메뉴 건너뛰기




Volumn , Issue , 2014, Pages 193-204

SOUP: An online social network by the people, for the people

Author keywords

Decentralized OSN; Online social networks; OSN; Privacy

Indexed keywords

CRYPTOGRAPHY; DATA PRIVACY; DIGITAL STORAGE; INFORMATION MANAGEMENT; MIDDLEWARE;

EID: 84920444440     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2663165.2663324     Document Type: Conference Paper
Times cited : (20)

References (35)
  • 1
    • 70450206356 scopus 로고    scopus 로고
    • Facebook and online privacy: Attitudes, behaviors, and unintended consequences
    • B. Debatin, J. P. Lovejoy et al., "Facebook and Online Privacy: Attitudes, Behaviors, and Unintended Consequences," Journal of Computer-Mediated Communication, vol. 15, pp. 83-108, 2009.
    • (2009) Journal of Computer-Mediated Communication , vol.15 , pp. 83-108
    • Debatin, B.1    Lovejoy, J.P.2
  • 2
    • 84920377156 scopus 로고    scopus 로고
    • checked 31/08/2014
    • http://linkd. in/1jaSeJK (all URLs checked 31/08/2014).
  • 3
    • 80052912569 scopus 로고    scopus 로고
    • Privacy in the age of google and facebook
    • C. Dwyer, "Privacy in the Age of Google and Facebook," Technology and Society Magazine, IEEE, vol. 30, no. 3, pp. 58-63, 2011.
    • (2011) Technology and Society Magazine, IEEE , vol.30 , Issue.3 , pp. 58-63
    • Dwyer, C.1
  • 5
    • 79952556688 scopus 로고    scopus 로고
    • Vis-a-Vis: Privacy-preserving online social networking via Virtual Individual Servers
    • A. Shakimov, H. Lim et al., "Vis-a-Vis: Privacy-preserving online social networking via Virtual Individual Servers," in COMSNETS'11.
    • COMSNETS'11
    • Shakimov, A.1    Lim, H.2
  • 6
    • 84920469174 scopus 로고    scopus 로고
    • Confidant: Protecting OSN Data without Locking it Up
    • D. Liu, A. Shakimov et al., "Confidant: Protecting OSN Data without Locking it Up," in Middleware '11.
    • Middleware '11
    • Liu, D.1    Shakimov, A.2
  • 7
    • 84858025733 scopus 로고    scopus 로고
    • SuperNova: Super-peers based Architecture for Decentralized Online Social Networks
    • R. Sharma and A. Datta, "SuperNova: Super-peers based Architecture for Decentralized Online Social Networks," in COMSNETS'12.
    • COMSNETS'12
    • Sharma, R.1    Datta, A.2
  • 8
    • 77958454798 scopus 로고    scopus 로고
    • Persona: An online social network with user-defined privacy
    • R. Baden, A. Bender et al., "Persona: An Online Social Network with User-defined Privacy," in SIGCOMM '09.
    • SIGCOMM '09
    • Baden, R.1    Bender, A.2
  • 9
    • 77955881883 scopus 로고    scopus 로고
    • Replica placement in p2p storage: Complexity and game theoretic analyses
    • K. Rzadca, A. Datta et al., "Replica Placement in P2P Storage: Complexity and Game Theoretic Analyses," in ICDCS '10.
    • ICDCS '10
    • Rzadca, K.1    Datta, A.2
  • 10
    • 84872002349 scopus 로고    scopus 로고
    • Cachet: A decentralized architecture for privacy preserving social networking with caching
    • S. Nilizadeh, S. Jahid et al., "Cachet: A Decentralized Architecture for Privacy Preserving Social Networking with Caching," in CoNEXT'12.
    • CoNEXT'12
    • Nilizadeh, S.1    Jahid, S.2
  • 11
    • 72949088489 scopus 로고    scopus 로고
    • Safebook: A privacy-preserving online social network leveraging on real-life trust
    • L. Cutillo, R. Molva et al., "Safebook: A Privacy-Preserving Online Social Network Leveraging on Real-life Trust," Com. Mag., IEEE, vol. 47, no. 12, pp. 94-101, 2009.
    • (2009) Com. Mag., IEEE , vol.47 , Issue.12 , pp. 94-101
    • Cutillo, L.1    Molva, R.2
  • 12
    • 84920463344 scopus 로고    scopus 로고
    • Results from a Practical Deployment of the MyZone Decentralized P2P Social Network
    • A. Mahdian, R. Han et al., "Results from a Practical Deployment of the MyZone Decentralized P2P Social Network," CoRR, 2013.
    • (2013) CoRR
    • Mahdian, A.1    Han, R.2
  • 13
    • 84958546246 scopus 로고    scopus 로고
    • ProofBook: An online social network based on proof-of-work and friend-propagation
    • Springer
    • S. Biedermann, N. P. Karvelas et al., "ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation," in SOFSEM'2014: Theory and Practice of Computer Science. Springer, 2014, pp. 114-125.
    • (2014) SOFSEM'2014: Theory and Practice of Computer Science , pp. 114-125
    • Biedermann, S.1    Karvelas, N.P.2
  • 14
    • 78149324869 scopus 로고    scopus 로고
    • Privacy-preserving p2p data sharing with oneswarm
    • T. Isdal, M. Piatek et al., "Privacy-preserving P2P Data Sharing with OneSwarm," in SIGCOMM'10.
    • SIGCOMM'10
    • Isdal, T.1    Piatek, M.2
  • 15
    • 13644274213 scopus 로고    scopus 로고
    • A survey of peer-to-peer content distribution technologies
