2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom) 2008
DOI: 10.1109/percom.2008.40
|View full text |Cite
|
Sign up to set email alerts
|

MyNet: A Platform for Secure P2P Personal and Social Networking Services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
26
0
1

Year Published

2009
2009
2020
2020

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 44 publications
(27 citation statements)
references
References 19 publications
0
26
0
1
Order By: Relevance
“…This class, named TestNearTweet, overloads two methods guiIn and guiOut that specifies how a virtual user provides input to the application and test output from the application. For the NearTweet application, input is performed by typing text in the input panel and pressing a button (lines 11-14), and output validation requires testing either the status panel (lines [22][23][24][25] or the output panel (lines [26][27][28][29]. Because the input and output places are parameterized by the T-Net graph, the tester methods receive an identifier (id for short) to differentiate in/out operations, and a parameter list of values to be used by the tester methods.…”
Section: T-net Specificationmentioning
confidence: 99%
See 1 more Smart Citation
“…This class, named TestNearTweet, overloads two methods guiIn and guiOut that specifies how a virtual user provides input to the application and test output from the application. For the NearTweet application, input is performed by typing text in the input panel and pressing a button (lines 11-14), and output validation requires testing either the status panel (lines [22][23][24][25] or the output panel (lines [26][27][28][29]. Because the input and output places are parameterized by the T-Net graph, the tester methods receive an identifier (id for short) to differentiate in/out operations, and a parameter list of values to be used by the tester methods.…”
Section: T-net Specificationmentioning
confidence: 99%
“…This capability has prompted new mobile applications that leverage occasional encounters of users in various social contexts, e.g., for mobile social networking [22,13,9], content sharing [15,12], mobile ad-hoc gaming [5,16], and more [19,21,31,24]. Specialized middleware [3, 32,25,18,7] has also been produced to facilitate the development of such applications. While the general term ad-hoc network has been used to designate opportunisticallyformed networks of devices (e.g., sensor networks), we use the term encounter networks to refer to this special case of ad-hoc networks that target co-located moving personal devices and involve social interactions.…”
Section: Introductionmentioning
confidence: 99%
“…Recently, several peer-to-peer (P2P) based distributed online social networks (DOSN) have been proposed to preserve users' privacy ( [57,68,42,114,76]). In all these solutions, users' data is not stored by a centralized OSN provider anymore.…”
Section: Appendix C Privacy Preserving Picture Sharing In Distributedmentioning
confidence: 99%
“…In order to avoid such a centralized control by service providers over user data, some solutions [57,68,42,114,76] propose to design new applications based on a peer-to-peer architecture while leveraging real life social links to construct a network with trusted peers. The correct execution of any network/application operation depends on users' behavior.…”
Section: C22 Decentralized Online Social Networkmentioning
confidence: 99%
“…There are also a number of initiatives that address peerto-peer (P2P) collaborations ( [9], [12], [15]) that address P2P collaborations. Similar calendar-based and/or enterprise networking tools are available for collaboration.…”
Section: Related Workmentioning
confidence: 99%