-
1
-
-
85076769385
-
Persistent Personal Names for Globally Connected Mobile Devices
-
November
-
B. Ford et al., "Persistent Personal Names for Globally Connected Mobile Devices", in OSDI, November 2006.
-
(2006)
OSDI
-
-
Ford, B.1
-
2
-
-
49149125943
-
-
JXTA Community Projects
-
JXTA Community Projects, https://jxta.dev.java.net/
-
-
-
-
5
-
-
49149123140
-
F2F: Reliable storage in open networks
-
Santa Barbara, CA, Feb
-
J. Li and F. Dabek, "F2F: Reliable storage in open networks," in 5th IPTPS, Santa Barbara, CA, Feb. 2006.
-
(2006)
5th IPTPS
-
-
Li, J.1
Dabek, F.2
-
6
-
-
33747801337
-
Tribler: A social-based peer-to-peer system
-
Feb
-
J. Pouwelse et al., "Tribler: A social-based peer-to-peer system," in 5th IPTPS, Feb. 2006.
-
(2006)
5th IPTPS
-
-
Pouwelse, J.1
-
7
-
-
49149087345
-
IntuiSec: A Framework for Intuitive User Interaction with Smart Home Security Using Mobile Devices
-
D. Kalofonos and S. Shakhshir, "IntuiSec: a Framework for Intuitive User Interaction with Smart Home Security Using Mobile Devices", in IEEE PIMRC, 2007.
-
(2007)
IEEE PIMRC
-
-
Kalofonos, D.1
Shakhshir, S.2
-
8
-
-
0001831930
-
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
-
F. Stajano and R. Anderson, "The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks", in Proc. SPW, 1999.
-
(1999)
Proc. SPW
-
-
Stajano, F.1
Anderson, R.2
-
10
-
-
49149100014
-
-
Apple Computer, Inc
-
Apple Computer, Inc., "Bonjour," http://developer.apple.com/ networking/bonjour/
-
Bonjour
-
-
-
11
-
-
0019574432
-
On optimistic methods for concurrency control
-
June
-
H. T. Kung and J. R. Robinson, "On optimistic methods for concurrency control," ACM TODS, vol. 6, pp. 213-226, June 1981.
-
(1981)
ACM TODS
, vol.6
, pp. 213-226
-
-
Kung, H.T.1
Robinson, J.R.2
-
12
-
-
0019563173
-
Detection of Mutual Inconsistency in Distributed Databases
-
May
-
Parker et al., "Detection of Mutual Inconsistency in Distributed Databases." IEEE Transactions on Software Engineering Issue 3. May 1983 pp. 240-247.
-
(1983)
IEEE Transactions on Software Engineering Issue
, vol.3
, pp. 240-247
-
-
Parker1
-
14
-
-
0002152011
-
Implementation of the Ficus replicated file system
-
R. G. Guy et al., "Implementation of the Ficus replicated file system," in USENIXSummer, 1990.
-
(1990)
USENIXSummer
-
-
Guy, R.G.1
-
16
-
-
33845192207
-
Managing Update Conflicts in Bayou, a Weakly Connected Replicated Storage System
-
th SOSP, 1995.
-
(1995)
th SOSP
-
-
Terry, D.B.1
-
17
-
-
11044224410
-
Footloose: A case for physical eventual consistency and selective conflict resolution
-
J. Paluska et al., "Footloose: A case for physical eventual consistency and selective conflict resolution," in Proc. 5th WMCSA, 2003.
-
(2003)
Proc. 5th WMCSA
-
-
Paluska, J.1
-
18
-
-
0021496873
-
Optimism and consistency in partitioned distributed database systems
-
Sep
-
Davidson, S. B. 1984. Optimism and consistency in partitioned distributed database systems. ACM Trans. Database Syst. 9, 3 (Sep. 1984), 456-481.
-
(1984)
ACM Trans. Database Syst
, vol.9
, Issue.3
, pp. 456-481
-
-
Davidson, S.B.1
-
19
-
-
49149121531
-
-
UDDI project
-
UDDI project, http://www.uddi.org/
-
-
-
-
20
-
-
49149103941
-
-
IETF, RFC 2165: Service Location Protocol
-
IETF, RFC 2165: Service Location Protocol
-
-
-
-
21
-
-
49149105649
-
-
UPnP Forum, Simple Service Discovery Protocol, UPnP Device Architecture 1.0.1, Dec 2003.
