{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T13:10:40Z","timestamp":1762866640216},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2015,6,5]],"date-time":"2015-06-05T00:00:00Z","timestamp":1433462400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1007\/s12083-015-0366-7","type":"journal-article","created":{"date-parts":[[2015,6,4]],"date-time":"2015-06-04T06:14:54Z","timestamp":1433398494000},"page":"1177-1194","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":52,"title":["DiDuSoNet: A P2P architecture for distributed Dunbar-based social networks"],"prefix":"10.1007","volume":"9","author":[{"given":"Barbara","family":"Guidi","sequence":"first","affiliation":[]},{"given":"Tobias","family":"Amft","sequence":"additional","affiliation":[]},{"given":"Andrea","family":"De Salve","sequence":"additional","affiliation":[]},{"given":"Kalman","family":"Graffi","sequence":"additional","affiliation":[]},{"given":"Laura","family":"Ricci","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,6,5]]},"reference":[{"key":"366_CR1","doi-asserted-by":"publisher","unstructured":"Datta A, Buchegger S, Vu L-H, Strufe T, Rzadca K (2010) Decentralized online social networks. In: Handbook of social network technologies and applications. Springer","DOI":"10.1007\/978-1-4419-7142-5_17"},{"key":"366_CR2","doi-asserted-by":"publisher","unstructured":"Adya A, Bolosky WJ, Castro M, Cermak G, Chaiken R, Douceur JR, Howell J, Lorch JR, Theimer M, Wattenhofer RP (2002) Farsite: Federated, available, and reliable storage for an incompletely trusted environment. In: Proceedings of the 5th symposium on operating systems design and implementation (OSDI)","DOI":"10.1145\/1060289.1060291"},{"key":"366_CR3","doi-asserted-by":"publisher","unstructured":"Narendula R, Papaioannou TG, Aberer K (2012) A decentralized online social network with efficient user-driven replication. In: International Conference on Social Computing (SocialCom)","DOI":"10.1109\/SocialCom-PASSAT.2012.127"},{"key":"366_CR4","unstructured":"Schi\u00f6berg D, Schneider F, Tr\u00e9dan G, Uhlig S, Feldmann A (2012) Revisiting content availability in distributed online social networks. CoRR. arXiv: http:\/\/arxiv.org\/abs\/1210.1394"},{"key":"366_CR5","unstructured":"Tinedo RG, Artigas MS, Lo\u0307pez PG (2012) Analysis of data availability in F2F storage systems: When correlations matter. In: Proceedings of the 12th international conference on peer-to-peer computing (P2P)"},{"key":"366_CR6","doi-asserted-by":"crossref","unstructured":"Dunbar RIM (1998) The social brain hypothesis. Evolutionary Anthropology: Issues, News, and Reviews vol. 6","DOI":"10.1002\/(SICI)1520-6505(1998)6:5<178::AID-EVAN5>3.3.CO;2-P"},{"key":"366_CR7","doi-asserted-by":"publisher","unstructured":"Roberts SGB, Dunbar RIM, Pollet TV, Kuppens T (2009) Exploring variation in active network size: Constraints and ego characteristics. Soc Networks 31","DOI":"10.1016\/j.socnet.2008.12.002"},{"key":"366_CR8","doi-asserted-by":"publisher","unstructured":"Sutcliffe A, Dunbar R, Binder J, Arrow H (2012) Relationships and the social brain: Integrating psychological and evolutionary perspectives. Br J Psychol 103","DOI":"10.1111\/j.2044-8295.2011.02061.x"},{"key":"366_CR9","doi-asserted-by":"crossref","unstructured":"Graffi K, Gross C, Stingl D, Hartung D, Kovacevic A, Steinmetz R (2011) LifeSocial.KOM: A secure and p2p-based solution for online social networks. In: IEEE CCNC","DOI":"10.1109\/CCNC.2011.5766541"},{"key":"366_CR10","doi-asserted-by":"publisher","unstructured":"Tran DN, Chiang F, Li J (2008) Friendstore: Cooperative online backup using trusted nodes. In: Proceedings of the 1st workshop on social network systems (SNS)","DOI":"10.1145\/1435497.1435504"},{"key":"366_CR11","doi-asserted-by":"publisher","unstructured":"Cutillo