Ovidiu Ratoi

Petru Maior University of Târgu Mures, Maros-Vásárhely, Mureş, Romania

Are you Ovidiu Ratoi?

Claim your profile

Publications (5)0 Total impact

  • Source
    Bela Genge · Piroska Haller · Ovidiu Ratoi · Iosif Ignat
    [Show abstract] [Hide abstract]
    ABSTRACT: In the context of security protocol parallel composition, where messages belonging to different protocols can intersect each other, we introduce a new paradigm: term-based composition (i.e. the composition of message components also known as terms). First, we create a protocol specification model by extending the original strand spaces. Then, we provide a term composition algorithm based on which new terms can be constructed. To ensure that security properties are maintained, we introduce the concept of term connections to express the existing connections between terms and encryption contexts. We illustrate the proposed composition process by using two existing protocols. Comment: 2008 IEEE International Conference on Automation, Quality and Testing, Robotics, Cluj-Napoca, Romania, May 2008, pp. 233-238, ISBN 978-1-4244-2576-1
    Full-text · Article · Aug 2009
  • Source
    Ovidiu Ratoi · Piroska Haller · Ioan Salomie · Bela Genge
    [Show abstract] [Hide abstract]
    ABSTRACT: We propose a platform for distributed multimedia applications which simplifies the development process and at the same time ensures application portability, flexibility and performance. The platform is implemented using the Netscape Portable Runtime (NSPR) and the Cross-Platform Component Object Model (XPCOM). Comment: 7th IEEE RoEduNet International Conference, Cluj-Napoca, Romania, Aug. 2008, pp. 40-43, ISBN 978-973-662-393-6
    Full-text · Article · Aug 2009
  • Source
    Bela Genge · Piroska Haller · Iosif Ignat · Ovidiu Ratoi
    [Show abstract] [Hide abstract]
    ABSTRACT: We propose a performance evaluation method for security protocols. Based on the informal specification, we construct a canonical model which includes, alongside protocol messages, cryptographic operations performed by participants in the process of message construction. Each cryptographic operation is assigned a cost modeled as a function of the size of processed message components. We model not only the size of regular message components but also the size of ciphertext produced by various cryptographic operations. We illustrate the applicability of our method by comparatively analyzing the performance of the original CCITT X.509 protocol and a slightly modified version of the same protocol. Comment: 4th IEEE International Conference on Intelligent Computer Communication and Processing, Cluj-Napoca, Romania, pp. 193-200, Aug. 2008, ISBN 978-1-4244-2673-7
    Full-text · Article · Aug 2009
  • Source
    Genge Bela · Haller Piroska · Iosif Ignat · Ovidiu Ratoi
    [Show abstract] [Hide abstract]
    ABSTRACT: We propose a performance evaluation method for security protocols. Based on the informal specification, we construct a canonical model which includes, alongside protocol messages, cryptographic operations performed by participants in the process of message construction. Each cryptographic operation is assigned a cost modeled as a function of the size of processed message components. We model not only the size of regular message components but also the size of ciphertext produced by various cryptographic operations. We illustrate the applicability of our method by comparatively analyzing the performance of the original CCITT X.509 protocol and a slightly modified version of the same protocol.
    Full-text · Conference Paper · Sep 2008
  • Source
    Béla Genge · Piroska Haller · Ovidiu Ratoi
    [Show abstract] [Hide abstract]
    ABSTRACT: In order to integrate new security protocols, existing systems must be modified accordingly, which often means interrupting system activity. We propose a solution to this problem by developing an ontology model which provides semantic to security protocol operations. The proposed model is based on a formal specification model and is integrated in existing Web service description technologies.
    Full-text · Conference Paper · Jan 2008