-
1
-
-
34247380764
-
Supporting location-based conditions in access control policies
-
mar
-
C. A. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati, and P. Samarati, "Supporting Location-Based Conditions in Access Control Policies", Proc. ACM Symp. Information, Computer and Comm. Security (ASIACCS'06), Mar. 2006.
-
(2006)
Proc. ACM Symp. Information, Computer and Comm. Security (ASIACCS'06)
-
-
Ardagna, C.A.1
Cremonini, M.2
Damiani, E.3
De Capitani Di Vimercati, S.4
Samarati, P.5
-
2
-
-
36249028642
-
A middleware architecture for integrating privacy preferences and location accuracy
-
May
-
C. A. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati, and P. Samarati, "A Middleware Architecture for Integrating Privacy Preferences and Location Accuracy", Proc. IFIP Int'l Information Security Conf. (SEC'07), May 2007.
-
(2007)
Proc. IFIP Int'l Information Security Conf. (SEC'07)
-
-
Ardagna, C.A.1
Cremonini, M.2
Damiani, E.3
De Capitani Di Vimercati, S.4
Samarati, P.5
-
3
-
-
61449174042
-
Location privacy protection through obfuscation-based techniques
-
July
-
C. A. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati, and S. Samarati, "Location Privacy Protection through Obfuscation-Based Techniques", Proc. IFIP Working Conf. Data and Applications Security (DBSEC'07), July 2007.
-
(2007)
Proc. IFIP Working Conf. Data and Applications Security (DBSEC'07)
-
-
Ardagna, C.A.1
Cremonini, M.2
Damiani, E.3
De Capitani Di Vimercati, S.4
Samarati, S.5
-
6
-
-
2942524994
-
Location privacy in pervasive computing
-
Jan.-Mar
-
A. R. Beresford and F. Stajano, "Location Privacy in Pervasive Computing", IEEE Pervasive Computing, vol. 2, no. 1, pp. 46-55, Jan.-Mar. 2003.
-
(2003)
IEEE Pervasive Computing
, vol.2
, Issue.1
, pp. 46-55
-
-
Beresford, A.R.1
Stajano, F.2
-
9
-
-
78649355197
-
Rental firm uses GPS in speeding fine
-
July
-
"Rental Firm Uses GPS in Speeding Fine", Chicago Tribune, p. 9, July 2001.
-
(2001)
Chicago Tribune
, pp. 9
-
-
-
10
-
-
79960907469
-
K-anonymity
-
T. Yu and S. Jajodia, eds., Springer-Verlag
-
V. Ciriani, S. De Capitani di Vimercati, S. Foresti, and P. Samarati, "K-Anonymity", Secure Data Management in Decentralized Systems, T. Yu and S. Jajodia, eds., Springer-Verlag, 2007.
-
(2007)
Secure Data Management in Decentralized Systems
-
-
Ciriani, V.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Samarati, P.4
-
11
-
-
84882724877
-
Microdata protection
-
T. Yu and S. Jajodia, eds., Springer-Verlag
-
V. Ciriani, S. De Capitani di Vimercati, S. Foresti, and P. Samarati, "Microdata Protection", Secure Data Management in Decentralized Systems, T. Yu and S. Jajodia, eds., Springer-Verlag, 2007.
-
(2007)
Secure Data Management in Decentralized Systems
-
-
Ciriani, V.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Samarati, P.4
-
13
-
-
0037285343
-
An overview of location-based services
-
Jan
-
T. D'Roza and G. Bilchev, "An Overview of Location-Based Services", BT Technology J., vol. 21, no. 1, pp. 20-27, Jan. 2003.
-
(2003)
BT Technology J.
, vol.21
, Issue.1
, pp. 20-27
-
-
D'Roza, T.1
Bilchev, G.2
-
16
-
-
36549043405
-
Protecting location privacy with personalized K-anonymity: Architecture and algorithms
-
Jan
-
B. Gedik and L. Liu, "Protecting Location Privacy with Personalized K-Anonymity: Architecture and Algorithms", IEEE Trans. Mobile Computing, vol. 7, no. 1, pp. 1-18, Jan. 2008.
