John L. Schultz
Johns Hopkins University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by John L. Schultz.
IEEE Transactions on Parallel and Distributed Systems | 2004
Yair Amir; Yongdae Kim; Cristina Nita-Rotaru; John L. Schultz; Jonathan Stanton; Gene Tsudik
Contributory group key agreement protocols generate group keys based on contributions of all group members. Particularly appropriate for relatively small collaborative peer groups, these protocols are resilient to many types of attacks. Unlike most group key distribution protocols, contributory group key agreement protocols offer strong security properties such as key independence and perfect forward secrecy. We present the first robust contributory key agreement protocol resilient to any sequence of group changes. The protocol, based on the Group Diffie-Hellman contributory key agreement, uses the services of a group communication system supporting virtual synchrony semantics. We prove that it provides both virtual synchrony and the security properties of Group Diffie-Hellman, in the presence of any sequence of (potentially cascading) node failures, recoveries, network partitions, and heals. We implemented a secure group communication service, Secure Spread, based on our robust key agreement protocol and Spread group communication system. To illustrate its practicality, we compare the costs of establishing a secure group with the proposed protocol and a protocol based on centralized group key management, adapted to offer equivalent security properties.
international conference on distributed computing systems | 2000
Yair Amir; Giuseppe Ateniese; Damian Hasse; Yongdae Kim; Cristina Nita-Rotaru; Theo Schlossnagle; John L. Schultz; Jonathan Stanton; Gene Tsudik
The increasing popularity and diversity of collaborative applications prompts a need for highly secure and reliable communication platforms for dynamic peer groups. Security mechanisms for such groups tend to be both expensive and complex and their integration with reliable group communication services presents a formidable challenge, This paper discusses some important integration issues, reports on our implementation experience and provides experimental results. Our approach utilizes distributed group key management developed by the Cliques project. We enhance it to handle processor and network faults (under a fail-stop or crash-and-recover model) and asynchronous membership events (such as joins, leaves, merges and network partitions). Our approach leverages the strong properties provided by the Spread group communication system, such as message ordering, clean failure semantics and a membership service. The result of this work is a secure group communications layer and an API that provide the application programmer with both standard group communication services and flexible security services.
international conference on distributed computing systems | 2001
Yair Amir; Yongdae Kim; Cristina Nita-Rotaru; John L. Schultz; Jonathan Stanton; Gene Tsudik
Secure group communication is crucial for building distributed applications that work in dynamic environments and communicate over unsecured networks (e.g. the Internet). Key agreement is a critical part of providing security services for group communication systems. Most of the current contributory key agreement protocols are not designed to tolerate failures and membership changes during execution. In particular, nested or cascaded group membership events (such as partitions) are not accommodated. We present the first robust contributory key agreement protocols, resilient to any sequence of events while preserving the group communication membership and ordering guarantees.
network and system security | 2013
Giovanni Di Crescenzo; James E. Burns; Brian A. Coan; John L. Schultz; Jonathan Stanton; Simon Tsang; Rebecca N. Wright
We consider the problem of modeling and designing publish/subscribe protocols that safeguard the privacy of clients’ subscriptions and of servers’ publications while guaranteeing efficient latency in challenging scenarios (i.e., real-time publication, high data arrival rate, etc.). As general solutions from the theory of secure function evaluation protocols would not achieve satisfactory performance in these scenarios, we enrich the model with a third party (e.g., a cloud server). Our main result is a three-party publish/subscribe protocol suitable for practical applications in such scenarios because the publication phase uses only symmetric cryptography operations (a result believed not possible without the third party). At the cost of only a very small amount of privacy loss to the third party, and with no privacy loss to the publishing server or the clients, our protocol has very small publication latency, which we measured for large parameter ranges to be just a small constant factor worse than a publish/subscribe protocol guaranteeing no privacy.
international conference on distributed computing systems | 2016
Daniel Obenshain; Thomas Tantillo; Amy Babay; John L. Schultz; Andrew Newell; Md. Endadul Hoque; Yair Amir; Cristina Nita-Rotaru
As the Internet becomes an important part of the infrastructure our society depends on, it is crucial to construct networks that are able to work even when part of the network is compromised. This paper presents the first practical intrusion-tolerant network service, targeting high-value applications such as monitoring and control of global clouds and management of critical infrastructure for the power grid. We use an overlay approach to leverage the existing IP infrastructure while providing the required resiliency and timeliness. Our solution overcomes malicious attacks and compromises in both the underlying network infrastructure and in the overlay itself. We deploy and evaluate the intrusion-tolerant overlay implementation on a global cloud spanning East Asia, North America, and Europe, and make it publicly available.
international conference on distributed computing systems | 2017
Amy Babay; Claudiu Danilov; John Lane; Michal Miskin-Amir; Daniel Obenshain; John L. Schultz; Jonathan Stanton; Thomas Tantillo; Yair Amir
The dramatic success and scaling of the Internet was made possible by the core principle of keeping it simple in the middle and smart at the edge (or the end-to-end principle). However, new applications bring new demands, and for many emerging applications, the Internet paradigm presents limitations. For applications in this new generation of Internet services, structured overlay networks offer a powerful framework for deploying specialized protocols that can provide new capabilities beyond what the Internet natively supports by leveraging global state and in-network processing. The structured overlay concept includes three principles: A resilient network architecture, a flexible overlay node software architecture that exploits global state and unlimited programmability, and flow-based processing. We demonstrate the effectiveness of structured overlay networks in supporting todays demanding applications and propose forward-looking ideas for leveraging the framework to develop protocols that push the boundaries of what is possible in terms of performance and resilience.
military communications conference | 2012
Jacob William Green; John L. Schultz
Civilian and wired military networks possess a rich ecosystem of applications that depend upon communication across a relatively stable and clean network. Conversely, the extremely harsh communication environment of the Tactical Edge Network (TEN) precludes all but a few highly customized network applications from working well there. Consequently, there is a severe lack of applications for information sharing and exchange in the TEN, which often leaves war-fighters without timely access to relevant information. To expand the capabilities and applications available at the tactical edge, this paper presents a group dissemination middleware service and one possible realization of it using the Bundle Protocol (DTN). We discuss how this middleware can function as the enabling technology around which many collaborative applications can work well at the tactical edge, while capitalizing on the reuse of an immense body of COTS technology.
Archive | 2001
Jacob William Green; John L. Schultz
Archive | 2001
Jacob William Green; John L. Schultz; Yair Amir; Michael T. Goodrich
Archive | 2001
Jacob William Green; John L. Schultz; Yair Amir; Michael T. Goodrich