-
UPnP Forum, Simple Service Discovery Protocol, "UPnP Device Architecture 1.0.1", Dec 2003.
-
-
-
-
22
-
-
44349140858
-
Secure smart environments: Security requirements, challenges and experiences in pervasive computing
-
July
-
J. Wang et al. Secure smart environments: Security requirements, challenges and experiences in pervasive computing. In Experience Workshop on Pervasive Computing, July 2005.
-
(2005)
Experience Workshop on Pervasive Computing
-
-
Wang, J.1
-
23
-
-
12844272841
-
In search of usable security: Five lessons from the field
-
Sept/Oct
-
D. Balfanz, G. Durfee, and D. K. Smetters. In search of usable security: Five lessons from the field. In IEEE Security & Privacy, pp 19-24, Sept/Oct 2004.
-
(2004)
IEEE Security & Privacy
, pp. 19-24
-
-
Balfanz, D.1
Durfee, G.2
Smetters, D.K.3
-
24
-
-
85025684599
-
Connection conditioning: Architecture-independent support for simple, robust servers
-
San Jose, CA, May
-
K. Park and V. S. Pai, "Connection conditioning: Architecture-independent support for simple, robust servers," in Proc. NSDI, San Jose, CA, May 2006.
-
(2006)
Proc. NSDI
-
-
Park, K.1
Pai, V.S.2
-
26
-
-
49149100012
-
A new remote configurable firewall system for home use gateways
-
S. Mizuno et al., "A new remote configurable firewall system for home use gateways," in Proc. CCNC, 2005.
-
(2005)
Proc. CCNC
-
-
Mizuno, S.1
-
27
-
-
49149116680
-
Composing security policies with polymer
-
L. Bauer et al., "Composing security policies with polymer," in Proc. PLDI, 2005.
-
(2005)
Proc. PLDI
-
-
Bauer, L.1
-
28
-
-
4544264708
-
Policy-driven access control over a distributed firewall architecture
-
T. Dimitrakos et al., "Policy-driven access control over a distributed firewall architecture," in POLICY'02.
-
POLICY'02
-
-
Dimitrakos, T.1
-
29
-
-
70449443149
-
DIADEM firewall: Web server overload attack detection and response
-
BBEurope, Bordeaux, France, December
-
G. Munz et al. "DIADEM firewall: Web server overload attack detection and response," in Broadband Europe (BBEurope) 2005, Bordeaux, France, December 2005.
-
(2005)
Broadband Europe
-
-
Munz, G.1
-
30
-
-
49149104465
-
Automatic Management of Network Security Policy by Self-securing Networks
-
J. Burns et al., "Automatic Management of Network Security Policy by Self-securing Networks," in Proceedings of DISCEX II, 2001.
-
(2001)
Proceedings of DISCEX
, vol.2
-
-
Burns, J.1
-
31
-
-
49149084006
-
-
D.N. Kalofonos, MyNetSec: Intuitive Security for Peer-to-Peer (P2P) Personal and Social Networking Services. Published in Nokia Research Center Technical Report (NRC-TR-2007-014), Nov. 2007, http://research.nokia.com/ files/NRCTR2007014.pdf
-
D.N. Kalofonos, "MyNetSec: Intuitive Security for Peer-to-Peer (P2P) Personal and Social Networking Services". Published in Nokia Research Center Technical Report (NRC-TR-2007-014), Nov. 2007, http://research.nokia.com/ files/NRCTR2007014.pdf
-
-
-
-
32
-
-
49149089707
-
-
"Facebook", http://www.facebook.com/.
-
-
-
-
33
-
-
49149089965
-
-
"Myspace", http://www.myspace.com/.
-
-
-
-
34
-
-
49149092198
-
-
"Flickr", http://www.flickr.com/
-
-
-
-
35
-
-
62949119049
-
-
Z. Antoniou & D.N. Kalofonos, User-Centered Design of a Secure P2P Personal and Social Networking Platform, In Proc. IASTED Intl. Conf. on Human Computer Interaction (IASTED-HCI'08), March, 2008.
-
Z. Antoniou & D.N. Kalofonos, "User-Centered Design of a Secure P2P Personal and Social Networking Platform", In Proc. IASTED Intl. Conf. on Human Computer Interaction (IASTED-HCI'08), March, 2008.
