-
1
-
-
0030083168
-
Serverless network file systems
-
T. E. Anderson, M. D. Dahlin, J. M. Neefe, D. A. Patterson, D. S. Roselli, and R. Y. Wang. Serverless network file systems. ACM TOCS, 14(1), 1996.
-
(1996)
ACM TOCS
, vol.14
, Issue.1
-
-
Anderson, T.E.1
Dahlin, M.D.2
Neefe, J.M.3
Patterson, D.A.4
Roselli, D.S.5
Wang, R.Y.6
-
3
-
-
79959904021
-
A security API for distributed social networks
-
Feb
-
M. Backes, M. Maffei, and K. Pecina. A security API for distributed social networks. In Proc. NDSS, Feb. 2011.
-
(2011)
Proc. NDSS
-
-
Backes, M.1
Maffei, M.2
Pecina, K.3
-
4
-
-
35348848696
-
Wherefore Art thou R3579X? Anonymized social networks, hidden patterns, and structural steganography
-
May
-
L. Backstrom, C. Dwork, and J. Kleinberg. Wherefore Art Thou R3579X? Anonymized social networks, hidden patterns, and structural steganography. In Proc. WWW, May 2007.
-
(2007)
Proc. WWW
-
-
Backstrom, L.1
Dwork, C.2
Kleinberg, J.3
-
5
-
-
77958454798
-
Persona: An online social network with user-defined privacy
-
Aug
-
R. Baden, A. Bender, N. Spring, B. Bhattacharjee, and D. Starin. Persona: an online social network with user-defined privacy. In Proc. SIGCOMM, Aug. 2009.
-
(2009)
Proc. SIGCOMM
-
-
Baden, R.1
Bender, A.2
Spring, N.3
Bhattacharjee, B.4
Starin, D.5
-
8
-
-
85076234065
-
Privacy-aware collaborative access control in web-based social networks
-
July
-
B. Carminati and E. Ferrari. Privacy-aware collaborative access control in web-based social networks. In Proc. DBSec, July 2008.
-
(2008)
Proc. DBSec
-
-
Carminati, B.1
Ferrari, E.2
-
11
-
-
84868365803
-
Efficient data structures for tamper-evident logging
-
Aug
-
S. A. Crosby and D. S. Wallach. Efficient data structures for tamper-evident logging. In Proc. USENIX Security, Aug. 2009.
-
(2009)
Proc. USENIX Security
-
-
Crosby, S.A.1
Wallach, D.S.2
-
12
-
-
81855197021
-
Super-efficient aggregating history-independent persistent authenticated dictionaries
-
Sept
-
S. A. Crosby and D. S. Wallach. Super-efficient aggregating history-independent persistent authenticated dictionaries. In Proc. ESORICS, Sept. 2009.
-
(2009)
Proc. ESORICS
-
-
Crosby, S.A.1
Wallach, D.S.2
-
14
-
-
72949088489
-
Safebook: A privacy-preserving online social network leveraging on real-life trust
-
Dec
-
L. A. Cutillo, R. Molva, T. Strufe, and T. Darmstadt. Safebook: A privacy-preserving online social network leveraging on real-life trust. IEEE Communications Magazine, 47(12):94–101, Dec. 2009.
-
(2009)
IEEE Communications Magazine
, vol.47
, Issue.12
, pp. 94-101
-
-
Cutillo, L.A.1
Molva, R.2
Strufe, T.3
Darmstadt, T.4
-
15
-
-
70450064414
-
Dynamo: Amazon’s highly available key-value store
-
Oct
-
G. DeCandia, D. Hastorun, M. Jampani, G. Kakulapati, A. Lakshman, A. Pilchin, S. Sivasubramanian, P. Vosshall, and W. Vogels. Dynamo: Amazon’s highly available key-value store. In Proc. SOSP, Oct. 2007.
-
(2007)
Proc. SOSP
-
-
DeCandia, G.1
Hastorun, D.2
Jampani, M.3
Kakulapati, G.4
Lakshman, A.5
Pilchin, A.6
Sivasubramanian, S.7
Vosshall, P.8
Vogels, W.9
-
17
-
-
84876564875
-
-
Retrieved April 23, 2012
-
Diaspora. Diaspora project. http://diasporaproject.org/. Retrieved April 23, 2012.
