The design and implementation of an intentional naming system
Proceedings of the seventeenth ACM symposium on Operating systems principles
A scalable content-addressable network
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Securing distributed adaptation
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue on programmable networks
Censorship resistant peer-to-peer content addressable networks
SODA '02 Proceedings of the thirteenth annual ACM-SIAM symposium on Discrete algorithms
Chord: a scalable peer-to-peer lookup protocol for internet applications
IEEE/ACM Transactions on Networking (TON)
Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems
Middleware '01 Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
Secure and Resilient Peer-to-Peer E-Mail: Design and Implementation
P2P '03 Proceedings of the 3rd International Conference on Peer-to-Peer Computing
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
Inferring binary trust relationships in Web-based social networks
ACM Transactions on Internet Technology (TOIT)
NSDI'06 Proceedings of the 3rd conference on Networked Systems Design & Implementation - Volume 3
SPROUT: P2P routing with social networks
EDBT'04 Proceedings of the 2004 international conference on Current Trends in Database Technology
Tapestry: a resilient global-scale overlay for service deployment
IEEE Journal on Selected Areas in Communications
An intrusion detection system in ad hoc networks: a social network analysis approach
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Flexible and secure service discovery in ubiquitous computing
Journal of Network and Computer Applications
Efficiency of social connection-based routing in P2P VoIP networks
COMSNETS'10 Proceedings of the 2nd international conference on COMmunication systems and NETworks
SocialWiki: bring order to wiki systems with social context
SocInfo'10 Proceedings of the Second international conference on Social informatics
Hi-index | 0.00 |
Internet based communication systems appear in many forms from email to Instant Messenger and chat services to Voice over IP (VoIP). Common weaknesses of these current communication systems include inherent security vulnerabilities to attacks such as SPAM/SPIT/SPIM and DDoS, a lack of separation between routing address and identity, and a lack of message receiver controllability. Based on these observations, we describe preliminary ideas and analysis of a new communication architecture called DSL (Davis Social Links), which integrates the trust relationships of social networks into the internet communication infrastructure to provide receiver controllability, traceability, and global connectivity without centralized services or globally unique IDs. Although it is still in the early stages of development, we believe that DSL can help thwart many large-scale information-based attacks faced by the Internet community.