메뉴 건너뛰기




Volumn 8, Issue 1, 2011, Pages 13-27

An obfuscation-based approach for protecting location privacy

Author keywords

location based services.; obfuscation techniques; Privacy

Indexed keywords

DATA PRIVACY; LOCATION; TELECOMMUNICATION SERVICES;

EID: 78649342447     PISSN: 15455971     EISSN: None     Source Type: Journal    
DOI: 10.1109/TDSC.2009.25     Document Type: Article
Times cited : (222)

References (35)
  • 5
  • 6
    • 2942524994 scopus 로고    scopus 로고
    • Location privacy in pervasive computing
    • Jan.-Mar
    • A. R. Beresford and F. Stajano, "Location Privacy in Pervasive Computing", IEEE Pervasive Computing, vol. 2, no. 1, pp. 46-55, Jan.-Mar. 2003.
    • (2003) IEEE Pervasive Computing , vol.2 , Issue.1 , pp. 46-55
    • Beresford, A.R.1    Stajano, F.2
  • 9
    • 78649355197 scopus 로고    scopus 로고
    • Rental firm uses GPS in speeding fine
    • July
    • "Rental Firm Uses GPS in Speeding Fine", Chicago Tribune, p. 9, July 2001.
    • (2001) Chicago Tribune , pp. 9
  • 13
    • 0037285343 scopus 로고    scopus 로고
    • An overview of location-based services
    • Jan
    • T. D'Roza and G. Bilchev, "An Overview of Location-Based Services", BT Technology J., vol. 21, no. 1, pp. 20-27, Jan. 2003.
    • (2003) BT Technology J. , vol.21 , Issue.1 , pp. 20-27
    • D'Roza, T.1    Bilchev, G.2
  • 16
    • 36549043405 scopus 로고    scopus 로고
    • Protecting location privacy with personalized K-anonymity: Architecture and algorithms
    • Jan
    • B. Gedik and L. Liu, "Protecting Location Privacy with Personalized K-Anonymity: Architecture and Algorithms", IEEE Trans. Mobile Computing, vol. 7, no. 1, pp. 1-18, Jan. 2008.
    • (2008) IEEE Trans. Mobile Computing , vol.7 , Issue.1 , pp. 1-18
    • Gedik, B.1    Liu, L.2
  • 17
    • 78649360899 scopus 로고    scopus 로고
    • Geographic Location/Privacy Geopriv, Sept
    • Geographic Location/Privacy (Geopriv), http://www.ietf.org/html.charters/ geopriv-charter.html, Sept. 2006.
    • (2006)
  • 19
    • 1642286258 scopus 로고    scopus 로고
    • Anonymous usage of location-based services through spatial and temporal cloaking
    • May
    • M. Gruteser and D. Grunwald, "Anonymous Usage of Location-Based Services through Spatial and Temporal Cloaking", Proc. MobiSys'03, May 2003.
    • (2003) Proc. MobiSys'03
    • Gruteser, M.1    Grunwald, D.2
  • 20
    • 85032751370 scopus 로고    scopus 로고
    • Mobile positioning using wireless networks: Possibilities and fundamental limitations based on available wireless network measurements
    • July
    • F. Gustafsson and F. Gunnarsson, "Mobile Positioning Using Wireless Networks: Possibilities and Fundamental Limitations Based on Available Wireless Network Measurements", IEEE Signal Processing Magazine, vol. 22, no. 4, pp. 41-53, July 2005.
    • (2005) IEEE Signal Processing Magazine , vol.22 , Issue.4 , pp. 41-53
    • Gustafsson, F.1    Gunnarsson, F.2
  • 26
    • 78649369422 scopus 로고    scopus 로고
    • Loopt, Dec
    • Loopt, http://www.loopt.com/, Dec. 2008.
    • (2008)
  • 29
    • 33845572567 scopus 로고    scopus 로고
    • Privacy Rights Clearinghouse/UCAN
    • Privacy Rights Clearinghouse/UCAN, A Chronology of Data Breaches, http://www.privacyrights.org/ar/ChronDataBreaches.htm, 2006.
    • (2006) A Chronology of Data Breaches
  • 30
    • 0035517699 scopus 로고    scopus 로고
    • Protecting respondents' identities in microdata release
    • Nov./Dec
    • P. Samarati, "Protecting Respondents' Identities in Microdata Release", IEEE Trans. Knowledge and Data Eng., vol. 13, no. 6, pp. 1010-1027, Nov./Dec. 2001.
    • (2001) IEEE Trans. Knowledge and Data Eng. , vol.13 , Issue.6 , pp. 1010-1027
    • Samarati, P.1
  • 31
    • 51349116631 scopus 로고    scopus 로고
    • A profile anonymization model for privacy in a personalized location based service environment
    • Apr
    • H. Shin, V. Atluri, and J. Vaidya, "A Profile Anonymization Model for Privacy in a Personalized Location Based Service Environment", Proc. Int'l Conf. Mobile Data Management (MDM'08), Apr. 2008.
    • (2008) Proc. Int'l Conf. Mobile Data Management (MDM'08)
    • Shin, H.1    Atluri, V.2    Vaidya, J.3
  • 32
    • 85032752279 scopus 로고    scopus 로고
    • Signal processing techniques in network-aided positioning: A survey of state-ofthe-art positioning designs
    • July
    • G. Sun, J. Chen, W. Guo, and K. J. R. Liu, "Signal Processing Techniques in Network-Aided Positioning: A Survey of State-ofthe-Art Positioning Designs", IEEE Signal Processing Magazine, vol. 22, no. 4, pp. 12-23, July 2005.
    • (2005) IEEE Signal Processing Magazine , vol.22 , Issue.4 , pp. 12-23
    • Sun, G.1    Chen, J.2    Guo, W.3    Liu, K.J.R.4
  • 34
    • 33745183328 scopus 로고    scopus 로고
    • Directions for security and privacy for semantic e-business applications
    • Dec
    • B. Thuraisingham, "Directions for Security and Privacy for Semantic E-Business Applications", Comm. ACM, vol. 48, no. 12, pp. 71-73, Dec. 2005.
    • (2005) Comm. ACM , vol.48 , Issue.12 , pp. 71-73
    • Thuraisingham, B.1
  • 35
    • 24644455920 scopus 로고    scopus 로고
    • Privacy constraint processing in a privacy-enhanced database management system
    • Nov
    • B. Thuraisingham, "Privacy Constraint Processing in a Privacy-Enhanced Database Management System", Data and Knowledge Eng., vol. 55, no. 2, pp. 159-188, Nov. 2005.
    • (2005) Data and Knowledge Eng. , vol.55 , Issue.2 , pp. 159-188
    • Thuraisingham, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.