scispace - formally typeset
Search or ask a question
Institution

University of Texas at Austin

EducationAustin, Texas, United States
About: University of Texas at Austin is a education organization based out in Austin, Texas, United States. It is known for research contribution in the topics: Population & Poison control. The organization has 94352 authors who have published 206297 publications receiving 9070052 citations. The organization is also known as: UT-Austin & UT Austin.


Papers
More filters
Journal ArticleDOI
TL;DR: It is shown that the group key management service, using any of the three rekeying strategies, is scalable to large groups with frequent joins and leaves, and the average measured processing time per join/leave increases linearly with the logarithm of group size.
Abstract: Many emerging network applications are based upon a group communications model. As a result, securing group communications, i.e., providing confidentiality, authenticity, and integrity of messages delivered between group members, will become a critical networking issue. We present, in this paper, a novel solution to the scalability problem of group/multicast key management. We formalize the notion of a secure group as a triple (U,K,R) where U denotes a set of users, K a set of keys held by the users, and R a user-key relation. We then introduce key graphs to specify secure groups. For a special class of key graphs, we present three strategies for securely distributing rekey messages after a join/leave and specify protocols for joining and leaving a secure group. The rekeying strategies and join/leave protocols are implemented in a prototype key server we have built. We present measurement results from experiments and discuss performance comparisons. We show that our group key management service, using any of the three rekeying strategies, is scalable to large groups with frequent joins and leaves. In particular, the average measured processing time per join/leave increases linearly with the logarithm of group size.

1,376 citations

Journal ArticleDOI
TL;DR: In this article, the authors conceptualize a construct of the CRM process and its dimensions, operationalize and validate the construct, and empirically investigate the organizational performance consequences of implementing CRM processes.
Abstract: An understanding of how to manage relationships with customers effectively has become an important topic for both academicians and practitioners in recent years. However, the existing academic literature and the practical applications of customer relationship management (CRM) strategies do not provide a clear indication of what specifically constitutes CRM processes. In this study, the authors (1) conceptualize a construct of the CRM process and its dimensions, (2) operationalize and validate the construct, and (3) empirically investigate the organizational performance consequences of implementing CRM processes. Their research questions are addressed in two cross-sectional studies across four different industries and three countries. The first key outcome is a theoretically sound CRM process measure that outlines three key stages: initiation, maintenance, and termination. The second key result is that the implementation of CRM processes has a moderately positive association with both perceptual a...

1,375 citations

Book ChapterDOI
30 May 2010
TL;DR: In this article, a fully secure attribute-based encryption (ABE) scheme and a predicate encryption (PE) scheme for inner-product predicates were constructed using dual pairing vector spaces.
Abstract: We present two fully secure functional encryption schemes: a fully secure attribute-based encryption (ABE) scheme and a fully secure (attribute-hiding) predicate encryption (PE) scheme for inner-product predicates. In both cases, previous constructions were only proven to be selectively secure. Both results use novel strategies to adapt the dual system encryption methodology introduced by Waters. We construct our ABE scheme in composite order bilinear groups, and prove its security from three static assumptions. Our ABE scheme supports arbitrary monotone access formulas. Our predicate encryption scheme is constructed via a new approach on bilinear pairings using the notion of dual pairing vector spaces proposed by Okamoto and Takashima.

1,363 citations

Proceedings ArticleDOI
17 May 2009
TL;DR: A framework for analyzing privacy and anonymity in social networks is presented and a new re-identification algorithm targeting anonymized social-network graphs is developed, showing that a third of the users who can be verified to have accounts on both Twitter and Flickr can be re-identified in the anonymous Twitter graph.
Abstract: Operators of online social networks are increasingly sharing potentially sensitive information about users and their relationships with advertisers, application developers, and data-mining researchers. Privacy is typically protected by anonymization, i.e., removing names, addresses, etc.We present a framework for analyzing privacy and anonymity in social networks and develop a new re-identification algorithm targeting anonymized social-network graphs. To demonstrate its effectiveness on real-world networks, we show that a third of the users who can be verified to have accounts on both Twitter, a popular microblogging service, and Flickr, an online photo-sharing site, can be re-identified in the anonymous Twitter graph with only a 12% error rate.Our de-anonymization algorithm is based purely on the network topology, does not require creation of a large number of dummy "sybil" nodes, is robust to noise and all existing defenses, and works even when the overlap between the target network and the adversary's auxiliary information is small.

1,360 citations

Journal ArticleDOI
22 Jun 2018-Science
TL;DR: It is demonstrated that, in the general population, the personality trait neuroticism is significantly correlated with almost every psychiatric disorder and migraine, and it is shown that both psychiatric and neurological disorders have robust correlations with cognitive and personality measures.
Abstract: Disorders of the brain can exhibit considerable epidemiological comorbidity and often share symptoms, provoking debate about their etiologic overlap. We quantified the genetic sharing of 25 brain disorders from genome-wide association studies of 265,218 patients and 784,643 control participants and assessed their relationship to 17 phenotypes from 1,191,588 individuals. Psychiatric disorders share common variant risk, whereas neurological disorders appear more distinct from one another and from the psychiatric disorders. We also identified significant sharing between disorders and a number of brain phenotypes, including cognitive measures. Further, we conducted simulations to explore how statistical power, diagnostic misclassification, and phenotypic heterogeneity affect genetic correlations. These results highlight the importance of common genetic variation as a risk factor for brain disorders and the value of heritability-based methods in understanding their etiology.

1,357 citations


Authors

Showing all 95138 results

NameH-indexPapersCitations
George M. Whitesides2401739269833
Eugene Braunwald2301711264576
Yi Chen2174342293080
Robert J. Lefkowitz214860147995
Joseph L. Goldstein207556149527
Eric N. Olson206814144586
Hagop M. Kantarjian2043708210208
Rakesh K. Jain2001467177727
Francis S. Collins196743250787
Gordon B. Mills1871273186451
Scott M. Grundy187841231821
Michael S. Brown185422123723
Eric Boerwinkle1831321170971
Aaron R. Folsom1811118134044
Jiaguo Yu178730113300
Network Information
Related Institutions (5)
Stanford University
320.3K papers, 21.8M citations

97% related

Columbia University
224K papers, 12.8M citations

96% related

University of California, San Diego
204.5K papers, 12.3M citations

96% related

University of Michigan
342.3K papers, 17.6M citations

96% related

University of Washington
305.5K papers, 17.7M citations

95% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
2023304
20221,210
202110,141
202010,331
20199,727
20188,973