{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T14:16:22Z","timestamp":1730297782195,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,9]]},"DOI":"10.1109\/socialcom-passat.2012.127","type":"proceedings-article","created":{"date-parts":[[2013,1,17]],"date-time":"2013-01-17T20:32:19Z","timestamp":1358454739000},"page":"166-175","source":"Crossref","is-referenced-by-count":19,"title":["A Decentralized Online Social Network with Efficient User-Driven Replication"],"prefix":"10.1109","author":[{"given":"Rammohan","family":"Narendula","sequence":"first","affiliation":[]},{"given":"Thanasis G.","family":"Papaioannou","sequence":"additional","affiliation":[]},{"given":"Karl","family":"Aberer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658959"},{"key":"17","article-title":"The failure of online social network privacy settings","author":"madejski","year":"0","journal-title":"Department of Computer Science"},{"key":"18","article-title":"Involuntary information leakage in social network services","author":"lam","year":"2008","journal-title":"Proc 1st Int Workshop on Security"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177090"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068823"},{"key":"13","article-title":"Outtweeting the twitterers-predicting information cascades in microblogs","author":"galuba","year":"2010","journal-title":"Proc WOSN"},{"journal-title":"An experimental study of the skype peer-to-peer voip system","year":"2006","author":"guha","key":"14"},{"key":"11","article-title":"Towards the realization of decentralized onlinesocial networks: An empirical study","author":"rammohan","year":"2012","journal-title":"Proc of the ICDCS Workshops HOTPOST"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1592665.1592675"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/1456403.1456405"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592585"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/1592665.1592669"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/1578002.1578010"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/1989240.1989253"},{"key":"25","article-title":"Decent: A decentralized architecture for enforcing privacy in online social networks","author":"sonia","year":"2012","journal-title":"Proc SES"},{"key":"26","article-title":"Towards access control aware p2p data management systems","author":"rammohan","year":"2009","journal-title":"Proc of the 2nd International Workshop on Data Management in Peer-to-peer Systems"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.1189"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2009.5355085"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2010.67"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1592665.1592668"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1397735.1397747"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2004.08.013"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298311"},{"year":"0","key":"30"},{"year":"0","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644899"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644900"},{"key":"4","article-title":"Privacy-aware and highly-available osn profiles","author":"rammohan","year":"2010","journal-title":"Proc Sixth IEEE Workshops Enablings Technologies Infrastructure for Collaborative Enterprises (WETICE)"},{"key":"9","first-page":"63","volume":"2","author":"fung","year":"2011","journal-title":"Collaborative Intrusion Detection Networks and Insider Attacks"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/WONS.2009.4801860"}],"event":{"name":"2012 International Conference on Privacy, Security, Risk and Trust (PASSAT)","start":{"date-parts":[[2012,9,3]]},"location":"Amsterdam, Netherlands","end":{"date-parts":[[2012,9,5]]}},"container-title":["2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6403618\/6406254\/06406281.pdf?arnumber=6406281","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T00:14:26Z","timestamp":1490141666000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6406281\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/socialcom-passat.2012.127","relation":{},"subject":[],"published":{"date-parts":[[2012,9]]}}}