{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:38:44Z","timestamp":1750307924865,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,6,11]],"date-time":"2007-06-11T00:00:00Z","timestamp":1181520000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,6,11]]},"DOI":"10.1145\/1247480.1247508","type":"proceedings-article","created":{"date-parts":[[2007,9,14]],"date-time":"2007-09-14T16:07:37Z","timestamp":1189786057000},"page":"235-246","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["Homeviews"],"prefix":"10.1145","author":[{"given":"Roxana","family":"Geambasu","sequence":"first","affiliation":[{"name":"University of Washington, Seattle, WA"}]},{"given":"Magdalena","family":"Balazinska","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, WA"}]},{"given":"Steven D.","family":"Gribble","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, WA"}]},{"given":"Henry M.","family":"Levy","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, WA"}]}],"member":"320","published-online":{"date-parts":[[2007,6,11]]},"reference":[{"issue":"1","key":"e_1_3_2_1_1_1","first-page":"1","volume":"29","author":"Anderson M.","year":"1986","unstructured":"M. Anderson , R. D. Pose , and C. S. Wallace . A Password-Capability System. The Computer Journal , 29 ( 1 ): 1 -- 8 , 1986 . M. Anderson, R. D. Pose, and C. S. Wallace. A Password-Capability System. The Computer Journal, 29(1):1--8, 1986.","journal-title":"A Password-Capability System. The Computer Journal"},{"unstructured":"Beagle: Quickly find the stuff you care about. http:\/\/beagle-project.org\/Main_Page 2006.  Beagle: Quickly find the stuff you care about. http:\/\/beagle-project.org\/Main_Page 2006.","key":"e_1_3_2_1_2_1"},{"unstructured":"BitTorrent. BitTorrent Home Page. http:\/\/bittorrent.com\/ 2006.  BitTorrent. BitTorrent Home Page. http:\/\/bittorrent.com\/ 2006.","key":"e_1_3_2_1_3_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.5555\/1316689.1316699"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1145\/195792.195795"},{"volume-title":"http:\/\/dcplusplus.sourceforge.net\/","year":"2006","unstructured":"Dc++. http:\/\/dcplusplus.sourceforge.net\/ , 2006 . Dc++. http:\/\/dcplusplus.sourceforge.net\/, 2006.","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","volume-title":"Proc. of the CIDR Conf.","author":"Dong X.","year":"2005","unstructured":"X. Dong and A. Halevy . A platform for personal information management and integration . In Proc. of the CIDR Conf. , January 2005 . X. Dong and A. Halevy. A platform for personal information management and integration. In Proc. of the CIDR Conf., January 2005."},{"unstructured":"M. Erdos and S. Cantor. Shibboleth architecture draft v05. http:\/\/shibboleth.internet2.edu\/docs\/draft-internet2-shibboleth-arch-v0%5.pdf 2002.  M. Erdos and S. Cantor. Shibboleth architecture draft v05. http:\/\/shibboleth.internet2.edu\/docs\/draft-internet2-shibboleth-arch-v0%5.pdf 2002.","key":"e_1_3_2_1_8_1"},{"unstructured":"Flickr. Flickr Home Page. http:\/\/flickr.com\/ 2006.  Flickr. Flickr Home Page. http:\/\/flickr.com\/ 2006.","key":"e_1_3_2_1_9_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1145\/1107499.1107502"},{"unstructured":"Gallery. Gallery: Your photos on your website. http:\/\/gallery.menalto.com\/ 2002.  Gallery. Gallery: Your photos on your website. http:\/\/gallery.menalto.com\/ 2002.","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","volume-title":"Database Systems: The Complete Book","author":"Garcia-Molina H.","year":"2002","unstructured":"H. Garcia-Molina , J. D. Ullman , and J. Widom . Database Systems: The Complete Book . Prentice Hall , 2002 . H. Garcia-Molina, J. D. Ullman, and J. Widom. Database Systems: The Complete Book. Prentice Hall, 2002."},{"unstructured":"P. Gathani S. Fashokun and R. Jean-Baptiste. Microsoft SQL Server version 2000: Full-text search deployment. White Paper. http:\/\/support.microsoft.com\/ May 2002.  