2010
DOI: 10.1007/978-3-642-13675-7_10
|View full text |Cite
|
Sign up to set email alerts
|

The NEO Protocol for Large-Scale Distributed Database Systems: Modelling and Initial Verification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2012
2012
2015
2015

Publication Types

Select...
7

Relationship

2
5

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 6 publications
0
4
0
Order By: Relevance
“…With "its-reach" functional properties could be checked as well as quantitative measures such as worst-case lifetime analysis. In the Neoppod project [13] the CTL component was used to verify response and consistency properties of a protocol for a distributed database. Inria's Atsyra project [26] computes attack defense trees from a DSL using a model-to-model transformation to GAL.…”
Section: Case Studies and Experimentsmentioning
confidence: 99%
“…With "its-reach" functional properties could be checked as well as quantitative measures such as worst-case lifetime analysis. In the Neoppod project [13] the CTL component was used to verify response and consistency properties of a protocol for a distributed database. Inria's Atsyra project [26] computes attack defense trees from a DSL using a model-to-model transformation to GAL.…”
Section: Case Studies and Experimentsmentioning
confidence: 99%
“…The protocol, designed to handle a large distributed database over a cluster of machines, was described in [1,2]. Its main characteristics are shortly summarised in Section 3.1.…”
Section: Application Of the Guidelines To The Neo Protocolmentioning
confidence: 99%
“…This paper does not get into the details of the numerous properties to check, a good part of which can be found in [1] and [2]. Many properties were provided as an informal statement by the code developers.…”
Section: Groundingmentioning
confidence: 99%
“…Prior to that all master nodes agree on a primary master which will be the operating one, the other master nodes being secondary, waiting to replace the primary master if needed. This model specifies this election algorithm [9]. The scaling parameter is the number of master nodes.…”
Section: New Models In Mcc'2012mentioning
confidence: 99%