Towards Verification of the Pastry Protocol Using TLA + 

T Lu, S Merz, C Weidenbach - … Conference on Formal Methods for Open …, 2011 - Springer
Pastry is an algorithm that provides a scalable distributed hash table over an underlying P2P
network. Several implementations of Pastry are available and have been applied in practice …

Verification of peer-to-peer algorithms: A case study

R Bakhshi, D Gurov - Electronic Notes in Theoretical Computer Science, 2007 - Elsevier
The problem of maintaining structured peer-to-peer (P2P) overlay networks in the presence
of concurrent joins and failures of nodes is the subject of intensive research. The various …

[HTML][HTML] A machine-checked correctness proof for Pastry

N Azmy, S Merz, C Weidenbach - Science of Computer Programming, 2018 - Elsevier
Protocols implemented on overlay networks in a peer-to-peer (P2P) setting promise
flexibility, performance, and scalability due to the possibility for nodes to join and leave the …

A rigorous correctness proof for Pastry

N Azmy, S Merz, C Weidenbach - Abstract State Machines, Alloy, B, TLA …, 2016 - Springer
Peer-to-peer protocols for maintaining distributed hash tables, such as Pastry or Chord,
have become popular for a class of Internet applications. While such protocols promise …

Formal Verification of the Pastry Protocol Using

T Lu - … on Dependable Software Engineering: Theories, Tools …, 2015 - Springer
As a consequence of the rise of cloud computing, the reliability of network protocols is
gaining increasing attention. However, formal methods have revealed inconsistencies in …

A mechanized model for can protocols

F Bongiovanni, L Henrio - … International Conference, FASE 2013, Held as …, 2013 - Springer
Formal reasoning on Peer-to-Peer (P2P) systems is an intimidating task. This paper focuses
on broadcast algorithms for Content Addressable Network (CAN). Since these algorithms …

Verifying security property of peer-to-peer systems using csp

TTA Dinh, M Ryan - Computer Security–ESORICS 2010: 15th European …, 2010 - Springer
Due to their nature, Peer-to-Peer (P2P) systems are subject to a wide range of security
issues. In this paper, we focus on a specific security property, called the root authenticity (or …

Specifying and analyzing the kademlia protocol in maude

I Pita, A Riesco - Theoretical Aspects of Computing-ICTAC 2015: 12th …, 2015 - Springer
Kademlia is the most popular peer-to-peer distributed hash table (DHT) currently in use. It
offers a number of desirable features that result from the use of a notion of distance between …

Depletable channels: Dynamics and behaviour

P Cenciarelli, D Gorla, I Salvo - International Symposium on Fundamentals …, 2009 - Springer
A simple model of multi-hop communication in ad-hoc networks is considered. Similar
models are often adopted for studying energy efficiency and load balancing of different …

[PDF][PDF] Formally reasoning about security issues in p2p protocols: A case study

A Aristizabal, H Lopez, C Rueda… - … -French Conference on …, 2005 - lix.polytechnique.fr
Peer-to-Peer (P2P) systems can be seen as highly dynamic distributed systems designed for
very specific purposes, such as resources sharing in collaborative settings. Because of their …