메뉴 건너뛰기




Volumn 4, Issue 2, 2011, Pages 103-126

Show me how you move and i will tell you who you are

Author keywords

Clustering; Geo privacy; Geolocated data; Inference attacks; Privacy; Sanitization

Indexed keywords

CLUSTERING; GEO-PRIVACY; GEOLOCATED DATA; INFERENCE ATTACKS; SANITIZATION;

EID: 80051522333     PISSN: 18885063     EISSN: 20131631     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (75)

References (31)
  • 3
    • 0033559186 scopus 로고    scopus 로고
    • Geographically masking health data to preserve confidentiality
    • M. P. Armstrong, G. Rushton, and D. L. Zimmerman, "Geographically masking health data to preserve confidentiality, " Statistics in Medicine, vol. 18, pp. 497-525, 1999.
    • (1999) Statistics in Medicine , vol.18 , pp. 497-525
    • Armstrong, M.P.1    Rushton, G.2    Zimmerman, D.L.3
  • 9
    • 67650312114 scopus 로고    scopus 로고
    • On the anonymity of home/work location pairs
    • May
    • P. Golle and K. Partridge, "On the anonymity of home/work location pairs, " Pervasive Computing, pp. 390-397, May 2009.
    • (2009) Pervasive Computing , pp. 390-397
    • Golle, P.1    Partridge, K.2
  • 10
    • 44849122540 scopus 로고    scopus 로고
    • Understanding individual human mobility patterns
    • June
    • M. C. Gonzalez, C. A. Hidalgo, and A.-L. Barabasi, "Understanding individual human mobility patterns, " Nature, vol. 453, no. 7196, pp. 779-782, June 2008.
    • (2008) Nature , vol.453 , Issue.7196 , pp. 779-782
    • Gonzalez, M.C.1    Hidalgo, C.A.2    Barabasi, A.-L.3
  • 12
    • 67650320950 scopus 로고    scopus 로고
    • A survey of computational location privacy
    • J. Krumm, "A survey of computational location privacy, " Personal and Ubiquitous Computing, vol. 13, no. 6, pp. 391-399, 2009.
    • (2009) Personal and Ubiquitous Computing , vol.13 , Issue.6 , pp. 391-399
    • Krumm, J.1
  • 15
    • 33750879264 scopus 로고    scopus 로고
    • Enhancing security and privacy in trafficmonitoring systems
    • B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady, "Enhancing security and privacy in trafficmonitoring systems, " IEEE Pervasive Computing, vol. 5, no. 4, pp. 38-46, 2006.
    • (2006) IEEE Pervasive Computing , vol.5 , Issue.4 , pp. 38-46
    • Hoh, B.1    Gruteser, M.2    Xiong, H.3    Alrabady, A.4
  • 19
    • 38049035427 scopus 로고    scopus 로고
    • Inference attacks on location tracks
    • J. Krumm, "Inference attacks on location tracks, " Pervasive Computing, pp. 127-143, 2007.
    • (2007) Pervasive Computing , pp. 127-143
    • Krumm, J.1
  • 21
    • 78650869043 scopus 로고    scopus 로고
    • A spatiotemporal model of obfuscation strategies and counter strategies for location privacy
    • D. Matt, K. Lars, and B. Athol, "A spatiotemporal model of obfuscation strategies and counter strategies for location privacy, " Lectures Notes in Computer Science, vol. 4197, no. 4, pp. 47-64, 2006.
    • (2006) Lectures Notes in Computer Science , vol.4197 , Issue.4 , pp. 47-64
    • Matt, D.1    Lars, K.2    Athol, B.3
  • 24
    • 19944372788 scopus 로고    scopus 로고
    • Keeping ubiquitous computing to yourself: A practical model for user control of privacy
    • B. A. Price, K. Adam, and B. Nuseibeh, "Keeping ubiquitous computing to yourself: A practical model for user control of privacy, " Int. J. Human-Computer Studies, pp. 228-253, 2005.
    • (2005) Int. J. Human-Computer Studies , pp. 228-253
    • Price, B.A.1    Adam, K.2    Nuseibeh, B.3
  • 25
    • 0018689571 scopus 로고
    • An algorithm for tracking multiple targets
    • D. Reiter, "An algorithm for tracking multiple targets, " IEEE Transactions on Automatic Control, vol. 24, no. 6, pp. 843-854, 1979.
    • (1979) IEEE Transactions on Automatic Control , vol.24 , Issue.6 , pp. 843-854
    • Reiter, D.1
  • 26
    • 77149139158 scopus 로고    scopus 로고
    • Limits of predictability in human mobility
    • C. Song, Z. Qu, N. Blumm, and A.-L. Barabasi, "Limits of predictability in human mobility, " Science, vol. 327, no. 5968, pp. 1018-1021, 2010.
    • (2010) Science , vol.327 , Issue.5968 , pp. 1018-1021
    • Song, C.1    Qu, Z.2    Blumm, N.3    Barabasi, A.-L.4
  • 28
    • 0036811662 scopus 로고    scopus 로고
    • K-anonymity: A model for protecting privacy
    • L. Sweeney, "k-anonymity: a model for protecting privacy, " Int. J. Uncertain. Fuzziness Knowl.-Based Syst., vol. 10, no. 5, pp. 557-570, 2002.
    • (2002) Int. J. Uncertain. Fuzziness Knowl.-Based Syst , vol.10 , Issue.5 , pp. 557-570
    • Sweeney, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.