Developing correctly replicated databases using formal tools

N Schiper, V Rahli, R Van Renesse… - 2014 44th Annual …, 2014 - ieeexplore.ieee.org
Fault-tolerant distributed systems often contain complex error handling code. Such code is
hard to test or model-check because there are often too many possible failure scenarios to …

Formal specification, verification, and implementation of fault-tolerant systems using EventML

V Rahli, D Guaspari, M Bickford… - … Communications of the …, 2015 - eceasst.org
Distributed programs are known to be extremely difficult to implement, test, verify, and
maintain. This is due in part to the large number of possible unforeseen interactions among …

A novel approach to automatic security protocol analysis based on authentication event logic

M Xiao, C Ma, C Deng, K Zhu - Chinese Journal of Electronics, 2015 - Wiley Online Library
Since security protocols form the cornerstones of modern secure networked systems, it is
important to develop informative, accurate, and deployable approach for finding errors and …

[PDF][PDF] Towards declarative smart contracts

K Purnell, R Schwitter - Proc. Symp. Distrib. Ledger Technol, 2019 - figshare.mq.edu.au
With the exception of some well-funded industries, legal documents remain difficult and
expensive to use, and prone to ambiguities. Emerging blockchain technologies hold the …

Formal Program Optimization in Nuprl Using Computational Equivalence and Partial Types

V Rahli, M Bickford, A Anand - … Conference, ITP 2013, Rennes, France, July …, 2013 - Springer
This paper extends the proof methods used by the Nuprl proof assistant to reason about the
computational behavior of its untyped programs. We have implemented new methods to …

[PDF][PDF] Interfacing with proof assistants for domain specific programming using EventML

V Rahli - International Workshop on User Interfaces for Theorem …, 2012 - orbilu.uni.lu
This paper presents a paradigm for using proof assistants in the programming process. We
demonstrate how the programming language EventML provides a useful interface to proof …

Logic of events for proving security properties of protocols

M Xiao, M Bickford - … on Web Information Systems and Mining, 2009 - ieeexplore.ieee.org
Formal methods are vital for ensuring the security and reliability of the network systems. We
propose a promising method to check security properties of cryptographic protocols using …

{ShadowDB}: A Replicated Database on a Synthesized Consensus Core

N Schiper, V Rahli, R Van Renesse… - Eighth Workshop on …, 2012 - usenix.org
This paper describes ShadowDB, a replicated version of the BerkeleyDB database.
ShadowDB is a primary-backup based replication protocol where failure handling, the …

A diversified and correct-by-construction broadcast service

V Rahli, N Schiper, R Van Renesse… - 2012 20th IEEE …, 2012 - ieeexplore.ieee.org
We present a fault-tolerant ordered broadcast service that is correct-by-construction. Our
broadcast service allows for diversity in space, whereby the participants in the broadcast …

On building constructive formal theories of computation noting the roles of turing, church, and brouwer

RL Constable - 2012 27th Annual IEEE Symposium on Logic in …, 2012 - ieeexplore.ieee.org
In this article I will examine a few key concepts and design decisions that account for the
high value of implemented constructive type theories in computer science. I'll stress the …