-
(2008)
IEEE Trans. Mobile Computing
, vol.7
, Issue.1
, pp. 1-18
-
-
Gedik, B.1
Liu, L.2
-
17
-
-
78649360899
-
-
Geographic Location/Privacy Geopriv, Sept
-
Geographic Location/Privacy (Geopriv), http://www.ietf.org/html.charters/ geopriv-charter.html, Sept. 2006.
-
(2006)
-
-
-
19
-
-
1642286258
-
Anonymous usage of location-based services through spatial and temporal cloaking
-
May
-
M. Gruteser and D. Grunwald, "Anonymous Usage of Location-Based Services through Spatial and Temporal Cloaking", Proc. MobiSys'03, May 2003.
-
(2003)
Proc. MobiSys'03
-
-
Gruteser, M.1
Grunwald, D.2
-
20
-
-
85032751370
-
Mobile positioning using wireless networks: Possibilities and fundamental limitations based on available wireless network measurements
-
July
-
F. Gustafsson and F. Gunnarsson, "Mobile Positioning Using Wireless Networks: Possibilities and Fundamental Limitations Based on Available Wireless Network Measurements", IEEE Signal Processing Magazine, vol. 22, no. 4, pp. 41-53, July 2005.
-
(2005)
IEEE Signal Processing Magazine
, vol.22
, Issue.4
, pp. 41-53
-
-
Gustafsson, F.1
Gunnarsson, F.2
-
22
-
-
57349108972
-
Preserving privacy in GPS traces via density-aware path cloaking
-
Oct
-
B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady, "Preserving Privacy in GPS Traces via Density-Aware Path Cloaking", Proc. ACM Conf. Computer and Comm. Security (CCS'07), Oct. 2007.
-
(2007)
Proc. ACM Conf. Computer and Comm. Security (CCS'07)
-
-
Hoh, B.1
Gruteser, M.2
Xiong, H.3
Alrabady, A.4
-
26
-
-
78649369422
-
-
Loopt, Dec
-
Loopt, http://www.loopt.com/, Dec. 2008.
-
(2008)
-
-
-
29
-
-
33845572567
-
-
Privacy Rights Clearinghouse/UCAN
-
Privacy Rights Clearinghouse/UCAN, A Chronology of Data Breaches, http://www.privacyrights.org/ar/ChronDataBreaches.htm, 2006.
-
(2006)
A Chronology of Data Breaches
-
-
-
30
-
-
0035517699
-
Protecting respondents' identities in microdata release
-
Nov./Dec
-
P. Samarati, "Protecting Respondents' Identities in Microdata Release", IEEE Trans. Knowledge and Data Eng., vol. 13, no. 6, pp. 1010-1027, Nov./Dec. 2001.
-
(2001)
IEEE Trans. Knowledge and Data Eng.
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
32
-
-
85032752279
-
Signal processing techniques in network-aided positioning: A survey of state-ofthe-art positioning designs
-
July
-
G. Sun, J. Chen, W. Guo, and K. J. R. Liu, "Signal Processing Techniques in Network-Aided Positioning: A Survey of State-ofthe-Art Positioning Designs", IEEE Signal Processing Magazine, vol. 22, no. 4, pp. 12-23, July 2005.
-
(2005)
IEEE Signal Processing Magazine
, vol.22
, Issue.4
, pp. 12-23
-
-
Sun, G.1
Chen, J.2
Guo, W.3
Liu, K.J.R.4
-
34
-
-
33745183328
-
Directions for security and privacy for semantic e-business applications
-
Dec
-
B. Thuraisingham, "Directions for Security and Privacy for Semantic E-Business Applications", Comm. ACM, vol. 48, no. 12, pp. 71-73, Dec. 2005.
-
(2005)
Comm. ACM
, vol.48
, Issue.12
, pp. 71-73
-
-
Thuraisingham, B.1
-
35
-
-
24644455920
-
Privacy constraint processing in a privacy-enhanced database management system
-
Nov
-
B. Thuraisingham, "Privacy Constraint Processing in a Privacy-Enhanced Database Management System", Data and Knowledge Eng., vol. 55, no. 2, pp. 159-188, Nov. 2005.
-
(2005)
Data and Knowledge Eng.
, vol.55
, Issue.2
, pp. 159-188
-
-
Thuraisingham, B.1
|