On cloud security requirements, threats, vulnerabilities and countermeasures: A survey

R Kumar, R Goyal - Computer Science Review, 2019 - Elsevier
The world is witnessing a phenomenal growth in the cloud enabled services and is expected
to grow further with the improved technological innovations. However, the associated …

A survey of role mining

B Mitra, S Sural, J Vaidya, V Atluri - ACM Computing Surveys (CSUR), 2016 - dl.acm.org
Role-Based Access Control (RBAC) is the most widely used model for advanced access
control deployed in diverse enterprises of all sizes. RBAC critically depends on defining …

BEAT: Asynchronous BFT made practical

S Duan, MK Reiter, H Zhang - Proceedings of the 2018 ACM SIGSAC …, 2018 - dl.acm.org
We present BEAT, a set of practical Byzantine fault-tolerant (BFT) protocols for completely
asynchronous environments. BEAT is flexible, versatile, and extensible, consisting of five …

Erasure coding in windows azure storage

C Huang, H Simitci, Y Xu, A Ogus, B Calder… - 2012 USENIX Annual …, 2012 - usenix.org
Windows Azure Storage (WAS) is a cloud storage system that provides customers the ability
to store seemingly limitless amounts of data for any duration of time. WAS customers have …

A" hitchhiker's" guide to fast and efficient data reconstruction in erasure-coded data centers

KV Rashmi, NB Shah, D Gu, H Kuang… - Proceedings of the …, 2014 - dl.acm.org
Erasure codes such as Reed-Solomon (RS) codes are being extensively deployed in data
centers since they offer significantly higher reliability than data replication methods at much …

Erasure coding for distributed storage: An overview

SB Balaji, MN Krishnan, M Vajha, V Ramkumar… - Science China …, 2018 - Springer
In a distributed storage system, code symbols are dispersed across space in nodes or
storage units as opposed to time. In settings such as that of a large data center, an important …

A survey on resiliency techniques in cloud computing infrastructures and applications

C Colman-Meixner, C Develder… - … Surveys & Tutorials, 2016 - ieeexplore.ieee.org
Today's businesses increasingly rely on cloud computing, which brings both great
opportunities and challenges. One of the critical challenges is resiliency: disruptions due to …

An optimal algorithm for intersecting line segments in the plane

B Chazelle, H Edelsbrunner - Journal of the ACM (JACM), 1992 - dl.acm.org
The main contribution of this work is an O (n log n+ k)-time algorithm for computing all k
intersections among n line segments in the plane. This time complexity is easily shown to be …

Codes with local regeneration and erasure correction

GM Kamath, N Prakash, V Lalitha… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Regenerating codes and codes with locality are two coding schemes that have recently
been proposed, which in addition to ensuring data collection and reliability, also enable …

[PDF][PDF] Screaming fast Galois field arithmetic using intel SIMD instructions.

JS Plank, KM Greenan, EL Miller - FAST, 2013 - usenix.org
Internet Backplane Protocol API and Applications Page 1 Screaming Fast Galois Field Arithmetic
Using Intel SIMD Instructions James S. Plank University of Tennessee USENIX FAST San …