Structured streams: a new transport abstraction
Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications
SPATE: small-group PKI-less authenticated trust establishment
Proceedings of the 7th international conference on Mobile systems, applications, and services
Basic design of a user-driven service creation platform assisted by cellular systems
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Context-based name resolution service for the next-generation internet
INFOCOM'09 Proceedings of the 28th IEEE international conference on Computer Communications Workshops
User-centered design of a secure P2P personal and social networking platform
HCI '08 Proceedings of the Third IASTED International Conference on Human Computer Interaction
Haggle: seamless networking for mobile applications
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Identity trail: covert surveillance using DNS
PET'07 Proceedings of the 7th international conference on Privacy enhancing technologies
Privacy-preserving P2P data sharing with OneSwarm
Proceedings of the ACM SIGCOMM 2010 conference
PodBase: transparent storage management for personal devices
IPTPS'08 Proceedings of the 7th international conference on Peer-to-peer systems
Eyo: device-transparent personal storage
USENIXATC'11 Proceedings of the 2011 USENIX conference on USENIX annual technical conference
Autonomous storage management for personal devices with PodBase
USENIXATC'11 Proceedings of the 2011 USENIX conference on USENIX annual technical conference
On grappling with meta-information in the internet
ACM SIGCOMM Computer Communication Review
A design and implementation of nickname-based sockets for applications inside NATed network
AINTEC '11 Proceedings of the 7th Asian Internet Engineering Conference
Efficient cooperative backup with decentralized trust management
ACM Transactions on Storage (TOS)
Don't trust your roommate or access control and replication protocols in "Home" environments
HotStorage'12 Proceedings of the 4th USENIX conference on Hot Topics in Storage and File Systems
Trust-aware query routing in P2P social networks
International Journal of Communication Systems
SocioPhone: everyday face-to-face interaction monitoring platform using multi-phone sensor fusion
Proceeding of the 11th annual international conference on Mobile systems, applications, and services
Extending the web to support personal network services
Proceedings of the 28th Annual ACM Symposium on Applied Computing
Hi-index | 0.00 |
The Unmanaged Internet Architecture (UIA) provides zero-configuration connectivity among mobile devices through personal names. Users assign personal names through an ad hoc device introduction process requiring no central allocation. Once assigned, names bind securely to the global identities of their target devices independent of network location. Each user manages one namespace, shared among all the user's devices and always available on each device. Users can also name other users to share resources with trusted acquaintances. Devices with naming relationships automatically arrange connectivity when possible, both in ad hoc networks and using global infrastructure when available. A UIA prototype demonstrates these capabilities using optimistic replication for name resolution and group management and a routing algorithm exploiting the user's social network for connectivity.