메뉴 건너뛰기




Volumn 7, Issue 1, 2008, Pages 1-18

Protecting location privacy with personalized k-anonymity: Architecture and algorithms

Author keywords

K anonymity; Location privacy; Location based applications; Mobile computing systems

Indexed keywords

K-ANONYMITY; LOCATION BASED APPLICATIONS; LOCATION PRIVACY;

EID: 36549043405     PISSN: 15361233     EISSN: None     Source Type: Journal    
DOI: 10.1109/TMC.2007.1062     Document Type: Article
Times cited : (738)

References (33)
  • 1
    • 36549023667 scopus 로고
    • Everyman's Library, Nov
    • G. Orwell, 1984. Everyman's Library, Nov. 1992.
    • (1992) 1984
    • Orwell, G.1
  • 2
    • 84858461673 scopus 로고    scopus 로고
    • Jan
    • D.W. Gage, Lifelog, http://www.darpa.mil/ipto/Programs/lifelog/, Jan. 2004.
    • (2004) Lifelog
    • Gage, D.W.1
  • 3
    • 0742276510 scopus 로고    scopus 로고
    • Computer Science and Telecommunications Board, Nat'l Academics Press, Nov
    • Computer Science and Telecommunications Board, IT Roadmap to a Geospatial Future. Nat'l Academics Press, Nov. 2003.
    • (2003) IT Roadmap to a Geospatial Future
  • 4
    • 84858454454 scopus 로고    scopus 로고
    • NextBus Inc, Jan
    • NextBus Inc., http://www.nextbus.com/, Jan. 2004.
    • (2004)
  • 6
    • 0032050105 scopus 로고    scopus 로고
    • Challenges and Progress in Meeting the E-911 Requirement for Location Service
    • J. Reed, K. Krizman, B. Woerner, and T. Rappaport, "Challenges and Progress in Meeting the E-911 Requirement for Location Service," IEEE Personal Comm. Magazine, vol. 5, no. 3, pp. 30-37, 1998.
    • (1998) IEEE Personal Comm. Magazine , vol.5 , Issue.3 , pp. 30-37
    • Reed, J.1    Krizman, K.2    Woerner, B.3    Rappaport, T.4
  • 10
    • 4344559647 scopus 로고    scopus 로고
    • Protecting Privacy when Disclosing Information: K-Anonymity and Its Enforcement through Generalization and Suppression
    • P. Samarati and L. Sweeney, "Protecting Privacy when Disclosing Information: k-Anonymity and Its Enforcement through Generalization and Suppression," Proc. IEEE Symp. Research in Security and Privacy, 1998.
    • (1998) Proc. IEEE Symp. Research in Security and Privacy
    • Samarati, P.1    Sweeney, L.2
  • 11
    • 0035517699 scopus 로고    scopus 로고
    • Protecting Respondent's Privacy in Microdata Release
    • P. Samarati, "Protecting Respondent's Privacy in Microdata Release," IEEE Trans. Knowledge and Data Eng., vol. 13, no. 6, pp. 1010-1027, 2001.
    • (2001) IEEE Trans. Knowledge and Data Eng , vol.13 , Issue.6 , pp. 1010-1027
    • Samarati, P.1
  • 15
    • 0005063385 scopus 로고    scopus 로고
    • Onion Routing for Anonymous and Private Internet Connections
    • D. Goldschlag, M. Reed, and P. Syverson, "Onion Routing for Anonymous and Private Internet Connections," Comm. ACM, vol. 42, no. 2, pp. 9-41, 1999.
    • (1999) Comm. ACM , vol.42 , Issue.2 , pp. 9-41
    • Goldschlag, D.1    Reed, M.2    Syverson, P.3
  • 20
    • 36549054446 scopus 로고    scopus 로고
    • US Department of the Interior, Nov
    • US Department of the Interior, US Geological Survey Web Page, http://www.usgs.gov/, Nov. 2003.
