2007
DOI: 10.1016/j.entcs.2007.01.052
|View full text |Cite
|
Sign up to set email alerts
|

Verification of Peer-to-peer Algorithms: A Case Study

Abstract: The problem of maintaining structured peer-to-peer (P2P) overlay networks in the presence of concurrent joins and failures of nodes is the subject of intensive research. The various algorithms underlying P2P systems are notoriously difficult to design and analyse. Thus, when verifying P2P algorithms, a real challenge is to find an adequate level of abstraction at which to model the algorithms and perform the verifications. In this paper, we propose an abstract model for structured P2P networks with ring topolo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
20
0

Year Published

2008
2008
2019
2019

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(20 citation statements)
references
References 10 publications
0
20
0
Order By: Relevance
“…no churn) using CCS, a process algebra. In a subsequent work, Bakshi et al [1] used π-calculus to prove the correctness properties of Chord in the pure-join model of the protocol. Zave, in her work [19] proved the Chord protocol in its two models: the pure-join and full, using the Alloy analyzer.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…no churn) using CCS, a process algebra. In a subsequent work, Bakshi et al [1] used π-calculus to prove the correctness properties of Chord in the pure-join model of the protocol. Zave, in her work [19] proved the Chord protocol in its two models: the pure-join and full, using the Alloy analyzer.…”
Section: Related Workmentioning
confidence: 99%
“…Building high-assurance distributed applications which are correct remains a very difficult challenge but various methods have emerged over the years to tackle it [1,2,5,11,19]. Theorem proving seems to be among the best method to prove generic properties on distributed systems of arbitrary size; in particular verification techniques based on model-checking are, in general, limited to systems of a predefined size and suffer from combinatorial explosion.…”
Section: Introductionmentioning
confidence: 99%
“…Bakhshi and Gurov give in [1] a formal verification of Chord's stabilization algorithm using the π-calculus. Lately Lu, Merz, and Weidenbach [3] have…”
Section: Introductionmentioning
confidence: 99%
“…They verify that the routing protocol in DKS, under the static case (when no node joining or leaving), is correct. Bakhshi et al [16] model Chord in π-calculus and verify that the stabilization protocol in Chord is correct.…”
Section: Introductionmentioning
confidence: 99%