    • S. Androutsellis-Theotokis and D. Spinellis, "A Survey of Peer-to-Peer Content Distribution Technologies," ACM Comput. Surv., vol. 36, pp. 335-371, 2004.
    • (2004) ACM Comput. Surv. , vol.36 , pp. 335-371
    • Androutsellis-Theotokis, S.1    Spinellis, D.2
  • 16
    • 83155184628 scopus 로고    scopus 로고
    • Exploiting node connection regularity for dht replication
    • A. Pace, V. Quema et al., "Exploiting Node Connection Regularity for DHT Replication," in SRDS'11.
    • SRDS'11
    • Pace, A.1    Quema, V.2
  • 17
    • 84864829717 scopus 로고    scopus 로고
    • Choosing partners based on availability in p2p networks
    • S. L. Blond, F. L. Fessant et al., "Choosing Partners Based on Availability in P2P Networks," ACM TAAS, vol. 7, no. 2, p. 25, 2012.
    • (2012) ACM TAAS , vol.7 , Issue.2 , pp. 25
    • Blond, S.L.1    Fessant, F.L.2
  • 18
    • 77956953218 scopus 로고    scopus 로고
    • Measuring user behavior in online social networks
    • L. Gyarmati and T. Trinh, "Measuring User Behavior in Online Social Networks," IEEE Network, vol. 24, no. 5, pp. 26-31, 2010.
    • (2010) IEEE Network , vol.24 , Issue.5 , pp. 26-31
    • Gyarmati, L.1    Trinh, T.2
  • 19
    • 84907318036 scopus 로고    scopus 로고
    • Characterizing user behavior in online social networks
    • F. Benevenuto, T. Rodrigues et al., "Characterizing User Behavior in Online Social Networks," in IMC '09.
    • IMC '09
    • Benevenuto, F.1    Rodrigues, T.2
  • 20
    • 50249145728 scopus 로고    scopus 로고
    • Measurement and analysis of online social networks
    • A. Mislove, M. Marcon et al., "Measurement and Analysis of Online Social Networks," in IMC '07.
    • IMC '07
    • Mislove, A.1    Marcon, M.2
  • 21
    • 84857214669 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based encryption
    • J. Bethencourt, A. Sahai et al., "Ciphertext-Policy Attribute-Based Encryption," in IEEE SP '07.
    • IEEE SP '07
    • Bethencourt, J.1    Sahai, A.2
  • 22
    • 84893249232 scopus 로고    scopus 로고
    • User Interactions in Social Networks and their Implications
    • C. Wilson, B. Boe et al., "User Interactions in Social Networks and their Implications," in EuroSys'09.
    • EuroSys'09
    • Wilson, C.1    Boe, B.2
  • 23
    • 84874692167 scopus 로고    scopus 로고
    • Understanding Online Social Network Usage from a Network Perspective
    • F. Schneider, A. Feldmann et al., "Understanding Online Social Network Usage from a Network Perspective," in IMC'09.
    • IMC'09
    • Schneider, F.1    Feldmann, A.2
  • 24
    • 78149337076 scopus 로고    scopus 로고
    • An analysis of social network-based sybil defenses
    • B. Viswanath, A. Post et al., "An Analysis of Social Network-based Sybil Defenses," in SIGCOMM'10.
    • SIGCOMM'10
    • Viswanath, B.1    Post, A.2
  • 25
    • 84995477295 scopus 로고    scopus 로고
    • On the evolution of user interaction in facebook
    • B. Viswanath, A. Mislove et al., "On the Evolution of User Interaction in Facebook," in WOSN'09.
    • WOSN'09
    • Viswanath, B.1    Mislove, A.2
  • 27
    • 84905985235 scopus 로고    scopus 로고
    • Understanding latent interactions in online social networks
    • J. Jiang, C. Wilson et al., "Understanding Latent Interactions in Online Social Networks," in IMC'10.
    • IMC'10
    • Jiang, J.1    Wilson, C.2
  • 29
    • 0003007594 scopus 로고    scopus 로고
    • Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems
    • A. I. T. Rowstron and P. Druschel, "Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems," in Middleware '01.
    • Middleware '01
    • Rowstron, A.I.T.1    Druschel, P.2
  • 31
    • 84905970745 scopus 로고    scopus 로고
    • On the state of osn-based sybil defenses
    • D. Koll, J. Li et al., "On the State of OSN-based Sybil Defenses," in NETWORKING'14.
    • NETWORKING'14
    • Koll, D.1    Li, J.2
  • 32
    • 79960856007 scopus 로고    scopus 로고
    • Relationship Classification in Large Scale Online Social Networks and its Impact on Information Propagation
    • S. Tang, J. Yuan et al., "Relationship Classification in Large Scale Online Social Networks and its Impact on Information Propagation," in INFOCOM'11.
    • INFOCOM'11
    • Tang, S.1    Yuan, J.2
  • 33
    • 70849096006 scopus 로고    scopus 로고
    • Predicting tie strength with social media
    • E. Gilbert and K. Karahalios, "Predicting Tie Strength with Social Media," in CHI'09.
    • CHI'09
    • Gilbert, E.1    Karahalios, K.2
  • 34
  • 35
    • 77955726417 scopus 로고    scopus 로고
    • Network coding for distributed storage systems
    • A. Dimakis, P. Godfrey et al., "Network Coding for Distributed Storage Systems," Information Theory, IEEE Trans. on, vol. 56, no. 9, pp. 4539-4551, 2010.
    • (2010) Information Theory, IEEE Trans. on , vol.56 , Issue.9 , pp. 4539-4551
    • Dimakis, A.1    Godfrey, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.