MyNet: A Platform for Secure P2P Personal and Social Networking Services
暂无分享,去创建一个
Max Van Kleek | Zoe Antoniou | Jacob Strauss | Franklin Reynolds | Dimitris N. Kalofonos | Paul Wisner
[1] Avishai Wool,et al. Firmato: A novel firewall management toolkit , 2004, TOCS.
[2] Z. Antoniou,et al. Intuitive Mobile User Interaction in Smart Spaces via NFC-Enhanced Devices , 2007, 2007 Third International Conference on Wireless and Mobile Communications (ICWMC'07).
[4] Andrew D. Miller,et al. Give and take: a study of consumer photo-sharing culture and practice , 2007, CHI.
[5] KyoungSoo Park,et al. Connection Conditioning: Architecture-Independent Support for Simple, Robust Servers , 2006, NSDI.
[6] Mahadev Satyanarayanan,et al. Coda: A Highly Available File System for a Distributed Workstation Environment , 1990, IEEE Trans. Computers.
[7] Zoe Antoniou,et al. User-centered design of a secure P2P personal and social networking platform , 2008 .
[8] Amy Wohl,et al. Apple computer, Inc. , 2003 .
[9] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[10] Andrew S. Tanenbaum,et al. Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System , 2004, Security Protocols Workshop.
[11] Mark W. Newman,et al. Listening in: practices surrounding iTunes music sharing , 2005, CHI.
[12] Jun Wang,et al. TRIBLER: a social‐based peer‐to‐peer system , 2008, IPTPS.
[13] Maria Papadopouli,et al. Locating application data across service discovery domains , 2001, MobiCom '01.
[14] K. V. S. Ramarao,et al. Detection of mutual inconsistency in Distributed Databases , 1987, 1987 IEEE Third International Conference on Data Engineering.
[15] J. T. Robinson,et al. On optimistic methods for concurrency control , 1979, TODS.
[16] Zoe Antoniou,et al. NFC-based mobile middleware for intuitive user interaction with security in smart homes , 2006, Communication Systems and Networks.
[17] Lujo Bauer,et al. Composing security policies with polymer , 2005, PLDI '05.
[18] Robert Tappan Morris,et al. Persistent personal names for globally connected mobile devices , 2006, OSDI '06.
[19] Bahram Shafai,et al. An Experimental Hardware Extension Platform for Mobile Devices in Smart Spaces , 2006, PSC.
[20] Christian Floerkemeier,et al. Interaction in pervasive computing settings using Bluetooth-enabled active tags and passive RFID technology together with mobile phones , 2003, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..
[21] Dimitris N. Kalofonos,et al. Intuisec: A Framework for Intuitive User Interaction with Smart Home Security using Mobile Devices , 2007, 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications.
[22] David Saff,et al. Footloose: a case for physical eventual consistency and selective conflict resolution , 2003, 2003 Proceedings Fifth IEEE Workshop on Mobile Computing Systems and Applications.
[23] Prasad Rao,et al. Automatic management of network security policy , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[24] Georg Carle,et al. DIADEM Firewall: Web Server Overload Attack Detection and Response , 2005 .
[25] William Yurcik,et al. Secure Smart Environments : Security Requirements , Challenges and Experiences in Pervasive Computing , 2005 .
[26] Jintae Lee,et al. An end-user perspective on file-sharing systems , 2003, CACM.
[27] K. Yamada,et al. A new remote configurable firewall system for home-use gateways , 2005, Second IEEE Consumer Communications and Networking Conference, 2005. CCNC. 2005.
[28] Jinyang Li,et al. F2F: Reliable Storage in Open Networks , 2006, IPTPS.
[29] John S. Heidemann,et al. Implementation of the Ficus Replicated File System , 1990, USENIX Summer.
[30] Holger Karl,et al. Consistency challenges of service discovery in mobile ad hoc networks , 2004, MSWiM '04.
[31] Diana K. Smetters,et al. In search of usable security: five lessons from the field , 2004, IEEE Security & Privacy Magazine.
[32] J. Doug Tygar,et al. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 , 1999, USENIX Security Symposium.
[33] Robert Tappan Morris,et al. Alpaca: extensible authorization for distributed services , 2007, CCS '07.
[34] Susan B. Davidson,et al. Optimism and consistency in partitioned distributed database systems , 1984, TODS.
[35] Robert Tappan Morris,et al. Ivy: a read/write peer-to-peer file system , 2002, OSDI '02.
[36] Alley Stoughton,et al. Detection of Mutual Inconsistency in Distributed Systems , 1983, IEEE Transactions on Software Engineering.
[37] Brian Matthews,et al. Policy-driven access control over a distributed firewall architecture , 2002, Proceedings Third International Workshop on Policies for Distributed Systems and Networks.
[38] Mark W. Newman,et al. Share and share alike: exploring the user interface affordances of file sharing , 2006, CHI.
[39] Marvin Theimer,et al. Managing update conflicts in Bayou, a weakly connected replicated storage system , 1995, SOSP.
[40] Perry A. Zirkel,et al. MySpace , 2009 .
[41] Hector Garcia-Molina,et al. SPROUT: P2P Routing with Social Networks , 2004, EDBT Workshops.
[42] Mahadev Satyanarayanan,et al. Disconnected Operation in the Coda File System , 1999, Mobidata.
[43] Scott Counts,et al. Supporting social presence through lightweight photo sharing on and off the desktop , 2004, CHI.