Learn More
In secure group communications, users of a group share a common group key. A key server sends the group key to authorized new users as well as performs group rekeying for group users whenever the key changes. In this paper, we investigate scalability issues of reliable group rekeying, and provide a performance analysis of our group key management system(More)
Many emerging web and Internet applications are based on a group communications model. Thus, securing group communications is an important Internet design issue. The key graph approach has been proposed for group key management. Key tree and key star are two important types of key graphs. Previous work has been fo-cused on individual rekeying, i.e.,(More)
Consistency, graph algorithms, key-value stores Many key-value stores have recently been proposed as platforms for always-on, globally-distributed, Internet scale applications. To meet their needs, these stores often sacrifice consistency for availability. Yet, few tools exist that can verify the consistency actually provided by a key-value store, and(More)
Network accountability, forensic analysis, and failure diagnosis are becoming increasingly important for network management and security. Such capabilities often utilize <i>network provenance</i> - the ability to issue queries over network meta-data. For example, network provenance may be used to trace the path a message traverses on the network as well as(More)
Glutathione (GSH) plays a pivotal role in heavy metal detoxification. Ethylene is one of the important plant hormones, which plays a critical role in triggering plant responses to different stresses such as cadmium (Cd) stress. Ethylene responsive transcription factor (ERF) belongs to one of the largest plant transcription factor families. ERF is known to(More)
—Large scale storage systems require multi-disk fault tolerant erasure codes. Replication and RAID extensions that protect against two-and three-disk failures offer a stark tradeoff between how much data must be stored, and how much data must be read to recover a failed disk. Flat XOR-codes—erasure codes in which parity disks are calculated as the XOR of(More)
Motivated by the increasing popularity of eventually consistent key-value stores as a commercial service, we address two important problems related to the consistency properties in a history of operations on a read/write register (i.e., the start time, finish time, argument, and response of every operation). First, we consider how to detect a consistency(More)