Supporting Social Networks With Agent-Based Services

Author:

Tomaiuolo Michele1,Poggi Agostino1,Franchi Enrico1

Affiliation:

1. Department of Information Engineering, University of Parma, Parma, Italy

Abstract

Current approaches to build social networking systems are based on a centralized architecture because it allows a simple browser-based user experience and makes easier and more efficient to implement many algorithms used in a social networking site (e.g., friend suggestion), However this kind of architecture has many drawbacks for its users, e.g., lack of privacy, lack of anonymity, risks of censorship and operating costs. This paper presents a system, called Blogracy, which uses widespread and stable peer-to-peer technologies, such as distributed hash tables and BitTorrent, for coping with intrinsic defects of centralized architectures and for being the basis of solid distributed social networking platforms. Moreover, Blogracy takes advantages of multi-agent systems for simplifying the implementation of social network services in a decentralized setting.

Publisher

IGI Global

Subject

General Economics, Econometrics and Finance

Reference49 articles.

1. W3C Consortium (2009). OWL 2 web ontology language overview. Retrieved July 3, 2013, from http://www.w3.org/TR/owl2-overview

2. W3C Consortium. (2013). OStatus community group. Retrieved July 3, 2013, from http://www.w3.org/community/ostatus

3. Activity Streams. (2013). Activity streams documentation. Retrieved July 3, 2013, from http://activitystrea.ms

4. Apache Foundation. (2013). Nutch software. Retrieved July 3, 2013, from http://nutch.apache.org

5. Baden, R., Bender, A., Spring, N., Bhattacharjee, B., & Starin, D. (2009). Persona: An online social network with user-defined privacy. In Proceedings of the ACM Conference on Data Communication (pp. 135-146), Barcellona, Spain: ACM.

Cited by 4 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Information Attacks and Defenses on the Social Web;Global Implications of Emerging Technology Trends;2018

2. Runtime Verification and Quality Assessment for Privacy Violations Detection in Social Networking System;FRONT ARTIF INTEL AP;2016

3. Information and Password Attacks on Social Networks;Journal of Information Technology Research;2015-01

4. Information Attacks on Online Social Networks;Journal of Information Technology Research;2014-07

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3