    • (2003) US Geological Survey Web Page
  • 21
    • 27944432037 scopus 로고    scopus 로고
    • Mid-Continent Mapping Center, Nov
    • Mid-Continent Mapping Center, Spatial Data Transfer Format, http://mcmcweb.er.usgs.gov/sdts/, Nov. 2003.
    • (2003) Spatial Data Transfer Format
  • 22
    • 27944455986 scopus 로고    scopus 로고
    • SVG Working Group, Nov
    • SVG Working Group, Scalable Vector Graphics Format, http://www.w3.org/Graphics/SVG/, Nov. 2003.
    • (2003) Scalable Vector Graphics Format
  • 23
    • 36549029560 scopus 로고    scopus 로고
    • Global Mapper Software LLC, Nov
    • Global Mapper Software LLC, Global Mapper Web Page, http://www.globalmapper.com/, Nov. 2003.
    • (2003) Global Mapper Web Page
  • 26
    • 0018444418 scopus 로고
    • Secure Databases: Protection against User Influence
    • D. Dobkin, A.K. Jones, and R.J. Lipton, "Secure Databases: Protection against User Influence," ACM Trans. Database Systems, vol. 4, no. 1, pp. 97-106, 1979.
    • (1979) ACM Trans. Database Systems , vol.4 , Issue.1 , pp. 97-106
    • Dobkin, D.1    Jones, A.K.2    Lipton, R.J.3
  • 27
    • 0020205885 scopus 로고
    • Auditing and Inference Control in Statistical Databases
    • F.Y. Chin and G. Ozsoyoglu, "Auditing and Inference Control in Statistical Databases," IEEE Trans. Software Eng., vol. 8, no. 6, pp. 574-582, 1982.
    • (1982) IEEE Trans. Software Eng , vol.8 , Issue.6 , pp. 574-582
    • Chin, F.Y.1    Ozsoyoglu, G.2
  • 28
    • 0020798007 scopus 로고
    • Information Loss in Partitioned Statistical Databases
    • J. Schlorer, "Information Loss in Partitioned Statistical Databases," Computer J., vol. 26, no. 3, pp. 218-223, 1983.
    • (1983) Computer J , vol.26 , Issue.3 , pp. 218-223
    • Schlorer, J.1
  • 29
    • 0021389555 scopus 로고
    • Practical Data Swapping: The First Steps
    • S.P. Reiss, "Practical Data Swapping: The First Steps," ACM Trans. Database Systems, vol. 9, no. 1, pp. 20-37, 1984.
    • (1984) ACM Trans. Database Systems , vol.9 , Issue.1 , pp. 20-37
    • Reiss, S.P.1
  • 30
    • 0021622802 scopus 로고
    • The Statistical Security of a Statistical Database
    • J.F. Traub, Y. Yemini, and H. Wozniakowski, "The Statistical Security of a Statistical Database," ACM Trans. Database Systems, vol. 9, no. 4, pp. 672-679, 1984.
    • (1984) ACM Trans. Database Systems , vol.9 , Issue.4 , pp. 672-679
    • Traub, J.F.1    Yemini, Y.2    Wozniakowski, H.3
  • 31
    • 0019054751 scopus 로고
    • Secure Statistical Databases with Random Sample Queries
    • D.E. Denning, "Secure Statistical Databases with Random Sample Queries," ACM Trans. Database Systems, vol. 5, no. 3, pp. 291-315, 1980.
    • (1980) ACM Trans. Database Systems , vol.5 , Issue.3 , pp. 291-315
    • Denning, D.E.1
  • 32
    • 0019056889 scopus 로고
    • A Security Mechanism for Statistical Databases
    • L.L. Beck, "A Security Mechanism for Statistical Databases," ACM Trans. Database Systems, vol. 5, no. 3, pp. 316-338, 1980.
    • (1980) ACM Trans. Database Systems , vol.5 , Issue.3 , pp. 316-338
    • Beck, L.L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.