-
3
-
-
84890142084
-
-
Foxs News: Man Accused of Stalking Ex-Girlfriend With GPS. , 04 September 2004. Accessed 22 March 2007
-
Foxs News: Man Accused of Stalking Ex-Girlfriend With GPS. http://www.foxnews.com/story/0,2933,131487,00.html, 04 September 2004. Accessed 22 March 2007
-
-
-
-
4
-
-
2942524994
-
Location privacy in pervasive computing
-
Beresford, A.R., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Computing 2(1) (2003) 46-55
-
(2003)
IEEE Pervasive Computin
, vol.2
, Issue.1
, pp. 46-55
-
-
Beresford, A.R.1
Stajano, F.2
-
5
-
-
33646153058
-
Protecting privacy against location-based personal identification
-
Springer-Verlag
-
Bettini, C., Wang, X., Jajodia, S.: Protecting privacy against location-based personal identification. In: Proc. of the 2nd VLDB Workshop on Secure Data Management, LNCS 3674, Springer-Verlag (2005)
-
(2005)
Proc. of the 2nd VLDB Workshop on Secure Data Management, LNCS 3674
-
-
Bettini, C.1
Wang, X.2
Jajodia, S.3
-
8
-
-
79960907469
-
K-anonymity
-
Springer
-
Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Samarati, P.: K-Anonymity. In: Security in Decentralized Data Management. Springer (2007)
-
(2007)
Security in Decentralized Data Management
-
-
Ciriani, V.1
De Capitanidi, V.S.2
Foresti, S.3
Samarati, P.4
-
9
-
-
0035517699
-
Protecting respondents' identities in microdata release
-
Samarati, P.: Protecting respondents' identities in microdata release. IEEE Transactions on Knowledge and Data Engineering 13(6) (2001) 1010-1027
-
(2001)
IEEE Transactions on Knowledge and Data Engineering
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
10
-
-
34247380764
-
Supporting location-based conditions in access control policies
-
Computer and Communications Security (ASIACCS'06), Taipei, Taiwan (March
-
Ardagna, C., Cremonini, M., Damiani, E., De Capitani di Vimercati, S., Samarati, P.: Supporting location-based conditions in access control policies. In: Proc. of the ACM Symposium on Information, Computer and Communications Security (ASIACCS'06), Taipei, Taiwan (March 2006)
-
(2006)
Proc. of the ACM Symposium on Information
-
-
Ardagna, C.1
Cremonini, M.2
Damiani, E.3
De Capitanidi, V.S.4
Samarati, P.5
-
11
-
-
0036311802
-
A unified framework for regulating access and information release on the web
-
Bonatti, P., Samarati, P.: A unified framework for regulating access and information release on the web. Journal of Computer Security 10(3) (2002) 241-272
-
(2002)
Journal of Computer Security
, vol.10
, Issue.3
, pp. 241-272
-
-
Bonatti, P.1
Samarati, P.2
-
12
-
-
33646456095
-
Query processing in mobile environments: A survey and open problems
-
Besancon, France (February
-
Marsit, N., Hameurlain, A., Mammeri, Z., Morvan, F.: Query processing in mobile environments: a survey and open problems. In: Proc. of the 1st International Conference on Distributed Framework for Multimedia Applications (DFMA'05), Besancon, France (February 2005)
-
(2005)
Proc. of the 1st International Conference on Distributed Framework for Multimedia Applications (DFMA'05)
-
-
Marsit, N.1
Hameurlain, A.2
Mammeri, Z.3
Morvan, F.4
-
13
-
-
0001619596
-
Flexible support for multiple access control policies
-
June
-
Jajodia, S., Samarati, P., Sapino, M., Subrahmanian, V.: Flexible support for multiple access control policies. ACM Transactions on Database Systems 26(2) (June 2001) 214-260
-
(2001)
ACM Transactions on Database Systems
, vol.26
, Issue.2
, pp. 214-260
-
-
Jajodia, S.1
Samarati, P.2
Sapino, M.3
Subrahmanian, V.4
-
15
-
-
84863605068
-
Mobile trust negotiation: Authentication and authorization in dynamic mobile networks
-
Lake Windermere, England (September
-
van der Horst, T., Sundelin, T., Seamons, K., Knutson, C.: Mobile trust negotiation: Authentication and authorization in dynamic mobile networks. In: Proc. of the 8th IFIP Conference on Communications and Multimedia Security, Lake Windermere, England (September 2004)
-
(2004)
Proc. of the 8th IFIP Conference on Communications and Multimedia Security
-
-
Van Der Horst, T.1
Sundelin, T.2
Seamons, K.3
Knutson, C.4
-
17
-
-
84898788360
-
Path privacy in location-aware computing
-
Boston, Massachussetts, USA (June
-
Gruteser, M., Bredin, J., Grunwald, D.: Path privacy in location-aware computing. In: Proc. of the Second International Conference on Mobile Systems, Application and Services (MobiSys2004), Boston, Massachussetts, USA (June 2004)
-
(2004)
Proc. of the Second International Conference on Mobile Systems, Application and Services (MobiSys2004)
-
-
Gruteser, M.1
Bredin, J.2
Grunwald, D.3
-
18
-
-
2342562393
-
Protecting privacy in continuous location-tracking applications
-
March-April
-
Gruteser, M., Liu, X.: Protecting privacy in continuous location-tracking applications. IEEE Security & Privacy Magazine 2(2) (March-April 2004) 28-34
