Towards Verification of the Pastry Protocol Using TLA +
T Lu, S Merz, C Weidenbach - … Conference on Formal Methods for Open …, 2011 - Springer
Pastry is an algorithm that provides a scalable distributed hash table over an underlying P2P
network. Several implementations of Pastry are available and have been applied in practice …
network. Several implementations of Pastry are available and have been applied in practice …
Verification of peer-to-peer algorithms: A case study
The problem of maintaining structured peer-to-peer (P2P) overlay networks in the presence
of concurrent joins and failures of nodes is the subject of intensive research. The various …
of concurrent joins and failures of nodes is the subject of intensive research. The various …
[HTML][HTML] A machine-checked correctness proof for Pastry
N Azmy, S Merz, C Weidenbach - Science of Computer Programming, 2018 - Elsevier
Protocols implemented on overlay networks in a peer-to-peer (P2P) setting promise
flexibility, performance, and scalability due to the possibility for nodes to join and leave the …
flexibility, performance, and scalability due to the possibility for nodes to join and leave the …
A rigorous correctness proof for Pastry
N Azmy, S Merz, C Weidenbach - Abstract State Machines, Alloy, B, TLA …, 2016 - Springer
Peer-to-peer protocols for maintaining distributed hash tables, such as Pastry or Chord,
have become popular for a class of Internet applications. While such protocols promise …
have become popular for a class of Internet applications. While such protocols promise …
Formal Verification of the Pastry Protocol Using
T Lu - … on Dependable Software Engineering: Theories, Tools …, 2015 - Springer
As a consequence of the rise of cloud computing, the reliability of network protocols is
gaining increasing attention. However, formal methods have revealed inconsistencies in …
gaining increasing attention. However, formal methods have revealed inconsistencies in …
A mechanized model for can protocols
F Bongiovanni, L Henrio - … International Conference, FASE 2013, Held as …, 2013 - Springer
Formal reasoning on Peer-to-Peer (P2P) systems is an intimidating task. This paper focuses
on broadcast algorithms for Content Addressable Network (CAN). Since these algorithms …
on broadcast algorithms for Content Addressable Network (CAN). Since these algorithms …
Verifying security property of peer-to-peer systems using csp
Due to their nature, Peer-to-Peer (P2P) systems are subject to a wide range of security
issues. In this paper, we focus on a specific security property, called the root authenticity (or …
issues. In this paper, we focus on a specific security property, called the root authenticity (or …
Specifying and analyzing the kademlia protocol in maude
Kademlia is the most popular peer-to-peer distributed hash table (DHT) currently in use. It
offers a number of desirable features that result from the use of a notion of distance between …
offers a number of desirable features that result from the use of a notion of distance between …
Depletable channels: Dynamics and behaviour
A simple model of multi-hop communication in ad-hoc networks is considered. Similar
models are often adopted for studying energy efficiency and load balancing of different …
models are often adopted for studying energy efficiency and load balancing of different …
[PDF][PDF] Formally reasoning about security issues in p2p protocols: A case study
A Aristizabal, H Lopez, C Rueda… - … -French Conference on …, 2005 - lix.polytechnique.fr
Peer-to-Peer (P2P) systems can be seen as highly dynamic distributed systems designed for
very specific purposes, such as resources sharing in collaborative settings. Because of their …
very specific purposes, such as resources sharing in collaborative settings. Because of their …