John Schultz

Learn More
The Spread toolkit is a group communication system available from Spread provides a range of reliability, ordering and stability guarantees for message delivery. Spread supports a rich fault model that includes process crashes and recoveries and network partitions and merges under the extended virtual synchrony semantics. The standard(More)
Due to the high priority of cyber-security education, the United States Naval Academy rapidly developed and implemented a new cyber-security course that is required for all of its first-year students. During the fall semester in 2011, half of the incoming class (about 600 students) took the course through a total of 31 sections offered by 16 instructors(More)
  • Nanyi Bi, Jeremy Birnholtz, Susan Fussell, Allie Miller, Patrice Lawless, Ben Jacoby +3 others
  • 2014
Awareness information, information about others' presence and activities that allows us to determine their availability for conversation, plays an important role in workplace communication, as people often gather and act on it in the process of negotiating mutual availability. This paper presents a laboratory experiment examining how gathering awareness(More)
Cyber security is an area where much curriculum development is taking place, and it is important that such efforts be shared. In this work we describe three lab exercises developed at the United States Naval Academy for use in our fundamentals of cyber-security course, a course required of all freshmen. The hands-on lab activities reinforce ideas presented(More)
Cloud computing is a new computing paradigm that offers immense cost benefits. As a result, a wide variety of services, including critical infrastructure, are migrating to the cloud. The problem of ensuring that cloud networking continues to operate correctly under all circumstances becomes important; downtime in cloud network communication equals downtime(More)
In spring 2011, the United States Naval Academy decided that, beginning in fall 2011, all first-year students would be required to take an introductory core course in the technical foundations of cyber security. This decision triggered our attempt to set an "academic world-record" for the development and implementation of a unique core course in six months(More)
  • Claudiu Danilov, Ryan R Sean Borgstrom, Jacob Caudy, Yan Green, Mike Gu, Dave Hils-Dale +20 others
  • 2004
Overlay networks create virtual topologies on top of the existing networking infrastructure and come as a middle layer between end-user applications and the basic network services. The main reasons of using an intermediate level of communication are the new service functionality and the improved performance offered by application specific protocols that can(More)
Secure group communication is crucial for building distributed applications that work in dynamic environments and communicate over unsecured networks (e.g. the Internet). Key agreement is a critical part of providing security services for group communication systems. Most of the current contributory key agreement protocols are not designed to tolerate(More)
  • 1