-
Diaspora Project
-
-
-
18
-
-
52049126397
-
Privacy homomorphisms for social networks with private relationships
-
Oct
-
J. Domingo-Ferrer, A. Viejo, F. Sebé, and írsula González-Nicolás. Privacy homomorphisms for social networks with private relationships. Computer Networks, 52:3007–3016, Oct. 2008.
-
(2008)
Computer Networks
, vol.52
, pp. 3007-3016
-
-
Domingo-Ferrer, J.1
Viejo, A.2
Sebé, F.3
González-Nicolás, Í.4
-
19
-
-
84865959860
-
-
Nov
-
Facebook, Inc. Anatomy of facebook. http://www.facebook.com/notes/facebook-data-team/ anatomy-of-facebook/10150388519243859, Nov. 2011.
-
(2011)
Anatomy of Facebook
-
-
-
20
-
-
27844600056
-
-
Retrieved April 23, 2012
-
Facebook, Inc. Fact sheet. http://newsroom.fb.com/content/default.aspx?NewsAreaId=22. Retrieved April 23, 2012.
-
Fact Sheet
-
-
-
22
-
-
85076213824
-
-
Feb
-
Flickr. Flickr phantom photos. http://flickr.com/help/forum/33657/, Feb. 2007.
-
(2007)
Flickr Phantom Photos
-
-
-
24
-
-
84897594546
-
-
Retrieved April 23, 2012
-
Google, Inc. Transparency report. https://www.google.com/transparencyreport/ governmentrequests/userdata/. Retrieved April 23, 2012.
-
Transparency Report
-
-
-
25
-
-
70249088359
-
Noyb: Privacy in online social networks
-
Aug
-
S. Guha, K. Tang, and P. Francis. NOYB: Privacy in online social networks. In Proc. WOSN, Aug. 2008.
-
(2008)
Proc. WOSN
-
-
Guha, S.1
Tang, K.2
Francis, P.3
-
26
-
-
84943299684
-
Privad: Practical privacy in online advertising
-
Mar
-
S. Guha, B. Cheng, and P. Francis. Privad: Practical privacy in online advertising. In Proc. NSDI, Mar. 2011.
-
(2011)
Proc. NSDI
-
-
Guha, S.1
Cheng, B.2
Francis, P.3
-
27
-
-
0025460579
-
Linearizability: A correctness condition for concurrent objects
-
M. P. Herlihy and J. M. Wing. Linearizability: A correctness condition for concurrent objects. ACM TOPLAS, 12 (3), 1990.
-
(1990)
ACM TOPLAS
, vol.12
, Issue.3
-
-
Herlihy, M.P.1
Wing, J.M.2
-
28
-
-
79956030125
-
Easier: Encryption-based access control in social networks with efficient revocation
-
Mar
-
S. Jahid, P. Mittal, and N. Borisov. EASiER: Encryption-based access control in social networks with efficient revocation. In Proc. ASIACCS, Mar. 2011.
-
(2011)
Proc. ASIACCS
-
-
Jahid, S.1
Mittal, P.2
Borisov, N.3
-
29
-
-
84871313494
-
Decent: A decentralized architecture for enforcing privacy in online social networks
-
Mar
-
S. Jahid, S. Nilizadeh, P. Mittal, N. Borisov, and A. Kapadia. DECENT: A decentralized architecture for enforcing privacy in online social networks. In Proc. SESOC, Mar. 2012.
-
(2012)
Proc. SESOC
-
-
Jahid, S.1
Nilizadeh, S.2
Mittal, P.3
Borisov, N.4
Kapadia, A.5
-
30
-
-
0002130821
-
Consistent hashing and random trees: Distributed caching protocols for relieving hot spots on the World Wide Web
-
May
-
D. Karger, E. Lehman, T. Leighton, M. Levine, D. Lewin, and R. Panigrahy. Consistent hashing and random trees: Distributed caching protocols for relieving hot spots on the World Wide Web. In Proc. STOC, May 1997.
