A survey of role mining

B Mitra, S Sural, J Vaidya, V Atluri - ACM Computing Surveys (CSUR), 2016 - dl.acm.org
Role-Based Access Control (RBAC) is the most widely used model for advanced access
control deployed in diverse enterprises of all sizes. RBAC critically depends on defining …

Erasure coding for distributed storage: An overview

SB Balaji, MN Krishnan, M Vajha, V Ramkumar… - Science China …, 2018 - Springer
In a distributed storage system, code symbols are dispersed across space in nodes or
storage units as opposed to time. In settings such as that of a large data center, an important …

Pocket: Elastic ephemeral storage for serverless analytics

A Klimovic, Y Wang, P Stuedi, A Trivedi… - … USENIX Symposium on …, 2018 - usenix.org
Serverless computing is becoming increasingly popular, enabling users to quickly launch
thousands of shortlived tasks in the cloud with high elasticity and fine-grain billing. These …

Speeding up distributed machine learning using codes

K Lee, M Lam, R Pedarsani… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
Codes are widely used in many engineering applications to offer robustness against noise.
In large-scale systems, there are several types of noise that can affect the performance of …

BEAT: Asynchronous BFT made practical

S Duan, MK Reiter, H Zhang - Proceedings of the 2018 ACM SIGSAC …, 2018 - dl.acm.org
We present BEAT, a set of practical Byzantine fault-tolerant (BFT) protocols for completely
asynchronous environments. BEAT is flexible, versatile, and extensible, consisting of five …

f4: Facebook's warm {BLOB} storage system

S Muralidhar, W Lloyd, S Roy, C Hill, E Lin… - … USENIX Symposium on …, 2014 - usenix.org
Facebook's corpus of photos, videos, and other Binary Large OBjects (BLOBs) that need to
be reliably stored and quickly accessible is massive and continues to grow. As the footprint …

Locally repairable codes

DS Papailiopoulos, AG Dimakis - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Distributed storage systems for large-scale applications typically use replication for
reliability. Recently, erasure codes were used to reduce the large storage overhead, while …

Locality and availability in distributed storage

AS Rawat, DS Papailiopoulos… - IEEE Transactions …, 2016 - ieeexplore.ieee.org
This paper studies the problem of information symbol availability in codes: we refer to a
systematic code as code with (r, t)-availability if every information (systematic) symbol can be …

{EC-Cache}:{Load-Balanced},{Low-Latency} Cluster Caching with Online Erasure Coding

KV Rashmi, M Chowdhury, J Kosaian, I Stoica… - … USENIX Symposium on …, 2016 - usenix.org
Data-intensive clusters and object stores are increasingly relying on in-memory object
caching to meet the I/O performance demands. These systems routinely face the challenges …

Repairing reed-solomon codes

V Guruswami, M Wootters - Proceedings of the forty-eighth annual ACM …, 2016 - dl.acm.org
A fundamental fact about polynomial interpolation is that k evaluations of a degree-(k-1)
polynomial f are sufficient to determine f. This is also necessary in a strong sense: given k-1 …