-
3
-
-
78651529048
-
Privacy in Location-based Applications
-
S. Bettini C. Jajodia S., Samarati P. Wang, editor
-
S. Bettini C. Jajodia S., Samarati P. Wang, editor. Privacy in Location-based Applications. Springer, 2009.
-
(2009)
Springer
-
-
-
4
-
-
84886609559
-
In Privacy in location-based applications, chapter Location Privacy Techniques in Client-Server Architectures
-
M. L. Y. C. S. Jensen, Hua Lu. In Privacy in location-based applications, chapter Location Privacy Techniques in Client-Server Architectures. Springer, 2009.
-
(2009)
Springer
-
-
Jensen, M.L.Y.C.S.1
Hua, L.2
-
6
-
-
76149103618
-
Casper*: Query Processing for Location Services with- out Compromising Privacy
-
C. Chow, M. F. Mokbel, and W. G. Aref. Casper*: Query Processing for Location Services with- out Compromising Privacy. ACM Transactions on Database Systems, (34)4:4, 2009.
-
(2009)
ACM Transactions On Database Systems
, vol.34
, Issue.4
, pp. 4
-
-
Chow, C.1
Mokbel, M.F.2
Aref, W.G.3
-
7
-
-
44049087297
-
Protecting Location Privacy through Semantics-aware Obfuscation Techniques. In
-
Springer Boston, June
-
M. Damiani, E. Bertino, and C. Silvestri. Protecting Location Privacy through Semantics-aware Obfuscation Techniques. In Proc. of IFIPTM 2008, pages 231-245. Springer Boston, June 18-20 2008.
-
(2008)
Proc. of IFIPTM 2008, Pages 231-245
, pp. 18-20
-
-
Damiani, M.1
Bertino, E.2
Silvestri, C.3
-
9
-
-
76749146886
-
Protecting location privacy against spatial inferences: The probe approach
-
New York, NY, USA, ACM
-
M. L. Damiani, E. Bertino, and C. Silvestri. Protecting location privacy against spatial inferences: the probe approach. In SPRINGL '09: Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS, New York, NY, USA, 2009. ACM.
-
(2009)
SPRINGL '09: Proceedings of The 2nd SIGSPATIAL ACM GIS 2009 International Workshop On Security and Privacy In GIS and LBS
-
-
Damiani, M.L.1
Bertino, E.2
Silvestri, C.3
-
10
-
-
33846190518
-
A formal model of obfuscation and negotiation for location privacy
-
Springer
-
M. Duckham and L. Kulik. A formal model of obfuscation and negotiation for location privacy. In Pervasive Computing. Springer, 2005.
-
(2005)
Pervasive Computing
-
-
Duckham, M.1
Kulik, L.2
-
11
-
-
27944454864
-
Location privacy in mobile systems: A personalized anonymization model
-
B. Gedik and L. Liu. Location privacy in mobile systems: A personalized anonymization model. In Proc. of the 25th IEEE ICDCS, 2005.
-
(2005)
Proc. of The 25th IEEE ICDCS
-
-
Gedik, B.1
Liu, L.2
-
12
-
-
84886619517
-
-
GEOPRIV. http://www.ietf.org/html.charters/geopriv-charter.html.
-
GEOPRIV
-
-
-
13
-
-
70349494340
-
Interactive Location Cloaking with the PROBE Obfuscator
-
G. Ghinita, M. Damiani, E. Bertino, and C. Silvestri. Interactive Location Cloaking with the PROBE Obfuscator. In Proc. of the Tenth International Conference on Mobile Data Management: Systems, Services and Middleware, 2009.
-
(2009)
Proc. of The Tenth International Conference On Mobile Data Management: Systems, Services and Middleware
-
-
Ghinita, G.1
Damiani, M.2
Bertino, E.3
Silvestri, C.4
-
14
-
-
57149129292
-
Private queries in location based services: Anonymizers are not necessary
-
New York, NY, USA, ACM
-
G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K.-L. Tan. Private queries in location based services: anonymizers are not necessary. In SIGMOD '08, pages 121-132, New York, NY, USA, 2008. ACM.
