{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:11:34Z","timestamp":1763467894210,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,4,1]],"date-time":"2008-04-01T00:00:00Z","timestamp":1207008000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,4]]},"DOI":"10.1145\/1435497.1435504","type":"proceedings-article","created":{"date-parts":[[2008,10,14]],"date-time":"2008-10-14T17:49:52Z","timestamp":1224006592000},"page":"37-42","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":53,"title":["Friendstore"],"prefix":"10.1145","author":[{"given":"Dinh Nguyen","family":"Tran","sequence":"first","affiliation":[{"name":"New York University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Frank","family":"Chiang","sequence":"additional","affiliation":[{"name":"New York University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jinyang","family":"Li","sequence":"additional","affiliation":[{"name":"New York University"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2008,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Amazon simple storage service. http:\/\/www.amazon.com\/gp\/browse.html?node=16427261.  Amazon simple storage service. http:\/\/www.amazon.com\/gp\/browse.html?node=16427261."},{"key":"e_1_3_2_1_2_1","unstructured":"Crashplan: Automatic offsite backup. http:\/\/www.crashplan.com\/.  Crashplan: Automatic offsite backup. http:\/\/www.crashplan.com\/."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095816"},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the ACM\/USENIX Symposium on Networked Systems Design and Implementation (NSDI)","author":"Bhagwan R.","year":"2004","unstructured":"Bhagwan , R. , Tati , K. , Cheng , Y. , Savage , S. , and Voelker , G. M . Totalrecall: System support for automated availability management . In Proceedings of the ACM\/USENIX Symposium on Networked Systems Design and Implementation (NSDI) ( 2004 ). Bhagwan, R., Tati, K., Cheng, Y., Savage, S., and Voelker, G. M. Totalrecall: System support for automated availability management. In Proceedings of the ACM\/USENIX Symposium on Networked Systems Design and Implementation (NSDI) (2004)."},{"key":"e_1_3_2_1_6_1","volume-title":"9th Workshop on Hot Topics in Operating Systems (May","author":"Blake C.","year":"2003","unstructured":"Blake , C. , and Rodrigues , R . High availability, scalable storage, dynamic peer networks: Pick two . In 9th Workshop on Hot Topics in Operating Systems (May 2003 ). Blake, C., and Rodrigues, R. High availability, scalable storage, dynamic peer networks: Pick two. In 9th Workshop on Hot Topics in Operating Systems (May 2003)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/339331.339345"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 3rd Symposium on Networked System Design and Implementation (NSDI'06)","author":"Chun B.-G.","year":"2006","unstructured":"Chun , B.-G. , Dabek , F. , Haeberlen , A. , Sit , E. , Weatherspoon , H. , Kaashoek , M. F. , and Morris , R . Efficient replica maintenance for distributed storage systems . In Proceedings of the 3rd Symposium on Networked System Design and Implementation (NSDI'06) ( May 2006 ). Chun, B.-G., Dabek, F., Haeberlen, A., Sit, E., Weatherspoon, H., Kaashoek, M. F., and Morris, R. Efficient replica maintenance for distributed storage systems. In Proceedings of the 3rd Symposium on Networked System Design and Implementation (NSDI'06) (May 2006)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945458"},{"key":"e_1_3_2_1_10_1","volume-title":"1st NSDI (March","author":"Dabek F.","year":"2004","unstructured":"Dabek , F. , Kaashoek , M. F. , Li , J. , Morris , R. , Robertson , J. , and Sit , E . Designing a DHT for low latency and high throughput . In 1st NSDI (March 2004 ). Dabek, F., Kaashoek, M. F., Li, J., Morris, R., Robertson, J., and Sit, E. Designing a DHT for low latency and high throughput. In 1st NSDI (March 2004)."},{"key":"e_1_3_2_1_11_1","unstructured":"Apple. mac service. http:\/\/www.apple.com\/dotmac\/.  Apple. mac service. http:\/\/www.apple.com\/dotmac\/."},{"key":"e_1_3_2_1_12_1","volume-title":"Spki certificate theory. RFC 2693","author":"Ellison C.","year":"1986","unstructured":"Ellison , C. , Frantz , B. , Lampson , B. , Rivest , R. , Thomas , B. , and Ylonen , T . Spki certificate theory. RFC 2693 , Network Working Group , 1986 . Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., and Ylonen, T. Spki certificate theory. RFC 2693, Network Working Group, 1986."},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the 3rd Symposium on Networked System Design and Implementation (NSDI'06)","author":"Garriss S.","year":"2006","unstructured":"Garriss , S. , Kaminsky , M. , Freedman , M. J. , Karp , B. , Mazires , D. , and Yu , H . Re: reliable email . In Proceedings of the 3rd Symposium on Networked System Design and Implementation (NSDI'06) ( 2006 ). Garriss, S., Kaminsky, M., Freedman, M. J., Karp, B., Mazires, D., and Yu, H. Re: reliable email. In Proceedings of the 3rd Symposium on Networked System Design and Implementation (NSDI'06) (2006)."