: An efficient and portable Web server . In Proceeding of the Usenix 1999 Annual Technical Conference . Monterey, CA, 199--212.]] Pai, V. S., Druschel, P., and Zwaenepoel, W. 1999a. Flash: An efficient and portable Web server. In Proceeding of the Usenix 1999 Annual Technical Conference. Monterey, CA, 199--212.]]"},{"key":"e_1_2_1_54_1","volume-title":"Proceedings of the 3rd USENIX Symposium on Operating Systems Design and Implementation","author":"Pai V. S.","unstructured":"Pai , V. S. , Druschel , P. , and Zwaenepoel , W . 1999b. I\/O-Lite: A unified I\/O buffering and caching system . In Proceedings of the 3rd USENIX Symposium on Operating Systems Design and Implementation . New Orleans, LA.]] Pai, V. S., Druschel, P., and Zwaenepoel, W. 1999b. I\/O-Lite: A unified I\/O buffering and caching system. In Proceedings of the 3rd USENIX Symposium on Operating Systems Design and Implementation. New Orleans, LA.]]"},{"key":"e_1_2_1_55_1","volume-title":"Proceedings of the 3rd Workshop on Computer Architecture Education.]]","author":"Pai V. S.","unstructured":"Pai , V. S. , Ranganathan , P. , and Adve , S. V . 1997. RSIM: An execution-driven simulator for ILP-based shared-memory multiprocessors and uniprocessors . In Proceedings of the 3rd Workshop on Computer Architecture Education.]] Pai, V. S., Ranganathan, P., and Adve, S. V. 1997. RSIM: An execution-driven simulator for ILP-based shared-memory multiprocessors and uniprocessors. In Proceedings of the 3rd Workshop on Computer Architecture Education.]]"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/322510.322530"},{"key":"e_1_2_1_57_1","unstructured":"Poskanser J. 2002. thhtpd. http:\/www.acme.com\/software\/thttpd\/.]]  Poskanser J. 2002. thhtpd. http:\/www.acme.com\/software\/thttpd\/.]]"},{"key":"e_1_2_1_58_1","doi-asserted-by":"crossref","unstructured":"Rescorla E. 1999. Diffie-Hellman Key Agreement Method. Internet Engineering Task Force. RFC-2631 http:\/\/www.ietf.org\/rfc\/rfc2631.txt.]]   Rescorla E. 1999. Diffie-Hellman Key Agreement Method. Internet Engineering Task Force. RFC-2631 http:\/\/www.ietf.org\/rfc\/rfc2631.txt.]]","DOI":"10.17487\/rfc2631"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/244804.244807"},{"key":"e_1_2_1_61_1","unstructured":"Schechte S. E. and Sutaria J. 1997. A study of the effects of context switching and caching on HTTP server performance. http:\/www.eecs.harvard.edu\/stuart\/Tarantula\/FirstPaper.html.]]  Schechte S. E. and Sutaria J. 1997. A study of the effects of context switching and caching on HTTP server performance. http:\/www.eecs.harvard.edu\/stuart\/Tarantula\/FirstPaper.html.]]"},{"key":"e_1_2_1_62_1","volume-title":"Applied Cryptography","author":"Schneier B.","unstructured":"Schneier , B. 1996. Applied Cryptography , 2 nd Ed. John Wiley and Sons , New York, NY .]] Schneier, B. 1996. Applied Cryptography, 2nd Ed. John Wiley and Sons, New York, NY.]]","edition":"2"},{"key":"e_1_2_1_63_1","volume-title":"Proceedings of the 8th Network and Distributed System Security Symposium","author":"Shacham H.","unstructured":"Shacham , H. and Boneh , D . 2002. Fast-track session establishment for TLS . In Proceedings of the 8th Network and Distributed System Security Symposium . San Diego, CA.]] Shacham, H. and Boneh, D. 2002. Fast-track session establishment for TLS. In Proceedings of the 8th Network and Distributed System Security Symposium. San Diego, CA.]]"},{"key":"e_1_2_1_64_1","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/65.224055","article-title":"Giving applications access to Gb\/s networking","volume":"7","author":"Smith J. M.","year":"1993","unstructured":"Smith , J. M. and Traw , C. B. S. 1993 . Giving applications access to Gb\/s networking . IEEE Network 7 , 4 (July), 44--52.]] Smith, J. M. and Traw, C. B. S. 1993. Giving applications access to Gb\/s networking. IEEE Network 7, 4 (July), 44--52.]]","journal-title":"IEEE Network"},{"key":"e_1_2_1_65_1","unstructured":"Standard Performance Evaluation Corporation. 