-
(1997)
Proc. STOC
-
-
Karger, D.1
Lehman, E.2
Leighton, T.3
Levine, M.4
Lewin, D.5
Panigrahy, R.6
-
31
-
-
0032058184
-
The part-time parliament
-
L. Lamport. The part-time parliament. ACM TOCS, 16(2): 133–169, 1998.
-
(1998)
ACM TOCS
, vol.16
, Issue.2
, pp. 133-169
-
-
Lamport, L.1
-
32
-
-
57349111694
-
Planetary-scale views on a large instant-messaging network
-
Apr
-
J. Leskovec and E. Horvitz. Planetary-scale views on a large instant-messaging network. In Proc. WWW, Apr. 2008.
-
(2008)
Proc. WWW
-
-
Leskovec, J.1
Horvitz, E.2
-
33
-
-
85094320125
-
Beyond one-third faulty replicas in Byzantine fault tolerant systems
-
Apr
-
J. Li and D. Mazières. Beyond one-third faulty replicas in Byzantine fault tolerant systems. In Proc. NSDI, Apr. 2007.
-
(2007)
Proc. NSDI
-
-
Li, J.1
Mazières, D.2
-
35
-
-
84856638429
-
Confidant: Protecting OSN data without locking it up
-
Dec
-
D. Liu, A. Shakimov, R. Cáceres, A. Varshavsky, and L. P. Cox. Confidant: Protecting OSN data without locking it up. In Proc. Middleware, Dec. 2011.
-
(2011)
Proc. Middleware
-
-
Liu, D.1
Shakimov, A.2
Cáceres, R.3
Varshavsky, A.4
Cox, L.P.5
-
37
-
-
70449667273
-
Flybynight: Mitigating the privacy risks of social networking
-
Oct
-
M. M. Lucas and N. Borisov. flyByNight: mitigating the privacy risks of social networking. In Proc. WPES, Oct. 2008.
-
(2008)
Proc. WPES
-
-
Lucas, M.M.1
Borisov, N.2
-
38
-
-
79955969463
-
Depot: Cloud storage with minimal trust
-
Oct
-
P. Mahajan, S. Setty, S. Lee, A. Clement, L. Alvisi, M. Dahlin, and M. Walfish. Depot: Cloud storage with minimal trust. In Proc. OSDI, Oct. 2010.
-
(2010)
Proc. OSDI
-
-
Mahajan, P.1
Setty, S.2
Lee, S.3
Clement, A.4
Alvisi, L.5
Dahlin, M.6
Walfish, M.7
-
39
-
-
21844454934
-
Building secure file systems out of byzantine storage
-
July
-
D. Mazières and D. Shasha. Building secure file systems out of byzantine storage. In Proc. PODC, July 2002.
-
(2002)
Proc. PODC
-
-
Mazières, D.1
Shasha, D.2
-
40
-
-
85076232687
-
Facebook scrambles to fix security hole exposing private pictures
-
Dec
-
J. P. Mello. Facebook scrambles to fix security hole exposing private pictures. PC World, Dec. 2011.
-
(2011)
PC World
-
-
Mello, J.P.1
-
41
-
-
84958802026
-
A digital signature based on a conventional encryption function
-
R. C. Merkle. A digital signature based on a conventional encryption function. CRYPTO, pages 369–378, 1987.
-
(1987)
CRYPTO
, pp. 369-378
-
-
Merkle, R.C.1
-
42
-
-
85076231456
-
-
Retrieved April 23, 2012
-
Mozilla Project. Network security services for Java (JSS). https://developer.mozilla.org/En/ JSS. Retrieved April 23, 2012.
-
Network Security Services for Java (JSS)
-
-
-
45
-
-
80055029821
-
Birds of a fethr: Open, decentralized micropublishing
-
Apr
-
D. R. Sandler and D. S. Wallach. Birds of a FETHR: Open, decentralized micropublishing. In Proc. IPTPS, Apr. 2009.
-
(2009)
Proc. IPTPS
-
-
Sandler, D.R.1
Wallach, D.S.2
-
47
-
-
85076202626
-
Watch out who you reply to on google buzz, you might be exposing their email address
-
Feb
-
E. Schonfeld. Watch out who you reply to on google buzz, you might be exposing their email address. TechCrunch, Feb. 2010.
-
(2010)
TechCrunch
-
-
Schonfeld, E.1
-
48
-
-
77955006186
-
PRPL: A decentralized social networking infrastructure
-
June
-
S.-W. Seong, J. Seo, M. Nasielski, D. Sengupta, S. Hangal, S. K. Teh, R. Chu, B. Dodson, and M. S. Lam. PrPl: A decentralized social networking infrastructure. In Proc. MCS, June 2010.
