R. Baden, Persona: an online social network with user-defined privacy, SIGCOMM '09

W. Bolosky, Feasibility of a serverless distributed file system deployed on an existing set of desktop pcs, SIGMETRICS, 2000.

H. Chun, Comparison of online social relations in volume vs interaction, Proceedings of the 8th ACM SIGCOMM conference on Internet measurement conference, IMC '08
DOI : 10.1145/1452520.1452528

J. Dean, MapReduce, Communications of the ACM, vol.51, issue.1, 2008.
DOI : 10.1145/1327452.1327492

T. Douglas, Managing update conflicts in bayou, a weakly connected replicated storage system, SOSP, 1995.

E. Gilbert, Predicting tie strength with social media, Proceedings of the 27th international conference on Human factors in computing systems, CHI 09
DOI : 10.1145/1518701.1518736

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.168.6310

R. A. Golding, A weak-consistency architecture for distributed information services, Computing Systems, 1992.

B. W. Lampson, Hints for computer system design, IEEE Software, 1983.
DOI : 10.1145/800217.806614

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.147.2921

D. Liu, A. Shakimov, R. Cáceres, A. Varshavsky, and L. P. Cox, Confidant: Protecting OSN Data without Locking It Up, 2010.
DOI : 10.1007/978-3-642-25821-3_4

URL : https://hal.archives-ouvertes.fr/hal-01597763

B. Noble and M. Satyanarayanan, An empirical study of a highly available file system, SIGMETRICS, 1994.

K. Puttaswamy and B. Zhao, Preserving privacy in location-based mobile social applications, Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications, HotMobile '10, 2010.
DOI : 10.1145/1734583.1734585

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.154.8054

V. Ramasubramanian, Cimbiosys: a platform for content-based partial replication, NSDI'09

A. Sala, Measurement-calibrated graph models for social network experiments, Proceedings of the 19th international conference on World wide web, WWW '10, 2010.
DOI : 10.1145/1772690.1772778

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.154.1021

S. Saroiu, Measuring and analyzing the characteristics of Napster and Gnutella hosts, Multimedia Systems, vol.9, issue.2, 2003.
DOI : 10.1007/s00530-003-0088-1

D. Song, Practical techniques for searches on encrypted data, IEEE Symposium on Security and Privacy, 2000.

A. Tootoonchian, Lockr, Proceedings of the 5th international conference on Emerging networking experiments and technologies, CoNEXT '09
DOI : 10.1145/1658939.1658959

D. Tran, Friendstore, Proceedings of the 1st workshop on Social network systems, SocialNets '08
DOI : 10.1145/1435497.1435504

B. Viswanath, On the evolution of user interaction in Facebook, Proceedings of the 2nd ACM workshop on Online social networks, WOSN '09, 2009.
DOI : 10.1145/1592665.1592675

C. Wilson, User interactions in social networks and their implications, Proceedings of the fourth ACM european conference on Computer systems, EuroSys '09
DOI : 10.1145/1519065.1519089

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.153.3648

W. Winsborough, Towards practical automated trust negotiation, Proceedings Third International Workshop on Policies for Distributed Systems and Networks, 2002.
DOI : 10.1109/POLICY.2002.1011297

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.107.7616

T. Wobber, Policy-based access control for weakly consistent replication, Proceedings of the 5th European conference on Computer systems, EuroSys '10
DOI : 10.1145/1755913.1755943

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.150.3281