메뉴 건너뛰기




Volumn , Issue , 2012, Pages 289-300

MaskIt: Privately releasing user context streams for personalized mobile applications

Author keywords

data privacy; mobile applications

Indexed keywords

FILTERING SYSTEMS; MOBILE APPLICATIONS; PERSONALIZATIONS; SENSOR READINGS; TEMPORAL CORRELATIONS; USER CONTEXT;

EID: 84862643033     PISSN: 07308078     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2213836.2213870     Document Type: Conference Paper
Times cited : (109)

References (37)
  • 1
    • 77954717287 scopus 로고    scopus 로고
    • On active learning of record matching packages
    • Arvind Arasu, Michaela Götz, and Raghav Kaushik. On active learning of record matching packages. In SIGMOD, 2010.
    • (2010) SIGMOD
    • Arasu, A.1    Götz, M.2    Kaushik, R.3
  • 2
    • 77956284416 scopus 로고    scopus 로고
    • Activity recognition for everyday life on mobile phones
    • Gerald Bieber, Jörg Voskamp, and Bodo Urban. Activity recognition for everyday life on mobile phones. In HCI, 2009.
    • (2009) HCI
    • Bieber, G.1    Voskamp, J.2    Urban, B.3
  • 3
    • 0038589165 scopus 로고    scopus 로고
    • The anatomy of a large-scale hypertextual web search engine
    • Sergey Brin and Lawrence Page. The anatomy of a large-scale hypertextual web search engine. Computer Networks, 30(1-7):107-117, 1998.
    • (1998) Computer Networks , vol.30 , Issue.1-7 , pp. 107-117
    • Brin, S.1    Page, L.2
  • 4
    • 35348868030 scopus 로고    scopus 로고
    • Dynamic personalized pagerank in entity-relation graphs
    • Soumen Chakrabarti. Dynamic personalized pagerank in entity-relation graphs. In WWW, 2007.
    • (2007) WWW
    • Chakrabarti, S.1
  • 7
    • 79959868798 scopus 로고    scopus 로고
    • Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones
    • William Enck, Peter Gilbert, Byung gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol Sheth. Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones. In OSDI, 2010.
    • (2010) OSDI
    • Enck, W.1    Gilbert, P.2    Chun, B.G.3    Cox, L.P.4    Jung, J.5    McDaniel, P.6    Sheth, A.7
  • 9
    • 74049132493 scopus 로고    scopus 로고
    • Preventing velocity-based linkage attacks in location-aware applications
    • Gabriel Ghinita, Maria Luisa Damiani, Claudio Silvestri, and Elisa Bertino. Preventing velocity-based linkage attacks in location-aware applications. In GIS, 2009.
    • (2009) GIS
    • Ghinita, G.1    Damiani, M.L.2    Silvestri, C.3    Bertino, E.4
  • 10
    • 57149129292 scopus 로고    scopus 로고
    • Private queries in location based services: Anonymizers are not necessary
    • Gabriel Ghinita, Panos Kalnis, Ali Khoshgozaran, Cyrus Shahabi, and Kian-Lee Tan. Private queries in location based services: anonymizers are not necessary. In SIGMOD, 2008.
    • (2008) SIGMOD
    • Ghinita, G.1    Kalnis, P.2    Khoshgozaran, A.3    Shahabi, C.4    Tan, K.-L.5
  • 12
    • 85018204196 scopus 로고    scopus 로고
    • Anonymous usage of location-based services through spatial and temporal cloaking
    • Marco Gruteser and Dirk Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In MobiSys, 2003.
    • (2003) MobiSys
    • Gruteser, M.1    Grunwald, D.2
  • 13
    • 2342562393 scopus 로고    scopus 로고
    • Protecting privacy in continuous location-tracking applications
    • Marco Gruteser and Xuan Liu. Protecting privacy in continuous location-tracking applications. IEEE Security and Privacy, 2:28-34, 2004.
    • (2004) IEEE Security and Privacy , vol.2 , pp. 28-34
    • Gruteser, M.1    Liu, X.2
  • 14
    • 79960189403 scopus 로고    scopus 로고
    • On the complexity of privacy-preserving complex event processing
    • Yeye He, Siddharth Barman, Di Wang, and Jeffrey F. Naughton. On the complexity of privacy-preserving complex event processing. In PODS, 2011.
    • (2011) PODS