-
(2010)
Proc. MCS
-
-
Seong, S.-W.1
Seo, J.2
Nasielski, M.3
Sengupta, D.4
Hangal, S.5
Teh, S.K.6
Chu, R.7
Dodson, B.8
Lam, M.S.9
-
49
-
-
79952556688
-
Vis-à-vis: Privacy-preserving online social networking via virtual individual servers
-
Jan
-
A. Shakimov, H. Lim, R. Caceres, L. P. Cox, K. Li, D. Liu, and A. Varshavsky. Vis-à-Vis: Privacy-preserving online social networking via virtual individual servers. In Proc. COMSNETS, Jan. 2011.
-
(2011)
Proc. COMSNETS
-
-
Shakimov, A.1
Lim, H.2
Caceres, R.3
Cox, L.P.4
Li, K.5
Liu, D.6
Varshavsky, A.7
-
50
-
-
85076209503
-
Venus: Verification for untrusted cloud storage
-
Oct
-
A. Shraer, C. Cachin, A. Cidon, I. Keidar, Y. Michalevsky, and D. Shaket. Venus: Verification for untrusted cloud storage. In Proc. CCSW, Oct. 2010.
-
(2010)
Proc. CCSW
-
-
Shraer, A.1
Cachin, C.2
Cidon, A.3
Keidar, I.4
Michalevsky, Y.5
Shaket, D.6
-
53
-
-
84864358520
-
Contrail: Enabling decentralized social networks on smartphones
-
Dec
-
P. Stuedi, I. Mohomed, M. Balakrishnan, Z. M. Mao, V. Ramasubramanian, D. Terry, and T. Wobber. Contrail: Enabling decentralized social networks on smartphones. In Proc. Middleware, Dec. 2011.
-
(2011)
Proc. Middleware
-
-
Stuedi, P.1
Mohomed, I.2
Balakrishnan, M.3
Mao, Z.M.4
Ramasubramanian, V.5
Terry, D.6
Wobber, T.7
-
54
-
-
77953298166
-
A privacy-preserving scheme for online social networks with efficient revocation
-
Mar
-
J. Sun, X. Zhu, and Y. Fang. A privacy-preserving scheme for online social networks with efficient revocation. In Proc. INFOCOM, Mar. 2010.
-
(2010)
Proc. INFOCOM
-
-
Sun, J.1
Zhu, X.2
Fang, Y.3
-
55
-
-
33845192207
-
Managing update conflicts in Bayou, a weakly connected replicated storage system
-
Dec
-
D. B. Terry, M. M. Theimer, K. Petersen, A. J. Demers, M. J. Spreitzer, and C. H. Hauser. Managing update conflicts in Bayou, a weakly connected replicated storage system. In Proc. SOSP, Dec. 1995.
-
(1995)
Proc. SOSP
-
-
Terry, D.B.1
Theimer, M.M.2
Petersen, K.3
Demers, A.J.4
Spreitzer, M.J.5
Hauser, C.H.6
-
57
-
-
85180529696
-
Adnostic: Privacy preserving targeted advertising
-
Feb
-
V. Toubiana, A. Narayanan, D. Boneh, H. Nissenbaum, and S. Barocas. Adnostic: Privacy preserving targeted advertising. In Proc. NDSS, Feb. 2010.
-
(2010)
Proc. NDSS
-
-
Toubiana, V.1
Narayanan, A.2
Boneh, D.3
Nissenbaum, H.4
Barocas, S.5
-
58
-
-
33947317857
-
-
Retrieved April 23, 2012
-
D. Wheeler. SLOCCount. http://www.dwheeler.com/sloccount/. Retrieved April 23, 2012.
-
SLOCCount
-
-
Wheeler, D.1
-
59
-
-
0033893174
-
Secure group communications using key graphs
-
C. K. Wong, M. Gouda, and S. S. Lam. Secure group communications using key graphs. IEEE/ACM TON, 8(1): 16–30, 1998.
-
(1998)
IEEE/ACM TON
, vol.8
, Issue.1
, pp. 16-30
-
-
Wong, C.K.1
Gouda, M.2
Lam, S.S.3
|