LA, Molva R, Strufe T (2009) Safebook: A privacy preserving online social network leveraging on real-life trust. IEEE Commun Mag 47","DOI":"10.1109\/MCOM.2009.5350374"},{"key":"366_CR12","unstructured":"Diaspora Website https:\/\/diasporafoundation.org\/"},{"key":"366_CR13","unstructured":"Sharma R, Datta A (2011) SuperNova: Super-peers based architecture for decentralized online social networks. CoRR. arXiv: http:\/\/arxiv.org\/abs\/1105.0074"},{"key":"366_CR14","unstructured":"Li J, Dabek F (2006) F2F: Reliable storage in open networks. In: Proceedings of the 5th international workshop on peer-to-peer systems (IPTPS)"},{"key":"366_CR15","doi-asserted-by":"publisher","unstructured":"Pamies-Juarez L, Lo\u0307pez PG, Artigas MS (2009) Heterogeneity-aware erasure codes for peer-to-peer storage systems. In: International conference on parallel processing (ICPP)","DOI":"10.1109\/ICPP.2009.15"},{"key":"366_CR16","doi-asserted-by":"publisher","unstructured":"Blond S, Fessant F, Merrer E (2009) Finding good partners in availability-aware P2P networks. In: Proceedings of the 11th international symposium on stabilization, safety, and security of distributed systems (SSS)","DOI":"10.1007\/978-3-642-05118-0_33"},{"key":"366_CR17","unstructured":"Mickens JW, Noble BD (2006) Exploiting availability prediction in distributed systems. In: Proceedings of the 3rd symposium on networked systems design and implementation (NSDI)"},{"key":"366_CR18","doi-asserted-by":"publisher","unstructured":"Boutet A, Kermarrec A-M, Le Merrer E, Van Kempen A (2012) On the impact of users availability in OSNs. In: Proceedings of the 5th workshop on social network systems (SNS)","DOI":"10.1145\/2181176.2181180"},{"key":"366_CR19","doi-asserted-by":"publisher","unstructured":"Sharma R, Datta A, Dell\u2019Amico M, Michiardi P (2011) An empirical study of availability in friend-to-friend storage systems. In: International conference on peer-to-peer computing (P2P)","DOI":"10.1109\/P2P.2011.6038754"},{"key":"366_CR20","unstructured":"Li J, Dabek F (2006) F2F: Reliable storage in open networks. In: Proceedings of the 5th international workshop on peer-to-peer systems (IPTPS)"},{"key":"366_CR21","doi-asserted-by":"publisher","unstructured":"Conti M, De Salve A, Guidi B, Ricci L (2014) Epidemic diffusion of social updates in dunbar based dosn. In: 2nd workshop on large scale distributed virtual environments on clouds and P2P (LSDVE 2014)","DOI":"10.1007\/978-3-319-14325-5_27"},{"key":"366_CR22","doi-asserted-by":"publisher","unstructured":"Conti M, De Salve A, Guidi B, Pitto F, Ricci L (2014) Trusted dynamic storage for dunbar-based P2P online social networks. In: On the move to meaningful internet systems: OTM 2014 conferences","DOI":"10.1007\/978-3-662-45563-0_23"},{"key":"366_CR23","doi-asserted-by":"publisher","unstructured":"Balakrishnan H, Kaashoek MF, Karger D, Morris R, Stoica I (2003) Looking up data in P2P systems. Commun ACM 46","DOI":"10.1145\/606272.606299"},{"key":"366_CR24","doi-asserted-by":"publisher","unstructured":"Benevenuto F, Rodrigues T, Cha M, Almeida VAF (2009) Characterizing user behavior in online social networks. In: Proceedings of the 9th conference on internet measurement","DOI":"10.1145\/1644893.1644900"},{"key":"366_CR25","doi-asserted-by":"publisher","unstructured":"Mega G, Montresor A, Picco GP (2011) Efficient dissemination in decentralized social networks. In: International conference on peer-to-peer computing (P2P)","DOI":"10.1109\/P2P.2011.6038753"},{"key":"366_CR26","doi-asserted-by":"publisher","unstructured":"Arnaboldi V, Guazzini A, Passarella A (2013) Egocentric online social networks: Analysis of key features and prediction of tie strength in Facebook. Comput Commun 