1999. SPECWeb99. http:\/\/www.specbench.org\/osg\/Web99\/.]]  Standard Performance Evaluation Corporation. 1999. SPECWeb99. http:\/\/www.specbench.org\/osg\/Web99\/.]]"},{"key":"e_1_2_1_66_1","unstructured":"Standard Performance Evaluation Corporation. 2002. SPECWeb99&lowbar;SSL. http:\/\/www.specbench.org\/osg\/Web99ssl\/.]]  Standard Performance Evaluation Corporation. 2002. SPECWeb99&lowbar;SSL. http:\/\/www.specbench.org\/osg\/Web99ssl\/.]]"},{"key":"e_1_2_1_67_1","unstructured":"Thadani M. N. and Khalidi Y. A. 1995. An efficient zero-copy I\/O framework for UNIX. Tech. Rep. SMLI TR-95-39 Sun Microsystems Laboratories Inc.]]   Thadani M. N. and Khalidi Y. A. 1995. An efficient zero-copy I\/O framework for UNIX. Tech. Rep. SMLI TR-95-39 Sun Microsystems Laboratories Inc.]]"},{"key":"e_1_2_1_68_1","unstructured":"Viega J. Messier M. and Chandra P. 2002. Network Security with OpenSSL 1st Ed. O'Reilly Cambridge MA.]]   Viega J. Messier M. and Chandra P. 2002. Network Security with OpenSSL 1st Ed. O'Reilly Cambridge MA.]]"},{"key":"e_1_2_1_69_1","volume-title":"Proceedings of the 2nd USENIX Workshop on Electronic Commerce","author":"Wagner D.","unstructured":"Wagner , D. and Schneier , B . 1996. Analysis of the SSL 3.0 protocol . In Proceedings of the 2nd USENIX Workshop on Electronic Commerce . Oakland, CA.]] Wagner, D. and Schneier, B. 1996. Analysis of the SSL 3.0 protocol. In Proceedings of the 2nd USENIX Workshop on Electronic Commerce. Oakland, CA.]]"},{"key":"e_1_2_1_70_1","volume-title":"Proceedings of the 18th ACM Symposium on Operating System Principles. ACM, Chateau Lake Louise, Canada.]] 10","author":"Welsh M.","year":"2034","unstructured":"Welsh , M. , Culler , D. , and Brewer , E . 2001. Seda: An architecture for well-conditioned, scalable Internet services . In Proceedings of the 18th ACM Symposium on Operating System Principles. ACM, Chateau Lake Louise, Canada.]] 10 .1145\/50 2034 .502057 Welsh, M., Culler, D., and Brewer, E. 2001. Seda: An architecture for well-conditioned, scalable Internet services. In Proceedings of the 18th ACM Symposium on Operating System Principles. ACM, Chateau Lake Louise, Canada.]] 10.1145\/502034.502057"},{"key":"e_1_2_1_71_1","unstructured":"Wessels D. 2002. Squid Web proxy cache. http:\/www.squid-cache.org.]]  Wessels D. 2002. Squid Web proxy cache. http:\/www.squid-cache.org.]]"},{"key":"e_1_2_1_72_1","unstructured":"Wireless Application Protocol Forum. 2001. Wireless Transport Layer Security. WAP forum. http:\/\/www1.wapforum.org\/tech\/terms.asp?doc=WAP-261-WTLS-20010406-a.pdf.]]  Wireless Application Protocol Forum. 2001. Wireless Transport Layer Security. WAP forum. http:\/\/www1.wapforum.org\/tech\/terms.asp?doc=WAP-261-WTLS-20010406-a.pdf.]]"},{"key":"e_1_2_1_73_1","unstructured":"Zeus Technology. 2001. Zeus performance tuning guide. http:\/\/support.zeus.com\/faq\/entries\/ssl_tuning.html.]]  Zeus Technology. 2001. Zeus performance tuning guide. http:\/\/support.zeus.com\/faq\/entries\/ssl_tuning.html.]]"},{"key":"e_1_2_1_74_1","unstructured":"Zeus Technology. 2002. Zeus Web server. http:\/\/www.zeus.co.uk\/.]]  Zeus Technology. 2002. Zeus Web server. http:\/\/www.zeus.co.uk\/.]]"}],"container-title":["ACM Transactions on Computer Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1124153.1124155","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1124153.1124155","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T15:06:10Z","timestamp":1750259170000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1124153.1124155"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,2]]},"references-count":72,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2006,2]]}},"alternative-id":["10.1145\/1124153.1124155"],"URL":"https:\/\/doi.org\/10.1145\/1124153.1124155","relation":{},"ISSN":["0734-2071","1557-7333"],"issn-type":[{"value":"0734-2071","type":"print"},{"value":"1557-7333","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,2]]},"assertion":[{"value":"2006-02-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}