Confidant: Protecting OSN Data without Locking It Up
暂无分享,去创建一个
Ramón Cáceres | Alexander Varshavsky | Landon P. Cox | Amre Shakimov | Dongtao Liu | R. Cáceres | A. Varshavsky | Dongtao Liu | Amre Shakimov
[1] Catherine C. Marshall,et al. Cimbiosys: a platform for content-based partial replication , 2009, NSDI 2009.
[2] Bobby Bhattacharjee,et al. Persona: an online social network with user-defined privacy , 2009, SIGCOMM '09.
[3] Sanjay Ghemawat,et al. MapReduce: Simplified Data Processing on Large Clusters , 2004, OSDI.
[4] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[5] Ninghui Li,et al. Towards practical automated trust negotiation , 2002, Proceedings Third International Workshop on Policies for Distributed Systems and Networks.
[6] Ben Y. Zhao,et al. User interactions in social networks and their implications , 2009, EuroSys '09.
[7] H. V. Jagadish,et al. PrivatePond: Outsourced Management of Web Corpuses , 2009, WebDB.
[8] Krishna P. Gummadi,et al. On the evolution of user interaction in Facebook , 2009, WOSN '09.
[9] Elaine Shi,et al. Multi-Dimensional Range Query over Encrypted Data , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[10] Marvin Theimer,et al. Feasibility of a serverless distributed file system deployed on an existing set of desktop PCs , 2000, SIGMETRICS '00.
[11] Marvin Theimer,et al. Managing update conflicts in Bayou, a weakly connected replicated storage system , 1995, SOSP.
[12] Ben Y. Zhao,et al. Preserving privacy in location-based mobile social applications , 2010, HotMobile '10.
[13] Richard A. Golding. A Weak-Consistency Architecture for Distributed Information Services , 1992, Comput. Syst..
[14] Eric Gilbert,et al. Predicting tie strength with social media , 2009, CHI.
[15] Butler W. Lampson,et al. Hints for Computer System Design , 1983, IEEE Software.
[16] Mahadev Satyanarayanan,et al. An Empirical Study of a Highly Available File System , 1994, SIGMETRICS.
[17] Jinyang Li,et al. Friendstore: cooperative online backup using trusted nodes , 2008, SocialNets '08.
[18] Pablo Rodriguez,et al. The little engine(s) that could: scaling online social networks , 2010, SIGCOMM '10.
[19] Krishna P. Gummadi,et al. Measuring and analyzing the characteristics of Napster and Gnutella hosts , 2003, Multimedia Systems.
[20] Ted Wobber,et al. Policy-based access control for weakly consistent replication , 2010, EuroSys '10.
[21] Hawoong Jeong,et al. Comparison of online social relations in volume vs interaction: a case study of cyworld , 2008, IMC '08.
[22] Alec Wolman,et al. Lockr: better privacy for social networks , 2009, CoNEXT '09.
[23] Ben Y. Zhao,et al. Measurement-calibrated graph models for social network experiments , 2010, WWW '10.