P. Gathani S. Fashokun and R. Jean-Baptiste. Microsoft SQL Server version 2000: Full-text search deployment. White Paper. http:\/\/support.microsoft.com\/ May 2002.","key":"e_1_3_2_1_13_1"},{"unstructured":"Google. Google Desktop: Info when you want it right on your desktop. http:\/\/desktop.google.com\/ 2006.  Google. Google Desktop: Info when you want it right on your desktop. http:\/\/desktop.google.com\/ 2006.","key":"e_1_3_2_1_14_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1145\/1142351.1142352"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1145\/360303.360333"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.5555\/800052.801885"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.5555\/1315451.1315480"},{"unstructured":"iFolder. How to: Enabling sharing with Gaim. http:\/\/www.ifolder.com\/index.php\/HowTo:Enabling_Sharing_with_Gaim 2006.  iFolder. How to: Enabling sharing with Gaim. http:\/\/www.ifolder.com\/index.php\/HowTo:Enabling_Sharing_with_Gaim 2006.","key":"e_1_3_2_1_19_1"},{"unstructured":"Internet2. Shibboleth. http:\/\/shibboleth.internet2.edu 2006.  Internet2. Shibboleth. http:\/\/shibboleth.internet2.edu 2006.","key":"e_1_3_2_1_20_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1145\/1142473.1142475"},{"unstructured":"V. Jhaveri. WinFS team blog: Synchronize your WinFS data with Microsoft Rave. http:\/\/blogs.msdn.com\/winfs\/archive\/2005\/09\/08\/462698.aspx 2005.  V. Jhaveri. WinFS team blog: Synchronize your WinFS data with Microsoft Rave. http:\/\/blogs.msdn.com\/winfs\/archive\/2005\/09\/08\/462698.aspx 2005.","key":"e_1_3_2_1_22_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1145\/28697.28705"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1145\/35037.42182"},{"key":"e_1_3_2_1_25_1","volume-title":"Proc. of the CIDR Conf.","author":"Karger D.","year":"2005","unstructured":"D. Karger , K. Bakshi , D. Huynh , D. Quan , and V. Sinha . Haystack: A customizable general-purpose information management tool for end users of semistructured data . In Proc. of the CIDR Conf. , January 2005 . D. Karger, K. Bakshi, D. Huynh, D. Quan, and V. Sinha. Haystack: A customizable general-purpose information management tool for end users of semistructured data. In Proc. of the CIDR Conf., January 2005."},{"unstructured":"Kazaa. Kazaa Home Page. http:\/\/kazaa.com\/ 2006.  Kazaa. Kazaa Home Page. http:\/\/kazaa.com\/ 2006.","key":"e_1_3_2_1_26_1"},{"key":"e_1_3_2_1_27_1","volume-title":"Capability-Based Computer Systems","author":"Levy H. M.","year":"1984","unstructured":"H. M. Levy . Capability-Based Computer Systems . Digital Press , 1984 . H. M. Levy. Capability-Based Computer Systems. Digital Press, 1984."},{"unstructured":"S. Mehrotra. WinFS team blog: What a week. http:\/\/blogs.msdn.com\/winfs\/archive\/2005\/09\/01\/459421.aspx 2001.  S. Mehrotra. WinFS team blog: What a week. http:\/\/blogs.msdn.com\/winfs\/archive\/2005\/09\/01\/459421.aspx 2001.","key":"e_1_3_2_1_28_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.5555\/1315451.1315528"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_30_1","DOI":"10.1109\/ICDE.2003.1260827"},{"unstructured":"OASIS. Oasis security assertion markup language (SAML). http:\/\/www.oasis-open.org\/committees\/security.  OASIS. Oasis security assertion markup language (SAML). http:\/\/www.oasis-open.org\/committees\/security.","key":"e_1_3_2_1_31_1"},{"key":"e_1_3_2_1_32_1","volume-title":"A Programmer's View of the Intel 432 System","author":"Organick E. I.","year":"1983","unstructured":"E. I. Organick . A Programmer's View of the Intel 432 System . McGraw-Hill , 1983 . E. I. Organick. A Programmer's View of the Intel 432 System. McGraw-Hill, 1983."},{"key":"e_1_3_2_1_33_1","volume-title":"Principles of Distributed Database Systems","author":"Tamer \u00d6zsu M.","year":"1999","unstructured":"M. Tamer \u00d6zsu and P. Valduriez . Principles of Distributed Database Systems . Prentice Hall , second edition, 1999 . M. Tamer \u00d6zsu and P. Valduriez. Principles of Distributed Database Systems. Prentice Hall, second edition, 1999."