Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where John Buford is active.

Publication


Featured researches published by John Buford.


consumer communications and networking conference | 2007

Parallelizing Peer-to-Peer Overlays with Multi-Destination Routing

John Buford; Alan Brown; Mario Kolberg

A method is provided for parallelizing overlay operations in an overlay network. The method includes: identifying an overlay operation having a parallel messaging scheme; determining a destination address for each parallel message in the messaging scheme; encoding each destination address into a data packet; and transmitting the data packet over the overlay network using a multi-destination, multicast routing protocol.


pervasive computing and communications | 2006

Composition trust bindings in pervasive computing service composition

John Buford; Rakesh Kumar; Greg Perkins

In pervasive computing, devices or peers may implement or compose services using services from other devices or peers, and may use components from various sources. A composition trust binding is a prescriptive set of rules which defines the combination of allowable components for a particular service or application. Composition trust bindings can be used to protect both the service invocation path as well as the content handling path. The subsidiary relationships addressed by a composition trust binding are typically transparent today, but represent potential security exposure in pervasive computing systems because the subsidiary services or components may have security vulnerabilities. We define the composition trust binding and illustrate its use in the context of rights management and distributed search in personal content publishing. We compare this approach to existing authentication and authorization methods in service composition


pervasive computing and communications | 2006

Meta service discovery

John Buford; Alan Brown; Mario Kolberg

Meta service discovery is used to find and select a service discovery mechanism by context. As multiple service discovery mechanisms (SDM) proliferate across various administrative domains, mobile devices will require a way to locate and select the appropriate mechanism according to the context of the mobile device, such as network domain, location, protocol, and application. We define meta service discovery and explain the motivation for it. We describe our results in building a meta service discovery capability on three existing DHTs and integrated into a new broadcast-oriented SDM. Finally, we analyze the sizing and distribution of DHT entries, including hash distribution of SDM entries according to a geographic population-density scheme


IEEE Communications Magazine | 2007

Peer-to-peer streaming for networked consumer electronics [Peer-to-Peer Multimedia Streaming]

Sathya Narayanan; David Alan Braun; John Buford; Robert Fish; Alexander D. Gelman; Alan Kaplan; Rajesh B. Khandelwal; Eunsoo Shim; Heather Yu

Applications such as multimedia communications and entertainment make media streaming a key feature for peer-to-peer (P2P) technology embedded in networked consumer electronics. In this article, we discuss some key issues that are relevant to enabling peer-to-peer streaming in networked consumer electronics and address possible technical solutions to the issues of interoperability, NAT/firewall traversal, and codec inflexibility. We also address how to improve overall system performance by introducing a notion of node coordinates into the discovery of services on a P2P network and confirm the effectiveness of our approach using simulation. We conclude with a discussion of our prototype CE-oriented P2P streaming system.


international conference on mobile and ubiquitous systems: networking and services | 2006

Sleeper: A Power-Conserving Service Discovery Protocol

John Buford; Bernard Burg; Emré Celebi; Phyllis G. Frankl

The design of service discovery protocols which limit power consumption of devices has received little consideration but is an important problem because of the growing use of power-limited mobile networked devices. We describe Sleeper, a new discovery protocol which uses proxied advertisement and discovery to dynamically offload service discovery workload from power-limited devices. The advertisement structure supports several modes of service discovery including conventional service advertisements, meta discovery, taxonomic-based discovery, location-based discovery and federated discovery. In addition, Sleeper supports both push and pull modes of advertisement, but unlike other protocols uses service popularity to select push or pull modality. We describe an implementation of the new protocol and provide an analytical model for comparing response time to other push-based service discovery methods


mobile data management | 2006

Using FIPA Agents with Service-Oriented Peer-to-Peer Middleware

John Buford; Bernard Burg

Peer-to-peer technologies have emerged as an alternative to traditional client-server networking which can enable highly scalable end-to-end applications. The coupling of agent platforms with peer-to-peer overlay networks enables the integration of many agent platforms and enriches the semantic functionality of peer-to-peer systems. Here we present two important results based on combining recent work in FIPA agents and peer-to-peer service oriented middleware. First we describe the coupling between peer-to-peer overlay and the FIPA agent platform, including how the overlay can be used by APs to discover each other. Second we describe the relationship between agent services and peer services, including service discovery and mapping mechanisms. Finally we discuss the benefits of this integration.


pervasive computing and communications | 2007

Tork: A Variable-Hop Overlay for Heterogeneous Networks

Alan Brown; John Buford; Mario Kolberg

We present a new variable-hop peer-to-peer overlay that combines active stabilization and opportunistic maintenance to provide overlay nodes with a large range of hop-count versus peer bandwidth capabilities. Because of the variable-hop design, Tork is suitable for use in large-scale heterogeneous peer-to-peer networks where peers have a range of bandwidth capacities. For high-bandwidth peers Tork has O(I)-hop performance, and for low-bandwidth, most likely mobile peers, Tork has multi-hop performance. We further show that mapping overlay messaging to multi-destination routing in the underlay reduces Tork message overhead by up to 35%


consumer communications and networking conference | 2007

Multi-Destination Routing and the Design of Peer-to-Peer Overlays

John Buford; Alan Brown; Mario Kolberg

We propose the integration of peer-to-peer network overlays with underlay networking in which multidestination multicast routing is available. Network overlay operations are parallelized by using multidestination multicast messages in the underlying network in place of same-source unicast messages. This mechanism is generally applicable to structured overlays including one-hop, multi-hop, and variable-hop, and unstructured overlays. The main result is significant message reduction, which varies according to the overlay algorithm.


consumer communications and networking conference | 2006

Social certificates and trust negotiation

John Buford; Il-Pyung Park; Greg Perkins

When participating in online communities and ad hoc interactions, peer trust is based on societal relationships where identity alone is typically insufficient. We propose a new method for automatic establishment of peer trust that is suitable for peer-topeer and ad-hoc networking applications which overcomes the shortcomings of existing approaches. This method includes a new type of property-based certificate which we call a Social Certificate, and a new approach for trust negotiation in which privacy is assured by isolating the negotiation using a Secure Trust Negotiation Agent. Each Secure agent acts as the negotiator for its peer, upholding the peers trust negotiation policies while keeping shared information secret. We describe these new methods and the security technology underpinning the Secure Trust Negotiation Agent.


consumer communications and networking conference | 2006

Analysis of using java card for DRM master key security

John Buford; Rakesh Kumar

Recently Wei and Montemayor [1] have demonstrated a Java Card™ smart card application for authenticating playback for DRM-protected media. In this scheme the Java Card stores the encrypted master key and communicates during media playback with a signed content handler to securely provide the segment keys to the content handler for decryption and rendering of the media. In this paper we summarize the Java Card-based design and analyze its vulnerabilities.

Collaboration


Dive into the John Buford's collaboration.

Researchain Logo
Decentralizing Knowledge