Sciweavers

101 search results - page 17 / 21
» Service Graphs for Building Trust
Sort
View
CONEXT
2009
ACM
13 years 8 months ago
StarClique: guaranteeing user privacy in social networks against intersection attacks
Building on the popularity of online social networks (OSNs) such as Facebook, social content-sharing applications allow users to form communities around shared interests. Millions...
Krishna P. N. Puttaswamy, Alessandra Sala, Ben Y. ...
SOSP
1997
ACM
13 years 9 months ago
Frangipani: A Scalable Distributed File System
The idealdistributed file system wouldprovide all its userswith coherent,shared access tothe samesetoffiles,yetwould be arbitrarily scalable to provide more storage space and hi...
Chandramohan A. Thekkath, Timothy Mann, Edward K. ...
SIGIR
2009
ACM
14 years 2 months ago
Detecting spammers and content promoters in online video social networks
A number of online video social networks, out of which YouTube is the most popular, provides features that allow users to post a video as a response to a discussion topic. These f...
Fabrício Benevenuto, Tiago Rodrigues, Virg&...
49
Voted
ATC
2006
Springer
13 years 11 months ago
Ubisafe Computing: Vision and Challenges (I)
In recent years, a variety of new computing paradigms have been proposed for various purposes. It is true that many of them intend to and really can gratify some of the people some...
Jianhua Ma, Qiangfu Zhao, Vipin Chaudhary, Jingde ...
ESORICS
2008
Springer
13 years 9 months ago
Cryptographic Protocol Explication and End-Point Projection
Abstract. Cryptographic protocols are useful for engineering trust in transactions. There are several languages for describing these protocols, but these tend to capture the commun...
Jay A. McCarthy, Shriram Krishnamurthi