-
(2004)
IEEE Security & Privacy Magazine
, vol.2
, Issue.2
, pp. 28-34
-
-
Gruteser, M.1
Liu, X.2
-
20
-
-
34547720006
-
The new casper: Query processing for location services without compromising privacy
-
Korea (September
-
Mokbel, M., Chow, C.Y., Aref, W.: The new casper: Query processing for location services without compromising privacy. In: Proceedings of the 32nd International Conference on Very Large Data Bases, Korea (September 2006) 763-774
-
(2006)
Proceedings of the 32nd International Conference on Very Large Data Bases
, pp. 763-774
-
-
Mokbel, M.1
Chow, C.Y.2
Aref, W.3
-
23
-
-
84890248355
-
-
September
-
Geopriv: Geographic Location/Privacy. http://www.ietf.org/html.charters/ geopriv-charter.html. (September 2006)
-
(2006)
Geographic Location/Privacy
-
-
-
24
-
-
77953802502
-
Dynamic privacy management: A plug-in service for the middleware in pervasive computing
-
Salzburg, Austria
-
Hong, D., Yuan,M., Shen, V.Y.: Dynamic privacy management: a plug-in service for the middleware in pervasive computing. In: Proc. of the 7th International Conference on Human Computer Interaction with Mobile Devices & Services (MobileHCI'05), Salzburg, Austria (2005)
-
(2005)
Proc. of the 7th International Conference on Human Computer Interaction with Mobile Devices & Services (MobileHCI'05)
-
-
Hong, D.1
Yuan, M.2
Shen, V.Y.3
-
25
-
-
84937411601
-
A privacy awareness system for ubiquitous computing environments
-
In Borriello, G., Holmquist, L.E., eds.: (September
-
Langheinrich, M.: A privacy awareness system for ubiquitous computing environments. In Borriello, G., Holmquist, L.E., eds.: Proc. of the 4th International Conference on Ubiquitous Computing (Ubicomp 2002). (September 2002) 237-245
-
(2002)
Proc. of the 4th International Conference on Ubiquitous Computing (Ubicomp 2002)
, pp. 237-245
-
-
Langheinrich, M.1
-
29
-
-
33845302630
-
Efficiently managing location information with privacy requirements in wi-fi networks: A middleware approach
-
Siena, Italy (September
-
Bellavista, P., Corradi, A., Giannelli, C.: Efficiently managing location information with privacy requirements in wi-fi networks: a middleware approach. In: Proc. of the International Symposium on Wireless Communication Systems (ISWCS'05), Siena, Italy (September 2005)
-
(2005)
Proc. of the International Symposium on Wireless Communication Systems (ISWCS'05)
-
-
Bellavista, P.1
Corradi, A.2
Giannelli, C.3
-
30
-
-
35248869727
-
Managing privacy in LBAC systems
-
Niagara Falls, Canada (May
-
Ardagna, C., Cremonini, M., Damiani, E., De Capitani di Vimercati, S., Samarati, P.: Managing privacy in LBAC systems. In: Proc. of the Second IEEE International Symposium on Pervasive Computing and Ad Hoc Communications (PCAC-07), Niagara Falls, Canada (May 2007)
-
(2007)
Proc. of the Second IEEE International Symposium on Pervasive Computing and Ad Hoc Communications (PCAC-07)
-
-
Ardagna, C.1
Cremonini, M.2
Damiani, E.3
De Capitanidi, V.S.4
Samarati, P.5
-
31
-
-
36249028642
-
A middleware architecture for integrating privacy preferences and location accuracy
-
Sandton, South Africa (May
-
Ardagna, C., Cremonini, M., Damiani, E., De Capitani di Vimercati, S., Samarati, P.: A middleware architecture for integrating privacy preferences and location accuracy. In: Proc. of the 22nd IFIP TC-11 International Information Security Conference (SEC 2007), Sandton, South Africa (May 2007)
-
(2007)
Proc. of the 22nd IFIP TC-11 International Information Security Conference (SEC 2007)
-
-
Ardagna, C.1
Cremonini, M.2
Damiani, E.3
De Capitanidi, V.S.4
Samarati, P.5
-
32
-
-
61449174042
-
Location privacy protection through obfuscation-based techniques
-
Redondo Beach, CA, USA (July
-
Ardagna, C., Cremonini, M., Damiani, E., De Capitani di Vimercati, S., Samarati, S.: Location privacy protection through obfuscation-based techniques. In: Proc. of the 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA (July 2007)
-
(2007)
Proc. of the 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security
-
-
Ardagna, C.1
Cremonini, M.2
Damiani, E.3
De Capitanidi, V.S.4
Samarati, S.5
-
34
-
-
36248937715
-
Location-based metadata and negotiation protocols for LBAC in a oneto-many scenario
-
Coimbra, Portugal (May
-
Ardagna, C., Cremonini, M., Damiani, E., De Capitani di Vimercati, S., Samarati, P.: Location-based metadata and negotiation protocols for LBAC in a oneto-many scenario. In: Proc. of the Workshop on Security and Privacy in Mobile andWireless Networking (SecPri MobiWi 2006), Coimbra, Portugal (May 2006)
-
(2006)
Proc. of the Workshop on Security and Privacy in Mobile AndWireless Networking (SecPri MobiWi 2006)
-
-
Ardagna, C.1
Cremonini, M.2
Damiani, E.3
De Capitanidi, V.S.4
Samarati, P.5
|