-
(2008)
SIGMOD '08
, pp. 121-132
-
-
Ghinita, G.1
Kalnis, P.2
Khoshgozaran, A.3
Shahabi, C.4
Tan, K.-L.5
-
16
-
-
2342562393
-
Protecting privacy in continuous location tracking applications
-
M. Gruteser and X. Liu. Protecting privacy in continuous location tracking applications. IEEE Security and Privacy, 2(2):28-31, 2004.
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.2
, pp. 28-31
-
-
Gruteser, M.1
Liu, X.2
-
17
-
-
33745432342
-
Access control to people location information. ACM Trans
-
U. Hengartner and P. Steenkiste. Access control to people location information. ACM Trans. Inf. Syst. Secur., 8(4):424-456, 2005.
-
(2005)
Inf. Syst. Secur
, vol.8
, Issue.4
, pp. 424-456
-
-
Hengartner, U.1
Steenkiste, P.2
-
19
-
-
35648982949
-
Preventing location-based identity inference in anonymous spatial queries
-
P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias. Preventing location-based identity inference in anonymous spatial queries. IEEE TKDE, 2007.
-
(2007)
IEEE TKDE
-
-
Kalnis, P.1
Ghinita, G.2
Mouratidis, K.3
Papadias, D.4
-
20
-
-
76749101810
-
Privacy-Preserving Publication of User Locations in the Proximity of Sensitive Sites
-
B. Krishnamachari, G. Ghinita, and P. Kalnis. Privacy-Preserving Publication of User Locations in the Proximity of Sensitive Sites. In Proc. SSDBM, 2008.
-
(2008)
Proc. SSDBM
-
-
Krishnamachari, B.1
Ghinita, G.2
Kalnis, P.3
-
21
-
-
67650320950
-
A survey of computational location privacy
-
J. Krumm. A survey of computational location privacy. Personal and Ubiquitous Computing, (13)6:391-399, 2009.
-
(2009)
Personal and Ubiquitous Computing
, vol.13
, Issue.6
, pp. 391-399
-
-
Krumm, J.1
-
24
-
-
2342502819
-
Preserving privacy in environments with location-based applications
-
G. Myles, A. Friday, and N. Davies. Preserving privacy in environments with location-based applications. IEEE Pervasive Computing, 2(1):56-64, 2003.
-
(2003)
IEEE Pervasive Computing
, vol.2
, Issue.1
, pp. 56-64
-
-
Myles, G.1
Friday, A.2
Davies, N.3
-
25
-
-
73949100139
-
Towards trajectory anonymization: A generalization-based approach
-
M. E. Nergiz, M. Atzori, Y. Saygin, and B. Güç. Towards trajectory anonymization: a generalization-based approach. Transactions on Data Privacy, 2(1):47-75, 2009.
-
(2009)
Transactions On Data Privacy
, vol.2
, Issue.1
, pp. 47-75
-
-
Nergiz, M.E.1
Atzori, M.2
Saygin, Y.3
Güç, B.4
-
27
-
-
70349741769
-
Trajectory Data Warehouses: Design and Implementation Issues
-
S. Orlando, R. Orsini, A. Raffaetà, A. Roncato, and C. Silvestri. Trajectory Data Warehouses: Design and Implementation Issues. Journal of Computing Science and Engineering, 1(2):240-261, 2007.
-
(2007)
Journal of Computing Science and Engineering
, vol.1
, Issue.2
, pp. 240-261
-
-
Orlando, S.1
Orsini, R.2
Raffaetà, A.3
Roncato, A.4
Silvestri, C.5
-
28
-
-
76749087343
-
Towards Achieving Personalized Privacy for Location-Based Services
-
N. Poolsappasit and I. Ray. Towards Achieving Personalized Privacy for Location-Based Services. Transactions on Data Privacy, 2:1:77-99, 2009.
