skip to main content
10.1145/1028613.1028622acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmiddlewareConference Proceedingsconference-collections
Article

Exploring adaptability of secure group communication using formal prototyping techniques

Published: 19 October 2004 Publication History

Abstract

Traditionally, adaptability in communication frameworks has been restricted to predefined choices without taking into consideration tradeoffs between them and the application requirements. Furthermore, different applications with an entire spectrum of requirements will have to adapt to these predefined choices instead of tailoring the communication framework to fit their needs. In this paper we extend an executable specification of a state-of-the-art secure group communication subsystem to explore two dimensions of adaptability, namely security and synchrony. In particular, we relax the traditional requirement of virtual synchrony (a well-known bottleneck) and propose various generic optimizations, while preserving essential security guarantees.

References

[1]
The Keyed-Hash Message Authentication Code (HMAC). In No. FIPS 198, National Institute for Standards and Technology, 2002.]]
[2]
A. Fekete, N. Lynch and A. Shvartsman. Specifying and using a Partitionable Group Communication Service. In 16th Annual ACM Symposium on Principles of Distributed Computing, 1997.]]
[3]
C. Talcott and M.-O. Stehr. Specification of the Group Diffie-Hellman Protocol as a Component of the Cliques Toolkit. Website: http://formal.cs.uiuc.edu/stehr/cliques_eng.html, 2003.]]
[4]
C. Talcott, M.-O. Stehr and G. Denker. Towards a Formal Specification of the Spread Group Communication System. Website: http://formal.cs.uiuc.edu/stehr/spread_eng.html, 2004.]]
[5]
J. Meseguer. Conditional Rewriting Logic as a Unified Model of Concurrency. In Theoretical Computer Science 96(1):73--155, 1992.]]
[6]
J. Schultz. Partitionable Virtual Synchrony Using Extended Virtual Synchrony. Master Thesis, Department of Computer Science, Johns Hopkins University, 2001.]]
[7]
K. P. Kihlstrom, L. E. Moser and P. M. Melliar-Smith. The SecureRing Protocols for Securing Group Communication. In IEEE 31st Hawaii International Conference on System Sciences, 1998.]]
[8]
L. E. Moser, Y. Amir, P. M. Melliar-Smith and D. A. Agarwal. Extended Virtual Synchrony. In 14th International Conference on Distributed Computing Systems, 1994.]]
[9]
M. Clavel, F. Durán, S. Eker, P. Lincoln, N. Martí-Oliet, J. Meseguer and C. Talcott. The Maude 2.0 System. In Robert Nieuwenhuis, editor, Rewriting Techniques and Applications (RTA 2003), number 2706 in Lecture Notes in Computer Science, pages 76--87. Springer-Verlag, June 2003.]]
[10]
M. K. Reiter. Secure Agreement Protocols: Reliable and Atomic Group Multicast in Rampart. In 2nd ACM Conference on Computer and Communications Security, 1994.]]
[11]
M. Steiner, G. Tsudik and M. Waidner. Key Agreement in Dynamic Peer Groups. In IEEE Transactions on Parallel and Distributed Systems, 2000.]]
[12]
O. Rodeh, K. Birman, M. Hayden, Z. Xiao and D. Dolev. Ensemble Security. Technical Report TR98--1703, Cornell University, 2000. Department of Computer Science.]]
[13]
P. McDaniel, A. Prakash and P. Honeyman. Antigone: A Flexible Communication for Secure Group Communication. In Proceedings of the 8th USENIX Security Symposium, 1999.]]
[14]
R. van Renesse, K. Birman and S. Maffeis. Horus: A Flexible Group Communication System. Communication of the ACM, 39(4):76--83, 1996.]]
[15]
S. Floyd, V. Jacobson, C. Liu, S. McCanne and L. Zhang. A Reliable Multicast Framework for Light-weight Session and Application Level Framing. In IEEE/ACM Transactions on Networking, (5):784--803, 1997.]]
[16]
Y. Amir. Replication Using Group Communication Over a Partitioned Network. Ph.D. Thesis, Hebrew University of Jerusalem, 1995.]]
[17]
Y. Amir and J. Stanton. The Spread Wide Area Group Communication System. Technical Report Technical Report CNDS-98-4, Johns Hopkins University, 1998.]]
[18]
Y. Amir, C. Nita-Rotaru, J. Stanton and G. Tsudik. Scaling Secure Group Communication Systems: Beyond Peer-to-Peer. In DARPA Information Survivability Conference and Exposition, 2003.]]
[19]
Y. Amir, D. Dolev, S. Kramer and D Malki. Transis: A Communication Subsystem for High Availability. In 22nd International Symposium on Fault-Tolerant Computing Systems, 1992.]]
[20]
Y. Amir, G. Ateniese, D. Hasse, Y. Kim, C. Nita-Rotaru, T. Schlossnagle, J. Schultz, J. Stanton and G. Tsudik. Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments. In 20th International Conference on Distributed Computing Systems, 2000.]]
[21]
Y. Amir, L. E. Moser, P. M. Melliar-Smith, D. Agarwal and P. Ciarfella. The Totem Single-Ring Ordering and Membership Protocol. In ACM Transactions on Computer Systems, 1995.]]
[22]
Y. Amir, Y. Kim, C. Nita-Rotaru, J. Schultz, J. Stanton and G. Tsudik. Secure Group Communication Using Robust Contributory Key Agreement. In IEEE Transactions on Parallel and Distributed Systems, 2004.]]
[23]
Y. Kim, A. Perrig and G. Tsudik. Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups. In ACM CCS, 2000.]]
[24]
Y. Kim, A. Perrig and G. Tsudik. Communication-efficient Group Key Agreement. In IFIP SEC 2001, 2001.]]

