메뉴 건너뛰기




Volumn 3, Issue 2, 2010, Pages 123-148

The PROBE framework for the personalized cloaking of private locations

Author keywords

Geo social networks; Location privacy; Spatial databases and GIS

Indexed keywords

ARCHITECTURAL FRAMEWORKS; COMMON STRATEGY; CONVENTIONAL APPROACH; GEOMETRIC METHOD; LOCATION PRIVACY; LOCATION-BASED SERVICES; PERSONAL LOCATION INFORMATION; PRIVACY CONSTRAINTS; PRIVACY MODELS; SMALL DEVICES; SOCIAL NETWORKS; SPATIAL DATABASES AND GIS; STATISTICAL DISTRIBUTION; STORAGE REQUIREMENTS; SYSTEM ARCHITECTURES; USER LOCATION;

EID: 78650599919     PISSN: 18885063     EISSN: 20131631     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (98)

References (38)
  • 3
    • 78651529048 scopus 로고    scopus 로고
    • Privacy in Location-based Applications
    • S. Bettini C. Jajodia S., Samarati P. Wang, editor
    • S. Bettini C. Jajodia S., Samarati P. Wang, editor. Privacy in Location-based Applications. Springer, 2009.
    • (2009) Springer
  • 4
    • 84886609559 scopus 로고    scopus 로고
    • In Privacy in location-based applications, chapter Location Privacy Techniques in Client-Server Architectures
    • M. L. Y. C. S. Jensen, Hua Lu. In Privacy in location-based applications, chapter Location Privacy Techniques in Client-Server Architectures. Springer, 2009.
    • (2009) Springer
    • Jensen, M.L.Y.C.S.1    Hua, L.2
  • 6
    • 76149103618 scopus 로고    scopus 로고
    • Casper*: Query Processing for Location Services with- out Compromising Privacy
    • C. Chow, M. F. Mokbel, and W. G. Aref. Casper*: Query Processing for Location Services with- out Compromising Privacy. ACM Transactions on Database Systems, (34)4:4, 2009.
    • (2009) ACM Transactions On Database Systems , vol.34 , Issue.4 , pp. 4
    • Chow, C.1    Mokbel, M.F.2    Aref, W.G.3
  • 7
    • 44049087297 scopus 로고    scopus 로고
    • Protecting Location Privacy through Semantics-aware Obfuscation Techniques. In
    • Springer Boston, June
    • M. Damiani, E. Bertino, and C. Silvestri. Protecting Location Privacy through Semantics-aware Obfuscation Techniques. In Proc. of IFIPTM 2008, pages 231-245. Springer Boston, June 18-20 2008.
    • (2008) Proc. of IFIPTM 2008, Pages 231-245 , pp. 18-20
    • Damiani, M.1    Bertino, E.2    Silvestri, C.3
  • 10
    • 33846190518 scopus 로고    scopus 로고
    • A formal model of obfuscation and negotiation for location privacy
    • Springer
    • M. Duckham and L. Kulik. A formal model of obfuscation and negotiation for location privacy. In Pervasive Computing. Springer, 2005.
    • (2005) Pervasive Computing
    • Duckham, M.1    Kulik, L.2
  • 11
    • 27944454864 scopus 로고    scopus 로고
    • Location privacy in mobile systems: A personalized anonymization model
    • B. Gedik and L. Liu. Location privacy in mobile systems: A personalized anonymization model. In Proc. of the 25th IEEE ICDCS, 2005.
    • (2005) Proc. of The 25th IEEE ICDCS
    • Gedik, B.1    Liu, L.2
  • 12
    • 84886619517 scopus 로고    scopus 로고
    • GEOPRIV. http://www.ietf.org/html.charters/geopriv-charter.html.
    • GEOPRIV
  • 14
    • 57149129292 scopus 로고    scopus 로고
    • Private queries in location based services: Anonymizers are not necessary
    • New York, NY, USA, ACM
    • G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K.-L. Tan. Private queries in location based services: anonymizers are not necessary. In SIGMOD '08, pages 121-132, New York, NY, USA, 2008. ACM.
    • (2008) SIGMOD '08 , pp. 121-132
    • Ghinita, G.1    Kalnis, P.2    Khoshgozaran, A.3    Shahabi, C.4    Tan, K.-L.5
  • 16
    • 2342562393 scopus 로고    scopus 로고
    • Protecting privacy in continuous location tracking applications
    • M. Gruteser and X. Liu. Protecting privacy in continuous location tracking applications. IEEE Security and Privacy, 2(2):28-31, 2004.
    • (2004) IEEE Security and Privacy , vol.2 , Issue.2 , pp. 28-31
    • Gruteser, M.1    Liu, X.2
  • 17