-
(2009)
Transactions On Data Privacy
, vol.2
, Issue.1
, pp. 77-99
-
-
Poolsappasit, N.1
Ray, I.2
-
29
-
-
77950020247
-
Foundations of Multidimensional and Metric data Structures
-
H. Samet. Foundations of Multidimensional and Metric data Structures. Morgan Kaufmann, 2006.
-
(2006)
Morgan Kaufmann
-
-
Samet, H.1
-
30
-
-
0242456299
-
Concepts for personal location privacy policies
-
New York, NY, USA, ACM Press
-
rd ACM conference on Electronic Commerce, pages 48-57, New York, NY, USA, 2001. ACM Press.
-
(2001)
rd ACM Conference On Electronic Commerce
, pp. 48-57
-
-
Snekkenes, E.1
-
31
-
-
78651595226
-
Analyzing Use of Privacy Policy Attributes in a Location Sharing Application
-
E. Toch, R. Ravichandran, L. Cranor, P. H. Drielsma, J. Hong, P. Kelley, N. Sadeh, and J. Tsai. Analyzing Use of Privacy Policy Attributes in a Location Sharing Application. In Proc. ACM SOUP, 2009.
-
(2009)
Proc. ACM SOUP
-
-
Toch, E.1
Ravichandran, R.2
Cranor, L.3
Drielsma, P.H.4
Hong, J.5
Kelley, P.6
Sadeh, N.7
Tsai, J.8
-
32
-
-
84892447976
-
Who's viewed you?: The impact of feedback in a mobile location-sharing application
-
New York, NY, USA, ACM
-
J. Y. Tsai, P. Kelley, P. Drielsma, L. F. Cranor, J. Hong, and N. Sadeh. Who's viewed you?: the impact of feedback in a mobile location-sharing application. In CHI '09: Proceedings of the 27th international conference on Human factors in computing systems, pages 2003-2012, New York, NY, USA, 2009. ACM.
-
(2009)
CHI '09: Proceedings of The 27th International Conference On Human Factors In Computing Systems
, pp. 2003-2012
-
-
Tsai, J.Y.1
Kelley, P.2
Drielsma, P.3
Cranor, L.F.4
Hong, J.5
Sadeh, N.6
-
34
-
-
34250680246
-
Personalized privacy preservation
-
New York, NY, USA, ACM
-
X. Xiao and Y. Tao. Personalized privacy preservation. In Proc. of the 2006 ACM SIGMOD, pages 229-240, New York, NY, USA, 2006. ACM.
-
(2006)
Proc. of The 2006 ACM SIGMOD
, pp. 229-240
-
-
Xiao, X.1
Tao, Y.2
-
35
-
-
74049157401
-
Feeling-based location privacy protection for location-based services
-
New York, NY, USA, ACM
-
T. Xu and Y. Cai. Feeling-based location privacy protection for location-based services. In CCS '09: Proceedings of the 16th ACM conference on Computer and communications security, pages 348-357, New York, NY, USA, 2009. ACM.
-
(2009)
CCS '09: Proceedings of The 16th ACM Conference On Computer and Communications Security
, pp. 348-357
-
-
Xu, T.1
Cai, Y.2
-
37
-
-
52649118020
-
SpaceTwist: Managing the Trade-Offs Among Location Privacy, Query Performance, and Query Accuracy in Mobile Services
-
M. Yiu, C. Jensen, X. Huang, and H. Lu. SpaceTwist: Managing the Trade-Offs Among Location Privacy, Query Performance, and Query Accuracy in Mobile Services. In Proc. IEEE 24th International Conference on Data Engineering, 2008.
-
(2008)
Proc. IEEE 24th International Conference On Data Engineering
-
-
Yiu, M.1
Jensen, C.2
Huang, X.3
Lu, H.4
-
38
-
-
33644587121
-
Preserving mobile customer privacy: An access control system for moving objects and customer profiles
-
M. Youssef, V. Atluri, and N. R. Adam. Preserving mobile customer privacy: an access control system for moving objects and customer profiles. In Proc. MDM, 2005.
-
(2005)
Proc. MDM
-
-
Youssef, M.1
Atluri, V.2
Adam, N.R.3
|