{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,12,2]],"date-time":"2023-12-02T02:30:20Z","timestamp":1701484220924},"reference-count":49,"publisher":"IGI Global","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,1,1]]},"abstract":"<p>Current approaches to build social networking systems are based on a centralized architecture because it allows a simple browser-based user experience and makes easier and more efficient to implement many algorithms used in a social networking site (e.g., friend suggestion), However this kind of architecture has many drawbacks for its users, e.g., lack of privacy, lack of anonymity, risks of censorship and operating costs. This paper presents a system, called Blogracy, which uses widespread and stable peer-to-peer technologies, such as distributed hash tables and BitTorrent, for coping with intrinsic defects of centralized architectures and for being the basis of solid distributed social networking platforms. Moreover, Blogracy takes advantages of multi-agent systems for simplifying the implementation of social network services in a decentralized setting.<\/p>","DOI":"10.4018\/jvcsn.2013010104","type":"journal-article","created":{"date-parts":[[2013,9,18]],"date-time":"2013-09-18T13:40:25Z","timestamp":1379511625000},"page":"62-74","source":"Crossref","is-referenced-by-count":2,"title":["Supporting Social Networks With Agent-Based Services"],"prefix":"10.4018","volume":"5","author":[{"given":"Michele","family":"Tomaiuolo","sequence":"first","affiliation":[{"name":"Department of Information Engineering, University of Parma, Parma, Italy"}]},{"given":"Agostino","family":"Poggi","sequence":"additional","affiliation":[{"name":"Department of Information Engineering, University of Parma, Parma, Italy"}]},{"given":"Enrico","family":"Franchi","sequence":"additional","affiliation":[{"name":"Department of Information Engineering, University of Parma, Parma, Italy"}]}],"member":"2432","reference":[{"key":"jvcsn.2013010104-0","unstructured":"W3C Consortium (2009). OWL 2 web ontology language overview. Retrieved July 3, 2013, from http:\/\/www.w3.org\/TR\/owl2-overview"},{"key":"jvcsn.2013010104-1","unstructured":"W3C Consortium. (2013). OStatus community group. Retrieved July 3, 2013, from http:\/\/www.w3.org\/community\/ostatus"},{"key":"jvcsn.2013010104-2","unstructured":"Activity Streams. (2013). Activity streams documentation. Retrieved July 3, 2013, from http:\/\/activitystrea.ms"},{"key":"jvcsn.2013010104-3","unstructured":"Apache Foundation. (2013). Nutch software. Retrieved July 3, 2013, from http:\/\/nutch.apache.org"},{"key":"jvcsn.2013010104-4","doi-asserted-by":"crossref","unstructured":"Baden, R., Bender, A., Spring, N., Bhattacharjee, B., & Starin, D. (2009). Persona: An online social network with user-defined privacy. In Proceedings of the ACM Conference on Data Communication (pp. 135-146), Barcellona, Spain: ACM.","DOI":"10.1145\/1594977.1592585"},{"key":"jvcsn.2013010104-5","unstructured":"Basuga, M., Belavic, R., Slipcevic, A., Podobnik, V., Petric, A., & Lovrek, I. (2009). The MAgNet: Agent-based middleware enabling social networking for mobile users. In Proceedings of the 10th International Conference on Telecommunications (pp. 89-96), Zagreb, Croatia: IEEE."},{"key":"jvcsn.2013010104-6","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2007.10.008"},{"key":"jvcsn.2013010104-7","doi-asserted-by":"crossref","unstructured":"Bernard, S., & Le Fessant, F. (2009). Optimizing peer-to-peer backup using lifetime estimations. In Proceedings of the 2009 EDBT\/ICDT Workshops (pp. 26-33). New York, NY: ACM.","DOI":"10.1145\/1698790.1698797"},{"key":"jvcsn.2013010104-8","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., & Waters, B. (2007). Ciphertext-policy attribute-based encryption. In Proceedings of the IEEE Symposium on Security and Privacy (pp.321-334). Oakland, CA: