{"id":"https://openalex.org/W3047975027","doi":"https://doi.org/10.1109/cns48642.2020.9162197","title":"Quantitative Verification of Certificate Transparency Gossip Protocols","display_name":"Quantitative Verification of Certificate Transparency Gossip Protocols","publication_year":2020,"publication_date":"2020-06-01","ids":{"openalex":"https://openalex.org/W3047975027","doi":"https://doi.org/10.1109/cns48642.2020.9162197","mag":"3047975027"},"language":"en","primary_location":{"id":"doi:10.1109/cns48642.2020.9162197","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cns48642.2020.9162197","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE Conference on Communications and Network Security (CNS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004387243","display_name":"Michael Oxford","orcid":null},"institutions":[{"id":"https://openalex.org/I79619799","display_name":"University of Birmingham","ror":"https://ror.org/03angcq70","country_code":"GB","type":"education","lineage":["https://openalex.org/I79619799"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Michael Oxford","raw_affiliation_strings":["School of Computer Science, University of Birmingham, UK"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, University of Birmingham, UK","institution_ids":["https://openalex.org/I79619799"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036097359","display_name":"David Parker","orcid":"https://orcid.org/0000-0003-4137-8862"},"institutions":[{"id":"https://openalex.org/I79619799","display_name":"University of Birmingham","ror":"https://ror.org/03angcq70","country_code":"GB","type":"education","lineage":["https://openalex.org/I79619799"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"David Parker","raw_affiliation_strings":["School of Computer Science, University of Birmingham, UK"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, University of Birmingham, UK","institution_ids":["https://openalex.org/I79619799"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055690957","display_name":"Mark Ryan","orcid":"https://orcid.org/0000-0002-1632-497X"},"institutions":[{"id":"https://openalex.org/I79619799","display_name":"University of Birmingham","ror":"https://ror.org/03angcq70","country_code":"GB","type":"education","lineage":["https://openalex.org/I79619799"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Mark Ryan","raw_affiliation_strings":["School of Computer Science, University of Birmingham, UK"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, University of Birmingham, UK","institution_ids":["https://openalex.org/I79619799"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5004387243"],"corresponding_institution_ids":["https://openalex.org/I79619799"],"apc_list":null,"apc_paid":null,"fwci":0.4222,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.68268867,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8686479330062866},{"id":"https://openalex.org/keywords/gossip-protocol","display_name":"Gossip protocol","score":0.7592326998710632},{"id":"https://openalex.org/keywords/gossip","display_name":"Gossip","score":0.6370382905006409},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5739720463752747},{"id":"https://openalex.org/keywords/transparency","display_name":"Transparency (behavior)","score":0.5547131299972534},{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.5499680042266846},{"id":"https://openalex.org/keywords/certificate","display_name":"Certificate","score":0.511954665184021},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5020811557769775},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.415568083524704},{"id":"https://openalex.org/keywords/audit","display_name":"Audit","score":0.4144183099269867},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3466825485229492},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.22719043493270874},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.19181686639785767},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.17380291223526}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8686479330062866},{"id":"https://openalex.org/C145928361","wikidata":"https://www.wikidata.org/wiki/Q5587504","display_name":"Gossip protocol","level":3,"score":0.7592326998710632},{"id":"https://openalex.org/C62989814","wikidata":"https://www.wikidata.org/wiki/Q854648","display_name":"Gossip","level":2,"score":0.6370382905006409},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5739720463752747},{"id":"https://openalex.org/C2780233690","wikidata":"https://www.wikidata.org/wiki/Q535347","display_name":"Transparency (behavior)","level":2,"score":0.5547131299972534},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.5499680042266846},{"id":"https://openalex.org/C96865113","wikidata":"https://www.wikidata.org/wiki/Q2946816","display_name":"Certificate","level":2,"score":0.511954665184021},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5020811557769775},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.415568083524704},{"id":"https://openalex.org/C199521495","wikidata":"https://www.wikidata.org/wiki/Q181487","display_name":"Audit","level":2,"score":0.4144183099269867},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3466825485229492},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.22719043493270874},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.19181686639785767},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.17380291223526},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cns48642.2020.9162197","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cns48642.2020.9162197","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE Conference on Communications and Network Security (CNS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G6459806740","display_name":null,"funder_award_id":"1832982","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G8682795926","display_name":null,"funder_award_id":"EP/R007128/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W60686164","https://openalex.org/W1437335841","https://openalex.org/W1516256348","https://openalex.org/W1596388494","https://openalex.org/W1603153151","https://openalex.org/W1655958391","https://openalex.org/W1862398452","https://openalex.org/W2005998857","https://openalex.org/W2054652241","https://openalex.org/W2106411961","https://openalex.org/W2113207845","https://openalex.org/W2116428199","https://openalex.org/W2159801413","https://openalex.org/W2186028149","https://openalex.org/W2233063544","https://openalex.org/W2396677053","https://openalex.org/W2884440084","https://openalex.org/W3100279392","https://openalex.org/W4206147779","https://openalex.org/W4240195388","https://openalex.org/W6676179485","https://openalex.org/W6677088747","https://openalex.org/W6677548862","https://openalex.org/W6721285927","https://openalex.org/W6806495394"],"related_works":["https://openalex.org/W3024820515","https://openalex.org/W2131433923","https://openalex.org/W2010318438","https://openalex.org/W2020760577","https://openalex.org/W1678654634","https://openalex.org/W2120550887","https://openalex.org/W2149172033","https://openalex.org/W2050759643","https://openalex.org/W177242786","https://openalex.org/W2108737453"],"abstract_inverted_index":{"Certificate":[0],"transparency":[1],"is":[2,14,22],"a":[3,34,51,72,83,104],"promising":[4],"log-based":[5],"system":[6],"designed":[7,57],"to":[8,25,33,41,97,107,145],"audit":[9],"internet":[10],"certificates":[11],"publicly":[12],"and":[13,99,129,140],"currently":[15],"supported":[16],"by":[17],"Google":[18],"Chrome.":[19],"However,":[20],"it":[21],"potentially":[23],"vulnerable":[24],"split-world":[26],"attacks,":[27],"where":[28],"certain":[29],"users":[30,44,60],"are":[31,45],"directed":[32],"fake":[35],"version":[36,49],"of":[37,50,75,90,116,123,134],"the":[38,47,65,101,117,120,130],"log.":[39,66],"So,":[40],"ensure":[42],"that":[43],"seeing":[46],"same":[48],"log,":[52],"gossip":[53],"protocols":[54,78],"have":[55],"been":[56],"in":[58,126,132],"which":[59],"share":[61],"data":[62,128],"sourced":[63],"from":[64],"In":[67],"this":[68],"paper,":[69],"we":[70],"propose":[71],"new":[73],"way":[74],"evaluating":[76],"these":[77],"using":[79],"probabilistic":[80],"model":[81,110],"checking,":[82],"technique":[84],"for":[85],"formally":[86],"verifying":[87,100],"quantitative":[88],"properties":[89],"computer":[91],"systems.":[92],"We":[93,112],"describe":[94],"our":[95,142],"approach":[96,106],"modelling":[98],"protocols,":[102,118],"including":[103,119],"novel":[105],"determine":[108],"worst-case":[109],"parameters.":[111],"analyse":[113],"several":[114],"aspects":[115],"success":[121],"rate":[122],"detecting":[124],"inconsistencies":[125],"gossiped":[127],"efficiency":[131],"terms":[133],"bandwidth,":[135],"comparing":[136],"different":[137],"protocol":[138,147],"variants":[139],"also":[141],"own":[143],"proposals":[144],"improve":[146],"performance.":[148]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
