Trustworthy Distributed Computing on Social Networks
暂无分享,去创建一个
[1] Chenyu Wang,et al. Exploring MapReduce efficiency with highly-distributed data , 2011, MapReduce '11.
[2] Nicholas Hopper,et al. Membership-concealing overlay networks , 2009, CCS.
[3] Aziz Mohaisen,et al. Trustworthy Distributed Computing on Social Networks , 2013, IEEE Transactions on Services Computing.
[4] Kyle Chard,et al. Social Cloud: Cloud Computing in Social Networks , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.
[5] Christian Haas,et al. Engineering Incentives in Social Clouds , 2011, 2011 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing.
[6] Mads Haahr,et al. Social network analysis for routing in disconnected delay-tolerant MANETs , 2007, MobiHoc '07.
[7] Aziz Mohaisen,et al. Dynamix: anonymity on dynamic social structures , 2013, ASIA CCS '13.
[8] Prateek Mittal,et al. Pisces: Anonymous Communication Using Social Networks , 2013, NDSS.
[9] Marios D. Dikaiakos,et al. Cloud Computing: Distributed Internet Computing for IT and Scientific Research , 2009, IEEE Internet Computing.
[10] Bart Selman,et al. Referral Web: combining social networks and collaborative filtering , 1997, CACM.
[11] Lizhe Wang,et al. Scientific Cloud Computing: Early Definition and Experience , 2008, 2008 10th IEEE International Conference on High Performance Computing and Communications.
[12] Luiz André Barroso,et al. The Case for Energy-Proportional Computing , 2007, Computer.
[13] Greg Bigwood,et al. Social DTN routing , 2008, CoNEXT '08.
[14] Shouhuai Xu,et al. Exploiting social networks for threshold signing: attack-resilience vs. availability , 2008, ASIACCS '08.
[15] Feng Wang,et al. Measurement and utilization of customer-provided resources for cloud computing , 2012, 2012 Proceedings IEEE INFOCOM.
[16] Shishir Nagaraja,et al. Anonymity in the Wild: Mixes on Unstructured Networks , 2007, Privacy Enhancing Technologies.
[17] Abhishek Chandra,et al. Nebulas: Using Distributed Voluntary Resources to Build Clouds , 2009, HotCloud.
[18] Kyle Chard,et al. A Social Cloud for Public eResearch , 2011, 2011 IEEE Seventh International Conference on eScience.
[19] K. J. Ray Liu,et al. Incentive Cooperation Strategies for Peer-to-Peer Live Multimedia Streaming Social Networks , 2009, IEEE Transactions on Multimedia.
[20] Sanjay Ghemawat,et al. MapReduce: a flexible data processing tool , 2010, CACM.
[21] Aziz Mohaisen,et al. On the mixing time of directed social graphs and security implications , 2012, ASIACCS '12.
[22] Aziz Mohaisen,et al. Measuring the mixing time of social graphs , 2010, IMC '10.
[23] Miron Livny,et al. Condor-a hunter of idle workstations , 1988, [1988] Proceedings. The 8th International Conference on Distributed.
[24] Wenjun Wu,et al. Open Social Based Collaborative Science Gateways , 2011, 2011 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing.
[25] Kyle Chard,et al. Social Cloud Computing: A Vision for Socially Motivated Resource Sharing , 2012, IEEE Transactions on Services Computing.
[26] Gaetano Borriello,et al. Next century challenges: data-centric networking for invisible computing: the Portolano project at the University of Washington , 1999, MobiCom.
[27] Tharam S. Dillon,et al. Cloud Computing: Issues and Challenges , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.
[28] Yong Zhao,et al. Cloud Computing and Grid Computing 360-Degree Compared , 2008, GCE 2008.
[29] Kyle Chard,et al. Collaborative eResearch in a Social Cloud , 2011, 2011 IEEE Seventh International Conference on eScience.
[30] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[31] Jinyang Li,et al. Friendstore: cooperative online backup using trusted nodes , 2008, SocialNets '08.
[32] Wu-chun Feng,et al. MOON: MapReduce On Opportunistic eNvironments , 2010, HPDC '10.
[33] David P. Anderson,et al. SETI@home: an experiment in public-resource computing , 2002, CACM.
[34] Aziz Mohaisen,et al. Keep your friends close: Incorporating trust into social network-based Sybil defenses , 2011, 2011 Proceedings IEEE INFOCOM.
[35] Dawn Xiaodong Song,et al. Preserving Link Privacy in Social Network Based Systems , 2012, NDSS.
[36] Krishna P. Gummadi,et al. Canal: scaling social network-based Sybil tolerance schemes , 2012, EuroSys '12.
[37] Aziz Mohaisen,et al. Secure Encounter-Based Mobile Social Networks: Requirements, Designs, and Tradeoffs , 2013, IEEE Transactions on Dependable and Secure Computing.
[38] Christian Haas,et al. Foundations of Trust: Contextualising Trust in Social Clouds , 2012, 2012 Second International Conference on Cloud and Green Computing.
[39] Jiye Yu,et al. iLink: search and routing in social networks , 2007, KDD '07.
[40] George Danezis,et al. SybilInfer: Detecting Sybil Nodes using Social Networks , 2009, NDSS.
[41] Prateek Mittal,et al. X-Vine: Secure and Pseudonymous Routing Using Social Networks , 2011, ArXiv.
[42] Abhishek Chandra,et al. Early experience with the distributed nebula cloud , 2011, DIDC '11.
[43] Leyla Bilge,et al. All your contacts are belong to us: automated identity theft attacks on social networks , 2009, WWW '09.
[44] Muthucumaru Maheswaran,et al. Towards Trust-Aware Resource Management in Grid Computing Systems , 2002, 2nd IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID'02).
[45] Ravi Sundaram,et al. WebCloud: Recruiting Social Network Users to Assist in Content Distribution , 2012, 2012 IEEE 11th International Symposium on Network Computing and Applications.
[46] Michael Kaminsky,et al. SybilGuard: defending against sybil attacks via social networks , 2008, TNET.
[47] Daniel S. Katz,et al. A Social Content Delivery Network for Scientific Cooperation: Vision, Design, and Architecture , 2012, 2012 SC Companion: High Performance Computing, Networking Storage and Analysis.
[48] Michael Kaminsky,et al. SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, S&P 2008.