IEEE.","DOI":"10.1109\/SP.2007.11"},{"key":"jvcsn.2013010104-9","unstructured":"Brickley, D., & Miller, L. (2005). FOAF vocabulary specification 0.98. Retrieved July 3, 2013, from http:\/\/xmlns.com\/foaf\/0.1"},{"key":"jvcsn.2013010104-10","doi-asserted-by":"crossref","unstructured":"Buchegger, S., Schi\u00f6berg, D., Vu, L., & Datta, A. (2009). PeerSoN: P2P social networking: Early experiences and insights. In Proceedings of the Second ACM EuroSys Workshop on Social Network Systems (pp. 46\u201352). Nuremberg, Germany: ACM.","DOI":"10.1145\/1578002.1578010"},{"key":"jvcsn.2013010104-11","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.803069"},{"key":"jvcsn.2013010104-12","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"jvcsn.2013010104-13","doi-asserted-by":"crossref","unstructured":"Chen, J. R., Wolf, S. R., & Wragg, S. D. (2000). A distributed multi-agent system for collaborative information management and sharing. In Proceedings of the 9th ACM International Conference on Information and Knowledge Management (pp. 382-388). McLean, VA: ACM.","DOI":"10.1145\/354756.354844"},{"key":"jvcsn.2013010104-14","doi-asserted-by":"crossref","unstructured":"Clarke, I., Sandberg, O., Wiley, B., & Hong, T. (2001). Freenet: A distributed anonymous information storage and retrieval system. In H. Federrath (Ed.), Proceedings of the International Workshop on Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Unobservability (pp. 46-66), New York, NY: Springer.","DOI":"10.1007\/3-540-44702-4_4"},{"key":"jvcsn.2013010104-15","unstructured":"Cohen, B. (2003). Incentives build robustness in BitTorrent. In Proceedings of the First Workshop on Economics of Peer-to-Peer Systems, Berkeley, CA."},{"key":"jvcsn.2013010104-16","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2009.5350374"},{"key":"jvcsn.2013010104-17","unstructured":"Diaspora (2013). Diaspora social network web page. Retrieved July 3, 2013, from https:\/\/joindiaspora.com"},{"key":"jvcsn.2013010104-18","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45414-4_4"},{"key":"jvcsn.2013010104-19","doi-asserted-by":"crossref","unstructured":"Foner, L. (1997). Yenta: A multi-agent, referral-based matchmaking system. In Proceedings of the First International Conference on Autonomous Agents (pp. 301-307), Marina del Rey, CA: ACM.","DOI":"10.1145\/267658.267732"},{"key":"jvcsn.2013010104-20","doi-asserted-by":"crossref","first-page":"84","DOI":"10.4018\/978-1-61350-168-9.ch005","article-title":"Multi-agent systems and social networks","author":"E.Franchi","year":"2012","journal-title":"Handbook of research on business social networking: Organizational, managerial, and technological dimensions"},{"key":"jvcsn.2013010104-21","unstructured":"Gursel, A., & Sen, S. (2009). Improving search in social networks by agent based mining. In 21st international Joint Conference on Artifical Intelligence (pp. 2034-2039). San Francisco, CA: Morgan Kaufmann."},{"key":"jvcsn.2013010104-22","doi-asserted-by":"publisher","DOI":"10.1145\/295685.295701"},{"key":"jvcsn.2013010104-23","doi-asserted-by":"publisher","DOI":"10.1007\/11762256_31"},{"key":"jvcsn.2013010104-24","doi-asserted-by":"publisher","DOI":"10.1145\/245108.245123"},{"issue":"2","key":"jvcsn.2013010104-25","first-page":"27","article-title":"The hidden web.","volume":"18","author":"H.Kautz","year":"1997","journal-title":"AI Magazine"},{"key":"jvcsn.2013010104-26","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-023X(00)00049-5"},{"key":"jvcsn.2013010104-27","unstructured":"Lerman, K., Plangrasopchok, A., & Wong, C. (2007). Personalizing results of image search on Flickr. In Proceedings of the AAAI Workshop on Intelligent Techniques for Web Personalization (pp. 65-75). Vancouver, Canada: AAAI Press."},{"key":"jvcsn.2013010104-28","unstructured":"Li, N. (2000). Local Names in SPKI\/SDSI. In 13th IEEE workshop on Computer Security Foundations (pp. 2\u201315), Cambridge, UK: IEEE."