36","DOI":"10.1016\/j.comcom.2013.03.003"},{"key":"366_CR27","doi-asserted-by":"publisher","unstructured":"Everett MG, Borgatti SP (2005) Ego network betweenness. Soc Networks 27","DOI":"10.1016\/j.socnet.2004.11.007"},{"key":"366_CR28","doi-asserted-by":"publisher","unstructured":"Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Advances in Cryptology - EUROCRYPT 2005. Springer","DOI":"10.1007\/11426639_27"},{"key":"366_CR29","doi-asserted-by":"publisher","unstructured":"Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: Symposium on security and privacy (SP)","DOI":"10.1109\/SP.2007.11"},{"key":"366_CR30","doi-asserted-by":"publisher","unstructured":"Rowstron AIT, Druschel P (2001) Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems. In: Proceedings of the international conference on distributed systems platforms","DOI":"10.1007\/3-540-45518-3_18"},{"key":"366_CR31","doi-asserted-by":"publisher","unstructured":"Stoica I, Morris R, Karger D, Kaashoek MF, Balakrishnan H (2001) Chord: A scalable peer-to-peer lookup service for internet applications. In: Proceedings of the international conference on applications, technologies, architectures, and protocols for computer communications","DOI":"10.1145\/383059.383071"},{"key":"366_CR32","doi-asserted-by":"publisher","unstructured":"Bhagwan R, Savage S, Voelker G (2003) Understanding availability. In: Proceedings of IPTPS\u201903","DOI":"10.1007\/978-3-540-45172-3_24"},{"key":"366_CR33","doi-asserted-by":"publisher","unstructured":"La Gala M, Arnaboldi V, Conti M, Passarella A (2012) Ego-Net digger: A new way to study ego networks in online social networks. In: Proceedings of the 1st ACM international workshop on hot topics on interdisciplinary social networks research","DOI":"10.1145\/2392622.2392624"},{"key":"366_CR34","doi-asserted-by":"publisher","unstructured":"Golder S, Wilkinson D, Huberman B (2007) Rhythms of social interaction: Messaging within a massive online network. In: Communities and technologies 2007, pp 41\u201366","DOI":"10.1007\/978-1-84628-905-7_3"},{"key":"366_CR35","doi-asserted-by":"crossref","unstructured":"Graffi K (2011) PeerfactSim.KOM: A P2P system simulator experiences and lessons learned. In: Proceedings of the international conference on peer-to-peer computing (P2P)","DOI":"10.1109\/P2P.2011.6038673"},{"key":"366_CR36","doi-asserted-by":"crossref","unstructured":"Feldotto M, Graffi K (2013) Comparative evaluation of peer-to-peer systems using PeerfactSim.KOM. In: International conference on high performance computing and simulation (HPCS)","DOI":"10.1109\/HPCSim.2013.6641399"},{"key":"366_CR37","doi-asserted-by":"publisher","unstructured":"Ng TSE, Zhang H (2002) Predicting internet network distance with coordinates-based approaches. In: Proceedings of the international conference on the joint conference of the ieee computer and communications societies","DOI":"10.1109\/INFCOM.2002.1019258"},{"key":"366_CR38","doi-asserted-by":"publisher","unstructured":"Matthews W, Cottrell L (2000) The PingER Project: Active internet performance monitoring for the HENP community. IEEE Commun Mag 38","DOI":"10.1109\/35.841837"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-015-0366-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-015-0366-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-015-0366-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,25]],"date-time":"2019-08-25T23:34:55Z","timestamp":1566776095000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-015-0366-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6,5]]},"references-count":38,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2016,11]]}},"alternative-id":["366"],"URL":"https:\/\/doi.org\/10.1007\/s12083-015-0366-7","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,6,5]]}}}