Cited By

View all
  • (2013)A study of unpredictability in fault-tolerant middlewareComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2012.10.01557:3(682-698)Online publication date: 1-Feb-2013
  • (2012)Twenty years of rewriting logicThe Journal of Logic and Algebraic Programming10.1016/j.jlap.2012.06.00381:7-8(721-781)Online publication date: Oct-2012
  • (2011)Ensuring security and availability through model-based cross-layer adaptationProceedings of the 8th international conference on Ubiquitous intelligence and computing10.5555/2035646.2035677(310-325)Online publication date: 2-Sep-2011
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ARM '04: Proceedings of the 3rd workshop on Adaptive and reflective middleware
October 2004
105 pages
ISBN:1581139497
DOI:10.1145/1028613
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 19 October 2004

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Acceptance Rates

Overall Acceptance Rate 15 of 21 submissions, 71%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 14 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2013)A study of unpredictability in fault-tolerant middlewareComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2012.10.01557:3(682-698)Online publication date: 1-Feb-2013
  • (2012)Twenty years of rewriting logicThe Journal of Logic and Algebraic Programming10.1016/j.jlap.2012.06.00381:7-8(721-781)Online publication date: Oct-2012
  • (2011)Ensuring security and availability through model-based cross-layer adaptationProceedings of the 8th international conference on Ubiquitous intelligence and computing10.5555/2035646.2035677(310-325)Online publication date: 2-Sep-2011
  • (2011)Ensuring Security and Availability through Model-Based Cross-Layer AdaptationUbiquitous Intelligence and Computing10.1007/978-3-642-23641-9_26(310-325)Online publication date: 2011
  • (2010)Formal verification of secure group communication protocols modelled in UMLInnovations in Systems and Software Engineering10.1007/s11334-010-0122-36:1-2(125-133)Online publication date: 28-Jan-2010
  • (2009)Implementing and analyzing in Maude the Enhanced Interior Gateway Routing ProtocolElectronic Notes in Theoretical Computer Science (ENTCS)10.1016/j.entcs.2009.05.023238:3(249-266)Online publication date: 1-Jun-2009
  • (2007)All about maude - a high-performance logical frameworkundefinedOnline publication date: 1-Jan-2007
  • (2006)Specification and analysis of the AER/NCA active network protocol suite in Real-Time MaudeFormal Methods in System Design10.1007/s10703-006-0015-029:3(253-293)Online publication date: 1-Nov-2006
  • (2005)A rewriting logic samplerProceedings of the Second international conference on Theoretical Aspects of Computing10.1007/11560647_1(1-28)Online publication date: 17-Oct-2005

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media