    • 33745432342 scopus 로고    scopus 로고
    • Access control to people location information. ACM Trans
    • U. Hengartner and P. Steenkiste. Access control to people location information. ACM Trans. Inf. Syst. Secur., 8(4):424-456, 2005.
    • (2005) Inf. Syst. Secur , vol.8 , Issue.4 , pp. 424-456
    • Hengartner, U.1    Steenkiste, P.2
  • 19
    • 35648982949 scopus 로고    scopus 로고
    • Preventing location-based identity inference in anonymous spatial queries
    • P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias. Preventing location-based identity inference in anonymous spatial queries. IEEE TKDE, 2007.
    • (2007) IEEE TKDE
    • Kalnis, P.1    Ghinita, G.2    Mouratidis, K.3    Papadias, D.4
  • 20
    • 76749101810 scopus 로고    scopus 로고
    • Privacy-Preserving Publication of User Locations in the Proximity of Sensitive Sites
    • B. Krishnamachari, G. Ghinita, and P. Kalnis. Privacy-Preserving Publication of User Locations in the Proximity of Sensitive Sites. In Proc. SSDBM, 2008.
    • (2008) Proc. SSDBM
    • Krishnamachari, B.1    Ghinita, G.2    Kalnis, P.3
  • 21
    • 67650320950 scopus 로고    scopus 로고
    • A survey of computational location privacy
    • J. Krumm. A survey of computational location privacy. Personal and Ubiquitous Computing, (13)6:391-399, 2009.
    • (2009) Personal and Ubiquitous Computing , vol.13 , Issue.6 , pp. 391-399
    • Krumm, J.1
  • 22
    • 34548805858 scopus 로고    scopus 로고
    • t-Closeness: Privacy Beyond k-Anonymity and l- Diversity
    • N. Li, T. Li, and S. Venkatasubramanian. t-Closeness: Privacy Beyond k-Anonymity and l- Diversity. In Proc. ICDE, 2007.
    • (2007) In Proc. ICDE
    • Li, N.1    Li, T.2    Venkatasubramanian, S.3
  • 24
    • 2342502819 scopus 로고    scopus 로고
    • Preserving privacy in environments with location-based applications
    • G. Myles, A. Friday, and N. Davies. Preserving privacy in environments with location-based applications. IEEE Pervasive Computing, 2(1):56-64, 2003.
    • (2003) IEEE Pervasive Computing , vol.2 , Issue.1 , pp. 56-64
    • Myles, G.1    Friday, A.2    Davies, N.3
  • 25
    • 73949100139 scopus 로고    scopus 로고
    • Towards trajectory anonymization: A generalization-based approach
    • M. E. Nergiz, M. Atzori, Y. Saygin, and B. Güç. Towards trajectory anonymization: a generalization-based approach. Transactions on Data Privacy, 2(1):47-75, 2009.
    • (2009) Transactions On Data Privacy , vol.2 , Issue.1 , pp. 47-75
    • Nergiz, M.E.1    Atzori, M.2    Saygin, Y.3    Güç, B.4
  • 28
    • 76749087343 scopus 로고    scopus 로고
    • Towards Achieving Personalized Privacy for Location-Based Services
    • N. Poolsappasit and I. Ray. Towards Achieving Personalized Privacy for Location-Based Services. Transactions on Data Privacy, 2:1:77-99, 2009.
    • (2009) Transactions On Data Privacy , vol.2 , Issue.1 , pp. 77-99
    • Poolsappasit, N.1    Ray, I.2
  • 29
    • 77950020247 scopus 로고    scopus 로고
    • Foundations of Multidimensional and Metric data Structures
    • H. Samet. Foundations of Multidimensional and Metric data Structures. Morgan Kaufmann, 2006.
    • (2006) Morgan Kaufmann
    • Samet, H.1
  • 34
    • 34250680246 scopus 로고    scopus 로고
    • Personalized privacy preservation
    • New York, NY, USA, ACM
    • X. Xiao and Y. Tao. Personalized privacy preservation. In Proc. of the 2006 ACM SIGMOD, pages 229-240, New York, NY, USA, 2006. ACM.
    • (2006) Proc. of The 2006 ACM SIGMOD , pp. 229-240
    • Xiao, X.1    Tao, Y.2
  • 37
  • 38
    • 33644587121 scopus 로고    scopus 로고
    • Preserving mobile customer privacy: An access control system for moving objects and customer profiles
    • M. Youssef, V. Atluri, and N. R. Adam. Preserving mobile customer privacy: an access control system for moving objects and customer profiles. In Proc. MDM, 2005.
    • (2005) Proc. MDM
    • Youssef, M.1    Atluri, V.2    Adam, N.R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.