The Good Left Undone: Advances and Challenges in Decentralizing Online Social Networks
暂无分享,去创建一个
Jun Li | Xiaoming Fu | Jun Yu Li | David Koll | Xiaoming Fu | David Koll
[1] Berkant Barla Cambazoglu,et al. Impact of response latency on user behavior in web search , 2014, SIGIR.
[2] Gurhan Gunduz,et al. POSN: A Personal Online Social Network , 2015, SEC.
[3] Cécile Paris,et al. A survey of trust in social networks , 2013, CSUR.
[4] Ben Y. Zhao,et al. Uncovering social network sybils in the wild , 2011, IMC '11.
[5] Frank Stajano,et al. Privacy-enabling social networking over untrusted networks , 2009, WOSN '09.
[6] Ralf Steinmetz,et al. LifeSocial.KOM: A secure and P2P-based solution for online social networks , 2011, 2011 IEEE Consumer Communications and Networking Conference (CCNC).
[7] Antony I. T. Rowstron,et al. Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.
[8] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[9] Catherine Dwyer. Privacy in the Age of Google and Facebook , 2011, IEEE Technology and Society Magazine.
[10] Jun Li,et al. On the state of OSN-based Sybil defenses , 2014, 2014 IFIP Networking Conference.
[11] Sudheendra Hangal,et al. PrPl: a decentralized social networking infrastructure , 2010, MCS '10.
[12] Bobby Bhattacharjee,et al. Persona: an online social network with user-defined privacy , 2009, SIGCOMM '09.
[13] Stefan Katzenbeisser,et al. ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation , 2014, SOFSEM.
[14] Refik Molva,et al. Safebook: A privacy-preserving online social network leveraging on real-life trust , 2009, IEEE Communications Magazine.
[15] Mahesh Balakrishnan,et al. Contrail: Enabling Decentralized Social Networks on Smartphones , 2011, Middleware.
[16] Virgílio A. F. Almeida,et al. Characterizing user behavior in online social networks , 2009, IMC '09.
[17] Drummond Reed,et al. OpenID 2.0: a platform for user-centric identity management , 2006, DIM '06.
[18] László Gyarmati,et al. Measuring user behavior in online social networks , 2010, IEEE Network.
[19] Shivakant Mishra,et al. Results from a Practical Deployment of the MyZone Decentralized P2P Social Network , 2013, ArXiv.
[20] Fiona Fui-Hoon Nah,et al. A study on tolerable waiting time: how long are Web users willing to wait? , 2004, AMCIS.
[21] Rajesh Sharma,et al. SuperNova: Super-peers based architecture for decentralized online social networks , 2011, 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012).
[22] Antony I. T. Rowstron,et al. PAST: a large-scale, persistent peer-to-peer storage utility , 2001, Proceedings Eighth Workshop on Hot Topics in Operating Systems.
[23] Jin H. Im,et al. Privacy , 2002, Encyclopedia of Information Systems.
[24] Krzysztof Rzadca,et al. Replica Placement in P2P Storage: Complexity and Game Theoretic Analyses , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.
[25] Jinyang Li,et al. Friendstore: cooperative online backup using trusted nodes , 2008, SocialNets '08.
[26] Keith W. Ross,et al. "On the internet, nobody knows you're a dog": a twitter case study of anonymity in social networks , 2014, COSN '14.
[27] Prateek Mittal,et al. DECENT: A decentralized architecture for enforcing privacy in online social networks , 2011, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops.
[28] Laura Ricci,et al. DiDuSoNet: A P2P architecture for distributed Dunbar-based social networks , 2016, Peer-to-Peer Netw. Appl..
[29] Paul Anderson,et al. Prometheus: User-Controlled P2P Social Data Management for Socially-Aware Applications , 2010, Middleware.
[30] J. Dijck. The Culture of Connectivity: A Critical History of Social Media , 2013 .
[31] Athanasios V. Vasilakos,et al. Understanding user behavior in online social networks: a survey , 2013, IEEE Communications Magazine.
[32] Krishna P. Gummadi,et al. Sharing social content from home: a measurement-driven feasibility study , 2011, NOSSDAV.
[33] Ramón Cáceres,et al. Vis-à-Vis: Privacy-preserving online social networking via Virtual Individual Servers , 2011, 2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011).
[34] Eyal Kushilevitz,et al. Private information retrieval , 1998, JACM.
[35] Mark Agius,et al. An update on: meta-analysis of medical and non-medicaltreatments of the prodromal phase of psychotic illness in at risk mental states. , 2016, Psychiatria Danubina.
[36] Mahesh Balakrishnan,et al. Contrail: Decentralized and Privacy-Preserving Social Networks on Smartphones , 2014, IEEE Internet Computing.
[37] Balachander Krishnamurthy,et al. Characterizing privacy in online social networks , 2008, WOSN '08.
[38] Krishna P. Gummadi,et al. Measurement and analysis of online social networks , 2007, IMC '07.
[39] Xiaoming Fu,et al. Gemstone: Empowering Decentralized Social Networking with High Data Availability , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[40] Krzysztof Rzadca,et al. Flexible replica placement for optimized P2P backup on heterogeneous, unreliable machines , 2016, Concurr. Comput. Pract. Exp..
[41] Thorsten Strufe,et al. Exploring decentralization dimensions of social networking services: adversaries and availability , 2012, HotSocial '12.
[42] Ramón Cáceres,et al. Confidant: Protecting OSN Data without Locking It Up , 2011, Middleware.
[43] Thorsten Strufe,et al. A survey on decentralized Online Social Networks , 2014, Comput. Networks.
[44] Ben Y. Zhao,et al. User interactions in social networks and their implications , 2009, EuroSys '09.
[45] Jon Crowcroft,et al. Internet on the move: challenges and solutions , 2013, CCRV.
[46] Zhenyu Zhou,et al. A View from the Other Side: Understanding Mobile Phone Characteristics in the Developing World , 2016, Internet Measurement Conference.
[47] Thorsten Strufe,et al. The User Behavior in Facebook and its Development from 2009 until 2014 , 2015, ArXiv.
[48] Shihabur Rahman Chowdhury,et al. A taxonomy of decentralized online social networks , 2015, Peer-to-Peer Netw. Appl..
[49] Sonja Buchegger,et al. A case for P2P infrastructure for social networks - opportunities & challenges , 2009, 2009 Sixth International Conference on Wireless On-Demand Network Systems and Services.
[50] Mike Nicholls,et al. On the internet , 2004, Biological Psychiatry.
[51] Krzysztof Rzadca,et al. Game-Theoretic Mechanisms to Increase Data Availability in Decentralized Storage Systems , 2015, ACM Trans. Auton. Adapt. Syst..
[52] Krzysztof Rzadca,et al. Decentralized Online Social Networks , 2010, Handbook of Social Network Technologies.
[53] Nikita Borisov,et al. Cachet: a decentralized architecture for privacy preserving social networking with caching , 2012, CoNEXT '12.
[54] Ramón Cáceres,et al. Privacy, cost, and availability tradeoffs in decentralized OSNs , 2009, WOSN '09.
[55] Thomas Paul. Mitigating adverse effects of using online social networks = Verminderung negativer Effekte bei der Nutzung von Online SocialNetworks , 2015 .
[56] Jun Li,et al. SOUP: an online social network by the people, for the people , 2014, SIGCOMM.
[57] Ben Y. Zhao,et al. Beyond Social Graphs: User Interactions in Online Social Networks and their Implications , 2012, TWEB.
[58] Sonja Buchegger,et al. PeerSoN: P2P social networking: early experiences and insights , 2009, SNS '09.