},{"key":"jvcsn.2013010104-29","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45748-8_5"},{"key":"jvcsn.2013010104-30","doi-asserted-by":"publisher","DOI":"10.1145\/219717.219748"},{"key":"jvcsn.2013010104-31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30104-2_4"},{"key":"jvcsn.2013010104-32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30545-3_17"},{"key":"jvcsn.2013010104-33","unstructured":"OpenSocial and Gadgets Specification Group. (2013). Open social specifications. Retrieved July 3, 2013, from http:\/\/docs.opensocial.org"},{"key":"jvcsn.2013010104-34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31546-6_12"},{"key":"jvcsn.2013010104-35","unstructured":"Portable Contacts. (2008). Portable contacts specifications. Retrieved July 3, 2013, from http:\/\/portablecontacts.net\/draft-spec.html"},{"key":"jvcsn.2013010104-36","unstructured":"Princeton University. (2013). Wordnet software. Retrieved July 3, 2013, from http:\/\/wordnet.princeton.edu"},{"key":"jvcsn.2013010104-37","doi-asserted-by":"crossref","unstructured":"Rzadca, K., Datta, A., & Buchegger, S. (2010). Replica placement in P2P storage: Complexity and game theoretic analyses. In Proceedings of the International Conference on Distributed Computing Systems (pp. 599\u2013609), Genova, Italy: IEEE.","DOI":"10.1109\/ICDCS.2010.67"},{"key":"jvcsn.2013010104-38","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2006.4"},{"key":"jvcsn.2013010104-39","author":"G.Salton","year":"1983","journal-title":"Introduction to modern information retrieval"},{"key":"jvcsn.2013010104-40","doi-asserted-by":"publisher","DOI":"10.1007\/11893011_96"},{"key":"jvcsn.2013010104-41","unstructured":"Southern Methodist University. (2013). JAWS software. Retrieved July 3, 2013, from http:\/\/lyle.smu.edu\/~tspell\/jaws"},{"key":"jvcsn.2013010104-42","unstructured":"StatusNet. (2013). StatusNet social network web page. Retrieved July 3, 2013, from http:\/\/status.net"},{"key":"jvcsn.2013010104-43","doi-asserted-by":"crossref","unstructured":"Tang, C., Xu, Z., & Dwarkadas, S. (2003). Peer-to-peer information retrieval using self-organizing semantic overlay networks. In Proceedings of the ACM SIGCOMM (pp. 175\u2013186), Karlsruhe, Germany: ACM.","DOI":"10.1145\/863955.863976"},{"key":"jvcsn.2013010104-44","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-61520-975-0.ch024"},{"key":"jvcsn.2013010104-45","unstructured":"Vuze (2013). Vuze software. Retrieved July 3, 2013, from http:\/\/www.vuze.com"},{"key":"jvcsn.2013010104-46","unstructured":"Wiemer-Hastings, P. M. (1999). How latent is latent semantic analysis? In Proceedings of the 16th international Joint Conference on Artifical Intelligence (pp. 932-941), San Francisco, CA: Morgan Kaufmann."},{"key":"jvcsn.2013010104-47","doi-asserted-by":"publisher","DOI":"10.1016\/S0140-3664(02)00254-2"},{"key":"jvcsn.2013010104-48","doi-asserted-by":"crossref","unstructured":"Yu, B., & Singh, M. (2003). Searching social networks. In Second International Joint Conference on Autonomous Agents and Multi Agent Systems (pp. 65-72), Melbourne, Australia: ACM.","DOI":"10.1145\/860575.860587"}],"container-title":["International Journal of Virtual Communities and Social Networking"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=85357","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T20:25:14Z","timestamp":1654115114000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jvcsn.2013010104"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2013,1,1]]},"references-count":49,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,1]]}},"URL":"https:\/\/doi.org\/10.4018\/jvcsn.2013010104","relation":{},"ISSN":["1942-9010","1942-9029"],"issn-type":[{"value":"1942-9010","type":"print"},{"value":"1942-9029","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,1,1]]}}}