},{"key":"e_1_3_2_1_34_1","volume-title":"Password-capabilities: Their evolution from the Password-Capability System into Walnut and beyond","author":"Pose R.","year":"2001","unstructured":"R. Pose . Password-capabilities: Their evolution from the Password-Capability System into Walnut and beyond . IEEE Computer Society , 2001 . R. Pose. Password-capabilities: Their evolution from the Password-Capability System into Walnut and beyond. IEEE Computer Society, 2001."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_35_1","DOI":"10.1145\/1007568.1007631"},{"key":"e_1_3_2_1_36_1","volume-title":"Proc. of IFIP WG11","author":"Rosenthal A.","year":"2001","unstructured":"A. Rosenthal and E. Sciore . Administering permissions for distributed data: Factoring and automated inference . In Proc. of IFIP WG11 .3 Conf. , 2001 . A. Rosenthal and E. Sciore. Administering permissions for distributed data: Factoring and automated inference. In Proc. of IFIP WG11.3 Conf., 2001."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_37_1","DOI":"10.1145\/319151.319163"},{"unstructured":"Spotlight: Find anything on your Mac instantly. Technology Brief http:\/\/www.apple.com\/macosx\/features\/spotlight\/ 2006.  Spotlight: Find anything on your Mac instantly. Technology Brief http:\/\/www.apple.com\/macosx\/features\/spotlight\/ 2006.","key":"e_1_3_2_1_38_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_39_1","DOI":"10.1145\/383059.383071"},{"key":"e_1_3_2_1_40_1","volume-title":"Proc. of the 6th ICDCS Conf.","author":"Tanenbaum A. S.","year":"1986","unstructured":"A. S. Tanenbaum , S. J. Mullender , and R. van Renesse . Using sparse capabilities in a distributed operating system . In Proc. of the 6th ICDCS Conf. , 1986 . A. S. Tanenbaum, S. J. Mullender, and R. van Renesse. Using sparse capabilities in a distributed operating system. In Proc. of the 6th ICDCS Conf., 1986."},{"unstructured":"USA Today. Usatoday: U.s. asks internet firms to save data. http:\/\/www.usatoday.com\/tech\/news\/internetprivacy\/2006-05-31-internet-r%ecords_x.htm 2002.  USA Today. Usatoday: U.s. asks internet firms to save data. http:\/\/www.usatoday.com\/tech\/news\/internetprivacy\/2006-05-31-internet-r%ecords_x.htm 2002.","key":"e_1_3_2_1_41_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_42_1","DOI":"10.1145\/355616.364017"},{"volume-title":"http:\/\/photos.yahoo.com\/","year":"2006","unstructured":"Yahoo! Yahoo! photos home page. http:\/\/photos.yahoo.com\/ , 2006 . Yahoo! Yahoo! photos home page. http:\/\/photos.yahoo.com\/, 2006.","key":"e_1_3_2_1_43_1"},{"unstructured":"YouTube. Youtube: Broadcast yourself. http:\/\/youtube.com\/ 2006.  YouTube. Youtube: Broadcast yourself. http:\/\/youtube.com\/ 2006.","key":"e_1_3_2_1_44_1"}],"event":{"sponsor":["SIGMOD ACM Special Interest Group on Management of Data","ACM Association for Computing Machinery"],"acronym":"SIGMOD\/PODS07","name":"SIGMOD\/PODS07: International Conference on Management of Data","location":"Beijing China"},"container-title":["Proceedings of the 2007 ACM SIGMOD international conference on Management of data"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1247480.1247508","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1247480.1247508","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:51:45Z","timestamp":1750258305000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1247480.1247508"}},"subtitle":["peer-to-peer middleware for personal data sharing applications"],"short-title":[],"issued":{"date-parts":[[2007,6,11]]},"references-count":44,"alternative-id":["10.1145\/1247480.1247508","10.1145\/1247480"],"URL":"https:\/\/doi.org\/10.1145\/1247480.1247508","relation":{},"subject":[],"published":{"date-parts":[[2007,6,11]]},"assertion":[{"value":"2007-06-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}