Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where John L. Schultz is active.

Publication


Featured researches published by John L. Schultz.


IEEE Transactions on Parallel and Distributed Systems | 2004

Secure group communication using robust contributory key agreement

Yair Amir; Yongdae Kim; Cristina Nita-Rotaru; John L. Schultz; Jonathan Stanton; Gene Tsudik

Contributory group key agreement protocols generate group keys based on contributions of all group members. Particularly appropriate for relatively small collaborative peer groups, these protocols are resilient to many types of attacks. Unlike most group key distribution protocols, contributory group key agreement protocols offer strong security properties such as key independence and perfect forward secrecy. We present the first robust contributory key agreement protocol resilient to any sequence of group changes. The protocol, based on the Group Diffie-Hellman contributory key agreement, uses the services of a group communication system supporting virtual synchrony semantics. We prove that it provides both virtual synchrony and the security properties of Group Diffie-Hellman, in the presence of any sequence of (potentially cascading) node failures, recoveries, network partitions, and heals. We implemented a secure group communication service, Secure Spread, based on our robust key agreement protocol and Spread group communication system. To illustrate its practicality, we compare the costs of establishing a secure group with the proposed protocol and a protocol based on centralized group key management, adapted to offer equivalent security properties.


international conference on distributed computing systems | 2000

Secure group communication in asynchronous networks with failures: integration and experiments

Yair Amir; Giuseppe Ateniese; Damian Hasse; Yongdae Kim; Cristina Nita-Rotaru; Theo Schlossnagle; John L. Schultz; Jonathan Stanton; Gene Tsudik

The increasing popularity and diversity of collaborative applications prompts a need for highly secure and reliable communication platforms for dynamic peer groups. Security mechanisms for such groups tend to be both expensive and complex and their integration with reliable group communication services presents a formidable challenge, This paper discusses some important integration issues, reports on our implementation experience and provides experimental results. Our approach utilizes distributed group key management developed by the Cliques project. We enhance it to handle processor and network faults (under a fail-stop or crash-and-recover model) and asynchronous membership events (such as joins, leaves, merges and network partitions). Our approach leverages the strong properties provided by the Spread group communication system, such as message ordering, clean failure semantics and a membership service. The result of this work is a secure group communications layer and an API that provide the application programmer with both standard group communication services and flexible security services.


international conference on distributed computing systems | 2001

Exploring robustness in group key agreement

Yair Amir; Yongdae Kim; Cristina Nita-Rotaru; John L. Schultz; Jonathan Stanton; Gene Tsudik

Secure group communication is crucial for building distributed applications that work in dynamic environments and communicate over unsecured networks (e.g. the Internet). Key agreement is a critical part of providing security services for group communication systems. Most of the current contributory key agreement protocols are not designed to tolerate failures and membership changes during execution. In particular, nested or cascaded group membership events (such as partitions) are not accommodated. We present the first robust contributory key agreement protocols, resilient to any sequence of events while preserving the group communication membership and ordering guarantees.


network and system security | 2013

Efficient and Private Three-Party Publish/Subscribe

Giovanni Di Crescenzo; James E. Burns; Brian A. Coan; John L. Schultz; Jonathan Stanton; Simon Tsang; Rebecca N. Wright

We consider the problem of modeling and designing publish/subscribe protocols that safeguard the privacy of clients’ subscriptions and of servers’ publications while guaranteeing efficient latency in challenging scenarios (i.e., real-time publication, high data arrival rate, etc.). As general solutions from the theory of secure function evaluation protocols would not achieve satisfactory performance in these scenarios, we enrich the model with a third party (e.g., a cloud server). Our main result is a three-party publish/subscribe protocol suitable for practical applications in such scenarios because the publication phase uses only symmetric cryptography operations (a result believed not possible without the third party). At the cost of only a very small amount of privacy loss to the third party, and with no privacy loss to the publishing server or the clients, our protocol has very small publication latency, which we measured for large parameter ranges to be just a small constant factor worse than a publish/subscribe protocol guaranteeing no privacy.


international conference on distributed computing systems | 2016

Practical Intrusion-Tolerant Networks

Daniel Obenshain; Thomas Tantillo; Amy Babay; John L. Schultz; Andrew Newell; Md. Endadul Hoque; Yair Amir; Cristina Nita-Rotaru

As the Internet becomes an important part of the infrastructure our society depends on, it is crucial to construct networks that are able to work even when part of the network is compromised. This paper presents the first practical intrusion-tolerant network service, targeting high-value applications such as monitoring and control of global clouds and management of critical infrastructure for the power grid. We use an overlay approach to leverage the existing IP infrastructure while providing the required resiliency and timeliness. Our solution overcomes malicious attacks and compromises in both the underlying network infrastructure and in the overlay itself. We deploy and evaluate the intrusion-tolerant overlay implementation on a global cloud spanning East Asia, North America, and Europe, and make it publicly available.


international conference on distributed computing systems | 2017

Structured Overlay Networks for a New Generation of Internet Services

Amy Babay; Claudiu Danilov; John Lane; Michal Miskin-Amir; Daniel Obenshain; John L. Schultz; Jonathan Stanton; Thomas Tantillo; Yair Amir

The dramatic success and scaling of the Internet was made possible by the core principle of keeping it simple in the middle and smart at the edge (or the end-to-end principle). However, new applications bring new demands, and for many emerging applications, the Internet paradigm presents limitations. For applications in this new generation of Internet services, structured overlay networks offer a powerful framework for deploying specialized protocols that can provide new capabilities beyond what the Internet natively supports by leveraging global state and in-network processing. The structured overlay concept includes three principles: A resilient network architecture, a flexible overlay node software architecture that exploits global state and unlimited programmability, and flow-based processing. We demonstrate the effectiveness of structured overlay networks in supporting todays demanding applications and propose forward-looking ideas for leveraging the framework to develop protocols that push the boundaries of what is possible in terms of performance and resilience.


military communications conference | 2012

Collaborative applications at the Tactical Edge through resilient group dissemination in DTN

Jacob William Green; John L. Schultz

Civilian and wired military networks possess a rich ecosystem of applications that depend upon communication across a relatively stable and clean network. Conversely, the extremely harsh communication environment of the Tactical Edge Network (TEN) precludes all but a few highly customized network applications from working well there. Consequently, there is a severe lack of applications for information sharing and exchange in the TEN, which often leaves war-fighters without timely access to relevant information. To expand the capabilities and applications available at the tactical edge, this paper presents a group dissemination middleware service and one possible realization of it using the Bundle Protocol (DTN). We discuss how this middleware can function as the enabling technology around which many collaborative applications can work well at the tactical edge, while capitalizing on the reuse of an immense body of COTS technology.


Archive | 2001

Dynamic-content web crawling through traffic monitoring

Jacob William Green; John L. Schultz


Archive | 2001

Relevant search rankings using high refresh-rate distributed crawling

Jacob William Green; John L. Schultz; Yair Amir; Michael T. Goodrich


Archive | 2001

High refresh-rate retrieval of freshly published content using distributed crawling

Jacob William Green; John L. Schultz; Yair Amir; Michael T. Goodrich

Collaboration


Dive into the John L. Schultz's collaboration.

Top Co-Authors

Avatar

Yair Amir

Johns Hopkins University

View shared research outputs
Top Co-Authors

Avatar

Jonathan Stanton

George Washington University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Amy Babay

Johns Hopkins University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Gene Tsudik

University of California

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

John Lane

Johns Hopkins University

View shared research outputs
Researchain Logo
Decentralizing Knowledge