-
-
-
-
36
-
-
56149102504
-
NFC-based Mobile Middleware for Intuitive User Interaction with Security in Smart Homes
-
Aug
-
Z. Antoniou & D.N. Kalofonos, "NFC-based Mobile Middleware for Intuitive User Interaction with Security in Smart Homes", Proc. of IASTED CSN, Aug. 2006.
-
(2006)
Proc. of IASTED CSN
-
-
Antoniou, Z.1
Kalofonos, D.N.2
-
37
-
-
49149105648
-
Intuitive Mobile User Interaction in Smart Spaces via NFC-enhanced devices
-
Z. Antoniou, & S. Varadan, "Intuitive Mobile User Interaction in Smart Spaces via NFC-enhanced devices", Proc. IEEE ICCGI, 2007.
-
(2007)
Proc. IEEE ICCGI
-
-
Antoniou, Z.1
Varadan, S.2
-
38
-
-
49149122761
-
-
Siegemund F. and. Florkemeier C. Interaction in Pervasive Computing Settings using Bluetooth-enabled Active Tags and Passive RFID Technology together with Mobile Phones. In Proc. IEEE PERCOM'03.
-
Siegemund F. and. Florkemeier C. "Interaction in Pervasive Computing Settings using Bluetooth-enabled Active Tags and Passive RFID Technology together with Mobile Phones". In Proc. IEEE PERCOM'03.
-
-
-
-
39
-
-
85084161247
-
-
A. Whitten and J. D. Tygar. Why johnny can't encrypt: A usability evaluation of PGP 5.0. In Proceedings of the 8th Usenix Security Symposium, pages 169-184, 1999.
-
A. Whitten and J. D. Tygar. Why johnny can't encrypt: A usability evaluation of PGP 5.0. In Proceedings of the 8th Usenix Security Symposium, pages 169-184, 1999.
-
-
-
-
40
-
-
49149098344
-
An experimental hardware extension platform for mobile devices in smart spaces
-
M. Michalakis, D.N. Kalofonos, Shafai B., An experimental hardware extension platform for mobile devices in smart spaces, in Proc. PSC '06, 2006.
-
(2006)
Proc. PSC '06
-
-
Michalakis, M.1
Kalofonos, D.N.2
Shafai, B.3
-
41
-
-
72449137499
-
Give and take: A study of consumer photo-sharing culture and practice
-
A. Miller, W. Edwards, "Give and take: a study of consumer photo-sharing culture and practice," CHI '07.
-
CHI '07
-
-
Miller, A.1
Edwards, W.2
-
42
-
-
85169439844
-
-
A. Voida et al. Listening in: practices surrounding iTunes music sharing, in CHI '05, 2005.
-
A. Voida et al. "Listening in: practices surrounding iTunes music sharing," in CHI '05, 2005.
-
-
-
-
44
-
-
4243051581
-
An end-user perspective on file-sharing systems
-
J. Lee, "An end-user perspective on file-sharing systems," Commun. ACM, vol. 46, no. 2, 2003.
-
(2003)
Commun. ACM
, vol.46
, Issue.2
-
-
Lee, J.1
-
45
-
-
33745855383
-
Supporting social presence through lightweight photo sharing on and off the desktop,
-
S. Counts and E. Fellheimer, "Supporting social presence through lightweight photo sharing on and off the desktop,". In Proc CHI '04, 2004.
-
(2004)
Proc CHI '04
-
-
Counts, S.1
Fellheimer, E.2
-
46
-
-
0034777568
-
Locating application data across service discovery domains
-
P. Castro, et al., "Locating application data across service discovery domains," in MobiCom, 2001.
-
(2001)
MobiCom
-
-
Castro, P.1
-
47
-
-
49149114450
-
-
C. Frank, H. Karl, Consistency Challenges of Service Discovery in Mobile Ad Hoc Networks, MSWiM'04.
-
C. Frank, H. Karl, "Consistency Challenges of Service Discovery in Mobile Ad Hoc Networks", MSWiM'04.
-
-
-
-
48
-
-
10944269775
-
Firmato: A novel firewall management toolkit
-
Nov
-
Y. Bartal et al. "Firmato: A novel firewall management toolkit," ACM Trans. Comput. Syst. 22, 4, Nov. 2004.
-
(2004)
ACM Trans. Comput. Syst
, vol.22
, pp. 4
-
-
Bartal, Y.1
|