},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the 2nd Symposium on Networked Systems Design and Implementation (NSDI)","author":"Haeberlen A.","year":"2005","unstructured":"Haeberlen , A. , Mislove , A. , and Druschel , P . Glacier: Highly durable, decentralized storage despite massive correlated failures . In Proceedings of the 2nd Symposium on Networked Systems Design and Implementation (NSDI) ( 2005 ). Haeberlen, A., Mislove, A., and Druschel, P. Glacier: Highly durable, decentralized storage despite massive correlated failures. In Proceedings of the 2nd Symposium on Networked Systems Design and Implementation (NSDI) (2005)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/988772.988811"},{"key":"e_1_3_2_1_16_1","volume-title":"USENIX Annual Technical Conference","author":"Kotla R.","year":"2007","unstructured":"Kotla , R. , Alvisi , L. , and Dahlin , M . Safestore: A durable and practical storage system . In USENIX Annual Technical Conference ( 2007 ). Kotla, R., Alvisi, L., and Dahlin, M. Safestore: A durable and practical storage system. In USENIX Annual Technical Conference (2007)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301326"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the 4th International Workshop on Peer-to-Peer Systems (IPTPS)","author":"Li J.","year":"2006","unstructured":"Li , J. , and Dabek , F . F2f: reliable storage in open networks . In Proceedings of the 4th International Workshop on Peer-to-Peer Systems (IPTPS) ( 2006 ). Li, J., and Dabek, F. F2f: reliable storage in open networks. In Proceedings of the 4th International Workshop on Peer-to-Peer Systems (IPTPS) (2006)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/1247340.1247343"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1047915.1047917"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30183-7_10"},{"key":"e_1_3_2_1_22_1","volume-title":"5th Workshop on Hot Topics in Networks (Hot-Nets'06)","author":"Mislove A.","year":"2006","unstructured":"Mislove , A. , Gummadi , K. P. , and Druschel , P . Exploiting social networks for internet search . In 5th Workshop on Hot Topics in Networks (Hot-Nets'06) ( 2006 ). Mislove, A., Gummadi, K. P., and Druschel, P. Exploiting social networks for internet search. In 5th Workshop on Hot Topics in Networks (Hot-Nets'06) (2006)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/50202.50214"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/11861386_24"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.130"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080091.1080102"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/646591.697650"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502053"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/844331.844337"},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings of the 5th Usenix Conference on File and Storage Technologies (FAST)","author":"Schroeder B.","year":"2007","unstructured":"Schroeder , B. , and Gibson , G . Disk failures in the real world: What does an MTTF of 1,000,000 hours mean too you? In Proceedings of the 5th Usenix Conference on File and Storage Technologies (FAST) ( 2007 ). Schroeder, B., and Gibson, G. Disk failures in the real world: What does an MTTF of 1,000,000 hours mean too you? In Proceedings of the 5th Usenix Conference on File and Storage Technologies (FAST) (2007)."},{"key":"e_1_3_2_1_31_1","volume-title":"Proceedings of the 5th International Workshop on Peer-to-peer systems (IPTPS) (Feb.","author":"Tati K.","year":"2006","unstructured":"Tati , K. , and Voelker , G . On object maintenance in peer-to-peer systems . In Proceedings of the 5th International Workshop on Peer-to-peer systems (IPTPS) (Feb. 2006 ). Tati, K., and Voelker, G. On object maintenance in peer-to-peer systems. In Proceedings of the 5th International Workshop on Peer-to-peer systems (IPTPS) (Feb. 2006)."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2006.03.050"},{"key":"e_1_3_2_1_33_1","volume-title":"USENIX WORLDS","author":"Yang M.","year":"2004","unstructured":"Yang , M. , Chen , H. , Zhao , B. Y. , Dai , Y. , and Zhang , Z . Deployment of a large-scale peer-to-peer social network . In USENIX WORLDS ( 2004 ). Yang, M., Chen, H., Zhao, B. Y., Dai, Y., and Zhang, Z. Deployment of a large-scale peer-to-peer social network. In USENIX WORLDS (2004)."}],"event":{"name":"Eurosys '08: Eurosys 2008 Conference","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Glasgow Scotland","acronym":"Eurosys '08"},"container-title":["Proceedings of the 1st Workshop on Social Network Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1435497.1435504","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1435497.1435504","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:45:51Z","timestamp":1750250751000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1435497.1435504"}},"subtitle":["cooperative online backup using trusted nodes"],"short-title":[],"issued":{"date-parts":[[2008,4]]},"references-count":32,"alternative-id":["10.1145\/1435497.1435504","10.1145\/1435497"],"URL":"https:\/\/doi.org\/10.1145\/1435497.1435504","relation":{},"subject":[],"published":{"date-parts":[[2008,4]]},"assertion":[{"value":"2008-04-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}