Persona: an online social network with user-defined privacy, SIGCOMM '09 ,
Feasibility of a serverless distributed file system deployed on an existing set of desktop pcs, SIGMETRICS, 2000. ,
Comparison of online social relations in volume vs interaction, Proceedings of the 8th ACM SIGCOMM conference on Internet measurement conference, IMC '08 ,
DOI : 10.1145/1452520.1452528
MapReduce, Communications of the ACM, vol.51, issue.1, 2008. ,
DOI : 10.1145/1327452.1327492
Managing update conflicts in bayou, a weakly connected replicated storage system, SOSP, 1995. ,
Predicting tie strength with social media, Proceedings of the 27th international conference on Human factors in computing systems, CHI 09 ,
DOI : 10.1145/1518701.1518736
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.168.6310
A weak-consistency architecture for distributed information services, Computing Systems, 1992. ,
Hints for computer system design, IEEE Software, 1983. ,
DOI : 10.1145/800217.806614
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.147.2921
Confidant: Protecting OSN Data without Locking It Up, 2010. ,
DOI : 10.1007/978-3-642-25821-3_4
URL : https://hal.archives-ouvertes.fr/hal-01597763
An empirical study of a highly available file system, SIGMETRICS, 1994. ,
Preserving privacy in location-based mobile social applications, Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications, HotMobile '10, 2010. ,
DOI : 10.1145/1734583.1734585
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.154.8054
Cimbiosys: a platform for content-based partial replication, NSDI'09 ,
Measurement-calibrated graph models for social network experiments, Proceedings of the 19th international conference on World wide web, WWW '10, 2010. ,
DOI : 10.1145/1772690.1772778
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.154.1021
Measuring and analyzing the characteristics of Napster and Gnutella hosts, Multimedia Systems, vol.9, issue.2, 2003. ,
DOI : 10.1007/s00530-003-0088-1
Practical techniques for searches on encrypted data, IEEE Symposium on Security and Privacy, 2000. ,
Lockr, Proceedings of the 5th international conference on Emerging networking experiments and technologies, CoNEXT '09 ,
DOI : 10.1145/1658939.1658959
Friendstore, Proceedings of the 1st workshop on Social network systems, SocialNets '08 ,
DOI : 10.1145/1435497.1435504
On the evolution of user interaction in Facebook, Proceedings of the 2nd ACM workshop on Online social networks, WOSN '09, 2009. ,
DOI : 10.1145/1592665.1592675
User interactions in social networks and their implications, Proceedings of the fourth ACM european conference on Computer systems, EuroSys '09 ,
DOI : 10.1145/1519065.1519089
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.153.3648
Towards practical automated trust negotiation, Proceedings Third International Workshop on Policies for Distributed Systems and Networks, 2002. ,
DOI : 10.1109/POLICY.2002.1011297
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.107.7616
Policy-based access control for weakly consistent replication, Proceedings of the 5th European conference on Computer systems, EuroSys '10 ,
DOI : 10.1145/1755913.1755943
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.150.3281