    • He, Y.1    Barman, S.2    Wang, D.3    Naughton, J.F.4
  • 15
    • 75449099590 scopus 로고    scopus 로고
    • Human activity recognition and pattern discovery
    • E. Kim S. Helal and D. Cook. Human activity recognition and pattern discovery. IEEE Pervasive Computing, 9(1):48-53, 2010.
    • (2010) IEEE Pervasive Computing , vol.9 , Issue.1 , pp. 48-53
    • Cook, D.1
  • 16
    • 80053438862 scopus 로고    scopus 로고
    • Scaling personalized web search
    • Glen Jeh and Jennifer Widom. Scaling personalized web search. In WWW, 2003.
    • (2003) In WWW
    • Jeh, G.1    Widom, J.2
  • 18
    • 79958176000 scopus 로고    scopus 로고
    • When are users comfortable sharing locations with advertisers?
    • Patrick Gage Kelley, Michael Benisch, Lorrie Faith Cranor, and Norman M. Sadeh. When are users comfortable sharing locations with advertisers? In CHI, 2011.
    • (2011) CHI
    • Kelley, P.G.1    Benisch, M.2    Cranor, L.F.3    Sadeh, N.M.4
  • 19
    • 70849111568 scopus 로고    scopus 로고
    • Attacks on privacy and definetti's theorem
    • Daniel Kifer. Attacks on privacy and definetti's theorem. In SIGMOD, 2009.
    • (2009) SIGMOD
    • Kifer, D.1
  • 20
    • 9444233624 scopus 로고    scopus 로고
    • An empirical study of dynamic bayesian networks for user modeling
    • Alexander Kuenzer, Christopher Schlick, Frank Ohmann, Ludger Schmidt, and Holger Luczak. An empirical study of dynamic bayesian networks for user modeling. In UM, 2001.
    • (2001) UM
    • Kuenzer, A.1    Schlick, C.2    Ohmann, F.3    Schmidt, L.4    Luczak, H.5
  • 25
    • 34548748619 scopus 로고    scopus 로고
    • Worst case background knowledge for privacy preserving data publishing
    • David J. Martin, Daniel Kifer, Ashwin Machanavajjhala, Johannes Gehrke, and Joseph Y. Halpern. Worst case background knowledge for privacy preserving data publishing. In ICDE, 2007.
    • (2007) ICDE
    • Martin, D.J.1    Kifer, D.2    Machanavajjhala, A.3    Gehrke, J.4    Halpern, J.Y.5
  • 30
    • 74549203914 scopus 로고    scopus 로고
    • A framework for safely publishing communication traces
    • Abhinav Parate and Gerome Miklau. A framework for safely publishing communication traces. In CIKM, 2009.
    • (2009) CIKM
    • Parate, A.1    Miklau, G.2
  • 31
    • 49149123423 scopus 로고    scopus 로고
    • Composition and generalization of context data for privacy preservation
    • Linda Pareschi, Daniele Riboni, Alessandra Agostini, and Claudio Bettini. Composition and generalization of context data for privacy preservation. In PerComm, 2008.
    • (2008) PerComm
    • Pareschi, L.1    Riboni, D.2    Agostini, A.3    Bettini, C.4
  • 35
    • 85011016303 scopus 로고    scopus 로고
    • Minimality attack in privacy preserving data publishing
    • Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, and Jian Pei. Minimality attack in privacy preserving data publishing. In VLDB, 2007.
    • (2007) VLDB
    • Wong, R.C.-W.1    Fu, A.W.-C.2    Wang, K.3    Pei, J.4
  • 36
    • 80052013720 scopus 로고    scopus 로고
    • Can the utility of anonymized data be used for privacy breaches?
    • Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, Philip S. Yu, and Jian Pei. Can the utility of anonymized data be used for privacy breaches? TKDD, 5(3), 2011.
    • (2011) TKDD , vol.5 , Issue.3
    • Wong, R.C.-W.1    Fu, A.W.-C.2    Wang, K.3    Yu, P.S.4    Pei, J.5
  • 37
    • 77952081925 scopus 로고    scopus 로고
    • Transparent anonymization: Thwarting adversaries who know the algorithm
    • Xiaokui Xiao, Yufei Tao, and Nick Koudas. Transparent anonymization: Thwarting adversaries who know the algorithm. ACM Trans. Database Syst., 35(2), 2010.
    • (2010) ACM Trans. Database Syst. , vol.35 , Issue.2
    • Xiao, K.1    Tao, Y.2    Koudas, N.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.