Key Agreement in Dynamic Peer Groups
IEEE Transactions on Parallel and Distributed Systems
Open Problems in Data-Sharing Peer-to-Peer Systems
ICDT '03 Proceedings of the 9th International Conference on Database Theory
RAMBO: A Reconfigurable Atomic Memory Service for Dynamic Networks
DISC '02 Proceedings of the 16th International Conference on Distributed Computing
Routing Algorithms for DHTs: Some Open Questions
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Efficient, Self-Contained Handling of Identity in Peer-to-Peer Systems
IEEE Transactions on Knowledge and Data Engineering
SybilGuard: defending against sybil attacks via social networks
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
TRIBLER: a social-based peer-to-peer system: Research Articles
Concurrency and Computation: Practice & Experience - Recent Advances in Peer-to-Peer Systems and Security (P2P 2006)
PINTS: peer-to-peer infrastructure for tagging systems
IPTPS'08 Proceedings of the 7th international conference on Peer-to-peer systems
PeerSoN: P2P social networking: early experiences and insights
Proceedings of the Second ACM EuroSys Workshop on Social Network Systems
Virtual individual servers as privacy-preserving proxies for mobile devices
Proceedings of the 1st ACM workshop on Networking, systems, and applications for mobile handhelds
Privacy-enabling social networking over untrusted networks
Proceedings of the 2nd ACM workshop on Online social networks
Privacy, cost, and availability tradeoffs in decentralized OSNs
Proceedings of the 2nd ACM workshop on Online social networks
Lockr: better privacy for social networks
Proceedings of the 5th international conference on Emerging networking experiments and technologies
Privacy and security for online social networks: challenges and opportunities
IEEE Network: The Magazine of Global Internetworking
LotusNet: Tunable privacy for distributed online social network services
Computer Communications
Asknext: An agent protocol for social search
Information Sciences: an International Journal
SocialClouds: concept, security architecture and some mechanisms
INTRUST'09 Proceedings of the First international conference on Trusted Systems
Towards robust and scalable peer-to-peer social networks
Proceedings of the Fifth Workshop on Social Network Systems
Trust-aware query routing in P2P social networks
International Journal of Communication Systems
Enabling private conversations on Twitter
Proceedings of the 28th Annual Computer Security Applications Conference
Social networks for importing and exporting security
Proceedings of the 17th Monterey conference on Large-Scale Complex IT Systems: development, operation and management
Modeling Social Network Interaction Graphs
ASONAM '12 Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012)
An Analysis of Query Forwarding Strategies for Secure and Privacy-Preserving Social Networks
ASONAM '12 Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012)
Social Networked Multi-agent Negotiation in Ontology Alignment
WI-IAT '12 Proceedings of the The 2012 IEEE/WIC/ACM International Joint Conferences on Web Intelligence and Intelligent Agent Technology - Volume 02
Survey of social search from the perspectives of the village paradigm and online social networks
Journal of Information Science
Question Waves: A multicast query routing algorithm for social search
Information Sciences: an International Journal
Enabling decentralised microblogging through P2PVPNs
International Journal of Security and Networks
Hi-index | 0.00 |
Online Social Networks like Facebook, MySpace, Xing, etc. have become extremely popular. Yet they have some limitations that we want to overcome for a next generation of social networks: privacy concerns and requirements of Internet connectivity, both of which are due to web-based applications on a central site whose owner has access to all data. To overcome these limitations, we envision a paradigm shift from client-server to a peer-to-peer infrastructure coupled with encryption so that users keep control of their data and can use the social network also locally, without Internet access. This shift gives rise to many research questions intersecting networking, security, distributed systems and social network analysis, leading to a better understanding of how technology can support social interactions. This paper is an attempt to identify the core functionalities necessary to build social networking applications and services, and the research challenges in realizing them in a decentralized setting. In the tradition of research-path defining papers in the peer-to-peer community [5, 14], we highlight some challenges and opportunities for peer-to-peer in the era of social networks. We also present our own approach at realizing peer-to-peer social networks.