spacer
spacer search

Software Engineering for Service-Oriented Overlay Computers
Software Engineering for Service-Oriented Overlay Computers

Search
spacer
 
header
Main Menu
 
Home arrow Publications arrow All Publications

SENSORIA All Publications Print

Copyright Information
The documents distributed by this server have been provided by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a noncommercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.

show main publications


Formal models and analysis of secure multicast in wired and wireless networks


@ARTICLE{GMP08a,
  title = {{Formal models and analysis of secure multicast in wired and wireless networks}},
  author = {{Roberto} {Gorrieri} and {Fabio} {Martinelli} and {Marinella} {Petrocchi}},
  journal = {Journal automated reasoning},
  pages = {325-364},
  abstract = {The spreading of multicast technology enables the development of group communication and so dealing with digital streams becomes more and more common over the Internet. Given the flourishing of security threats, the distribution of streamed data must be equipped with sufficient security guarantees. To this aim, some architectures have been proposed, to supply the distribution of the stream with guarantees of, e.g., authenticity, integrity, and confidentiality of the digital contents. This paper shows a formal capability of capturing some features of secure multicast protocols. In particular, both the modeling and the analysis of some case studies are shown, starting from basic schemes for signing digital streams, passing through protocols dealing with packet loss and time-synchronization requirements, concluding with a secure distribution of a secret key. A process-algebraic framework will be exploited, equipped with schemata for analysing security properties and compositional principles for evaluating if a property is satisfied over a system with more than two components.},
  publisher = {Springer},
  volume = {41},
  number = {3/4},
  year = {2008},
  url = {http://www.springerlink.com/content/5216m1l6873w2242},
  doi = { 10.1007/s10817-008-9112-7},
  ee = {http://www.springerlink.com/content/5216m1l6873w2242},
  issn = {0168-7433 (Print) 1573-0670 (Online)},
  partner = {UNIBO},
  status = {public},
  task = {T3.2},
}

spacer

The Sensoria Project Website
2005 - 2010
spacer