Ovidiu Ratoi

Petru Maior University of Târgu Mures, Maros-Vásárhely, Mureş, Romania

Are you Ovidiu Ratoi?

Claim your profile

Publications (5)0 Total impact

  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: We propose a platform for distributed multimedia applications which simplifies the development process and at the same time ensures application portability, flexibility and performance. The platform is implemented using the Netscape Portable Runtime (NSPR) and the Cross-Platform Component Object Model (XPCOM). Comment: 7th IEEE RoEduNet International Conference, Cluj-Napoca, Romania, Aug. 2008, pp. 40-43, ISBN 978-973-662-393-6
    08/2009;
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: In the context of security protocol parallel composition, where messages belonging to different protocols can intersect each other, we introduce a new paradigm: term-based composition (i.e. the composition of message components also known as terms). First, we create a protocol specification model by extending the original strand spaces. Then, we provide a term composition algorithm based on which new terms can be constructed. To ensure that security properties are maintained, we introduce the concept of term connections to express the existing connections between terms and encryption contexts. We illustrate the proposed composition process by using two existing protocols. Comment: 2008 IEEE International Conference on Automation, Quality and Testing, Robotics, Cluj-Napoca, Romania, May 2008, pp. 233-238, ISBN 978-1-4244-2576-1
    08/2009;
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: We propose a performance evaluation method for security protocols. Based on the informal specification, we construct a canonical model which includes, alongside protocol messages, cryptographic operations performed by participants in the process of message construction. Each cryptographic operation is assigned a cost modeled as a function of the size of processed message components. We model not only the size of regular message components but also the size of ciphertext produced by various cryptographic operations. We illustrate the applicability of our method by comparatively analyzing the performance of the original CCITT X.509 protocol and a slightly modified version of the same protocol. Comment: 4th IEEE International Conference on Intelligent Computer Communication and Processing, Cluj-Napoca, Romania, pp. 193-200, Aug. 2008, ISBN 978-1-4244-2673-7
    08/2009;
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: We propose a performance evaluation method for security protocols. Based on the informal specification, we construct a canonical model which includes, alongside protocol messages, cryptographic operations performed by participants in the process of message construction. Each cryptographic operation is assigned a cost modeled as a function of the size of processed message components. We model not only the size of regular message components but also the size of ciphertext produced by various cryptographic operations. We illustrate the applicability of our method by comparatively analyzing the performance of the original CCITT X.509 protocol and a slightly modified version of the same protocol.
    Intelligent Computer Communication and Processing, 2008. ICCP 2008. 4th International Conference on; 09/2008
  • Source
    Béla Genge, Piroska Haller, Ovidiu Ratoi
    [Show abstract] [Hide abstract]
    ABSTRACT: In order to integrate new security protocols, existing systems must be modified accordingly, which often means interrupting system activity. We propose a solution to this problem by developing an ontology model which provides semantic to security protocol operations. The proposed model is based on a formal specification model and is integrated in existing Web service description technologies.
    Intelligent Distributed Computing, Systems and Applications, Proceedings of the 2nd International Symposium on Intelligent Distributed Computing - IDC 2008, Catania, Italy, 2008; 01/2008