2018
DOI: 10.1016/j.procs.2018.08.128
|View full text |Cite
|
Sign up to set email alerts
|

Formal Verification Approaches for Distributed Algorithms: A Systematic Literature Review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 24 publications
0
4
0
Order By: Relevance
“…The main aim of this stage was to assess studies that focus on Homomorphic Encryption techniques so that the best technique is selected to meet the initial objective of finding the best technique to use which can support a spatial search among the various HE techniques studied. According to F. Fakhfakh et al, setting up an SLR requires developing a review protocol in terms of the review objective, protocol search questions, search strategy and inclusion and exclusion criteria [42].…”
Section: ) Stage 1: Setting Up the Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…The main aim of this stage was to assess studies that focus on Homomorphic Encryption techniques so that the best technique is selected to meet the initial objective of finding the best technique to use which can support a spatial search among the various HE techniques studied. According to F. Fakhfakh et al, setting up an SLR requires developing a review protocol in terms of the review objective, protocol search questions, search strategy and inclusion and exclusion criteria [42].…”
Section: ) Stage 1: Setting Up the Reviewmentioning
confidence: 99%
“…Figure 2: Protocol for Systematic literature review process [42] The second one involved conducting the spatial search using the protocol with Paillier Encryption. In this one, using a Java program, a request was sent from one node to another where the random value for the client end is encrypted and the attribute value for the server side is also encrypted so that the server side sends back an encrypted value to the client side to demonstrate what happens in a Ring algorithm.…”
Section: Developing a Proof-of-concept Prototypementioning
confidence: 99%
“…It focuses on how to replace informal and incomplete pseudo code by syntax-free formal and complete definitions of a global-state transition system. In [21], Fakhfakh et al discuss various formal verification approaches for distributed algorithms. The study shows how there has been a rapid increase in the field of distributed algorithms due to the advances in networking technologies.…”
Section: B Distributed Protocols and Analysismentioning
confidence: 99%
“…The study shows how there has been a rapid increase in the field of distributed algorithms due to the advances in networking technologies. It also provides information for researchers and developers to understand the contributions and challenges of the existing formal verification technologies for distributed algorithms and paves the way to enhance the reliability of these distributed algorithms [21]. In [22], the work focuses on how formal methods can be used to analyze, design, and verify security protocols over open networks and distributed systems.…”
Section: B Distributed Protocols and Analysismentioning
confidence: 99%