메뉴 건너뛰기




Volumn 27, Issue 12, 2015, Pages 3021-3043

Protecting location privacy and query privacy: A combined clustering approach

Author keywords

continuous location based services; hierarchical clustering; k means clustering; location privacy; query privacy

Indexed keywords

HIERARCHICAL CLUSTERING; ITERATIVE METHODS; LOCATION; LOCATION BASED SERVICES; TELECOMMUNICATION SERVICES; TRANSFER CASES (VEHICLES);

EID: 84937727505     PISSN: 15320626     EISSN: 15320634     Source Type: Journal    
DOI: 10.1002/cpe.3244     Document Type: Article
Times cited : (16)

References (44)
  • 1
    • 2342502819 scopus 로고    scopus 로고
    • Preserving privacy in environments with location-based applications
    • Myles G, Friday A, Davies N,. Preserving privacy in environments with location-based applications. IEEE Pervasive Computing 2003; 2 (1): 56-64.
    • (2003) IEEE Pervasive Computing , vol.2 , Issue.1 , pp. 56-64
    • Myles, G.1    Friday, A.2    Davies, N.3
  • 3
    • 2942524994 scopus 로고    scopus 로고
    • Location privacy in pervasive computing
    • Beresford A, Stajano F,. Location privacy in pervasive computing. IEEE Pervasive Computing 2003; 2 (1): 46-55.
    • (2003) IEEE Pervasive Computing , vol.2 , Issue.1 , pp. 46-55
    • Beresford, A.1    Stajano, F.2
  • 4
    • 2342484676 scopus 로고    scopus 로고
    • Location-based services for mobile telephony: A study of users' privacy concerns
    • Zurich, Switzerland
    • Barkhuus L, Dey A,. Location-based services for mobile telephony: a study of users' privacy concerns. Proc. Interact, Citeseer, Zurich, Switzerland, 2003; 709-712.
    • (2003) Proc. Interact, Citeseer , pp. 709-712
    • Barkhuus, L.1    Dey, A.2
  • 7
    • 67650320950 scopus 로고    scopus 로고
    • A survey of computational location privacy
    • Krumm J,. A survey of computational location privacy. Personal and Ubiquitous Computing 2009; 13 (6): 391-399.
    • (2009) Personal and Ubiquitous Computing , vol.13 , Issue.6 , pp. 391-399
    • Krumm, J.1
  • 13
    • 36549043405 scopus 로고    scopus 로고
    • Protecting location privacy with personalized k-anonymity: Architecture and algorithms
    • Gedik B, Liu L,. Protecting location privacy with personalized k-anonymity: architecture and algorithms. IEEE Transactions on Mobile Computing 2008; 7 (1): 1-18.
    • (2008) IEEE Transactions on Mobile Computing , vol.7 , Issue.1 , pp. 1-18
    • Gedik, B.1    Liu, L.2
  • 15
    • 57849160922 scopus 로고    scopus 로고
    • Exploring historical location data for anonymity preservation in location-based services
    • Phoenix, AZ, USA
    • Xu T, Cai Y,. Exploring historical location data for anonymity preservation in location-based services. 27th Conference on Computer Communications, IEEE, Phoenix, AZ, USA, 2008; 547-555.
    • (2008) 27th Conference on Computer Communications, IEEE , pp. 547-555
    • Xu, T.1    Cai, Y.2
  • 20
    • 80054065916 scopus 로고    scopus 로고
    • Fine-grained cloaking of sensitive positions in location-sharing applications
    • Damiani M, Silvestri C, Bertino E,. Fine-grained cloaking of sensitive positions in location-sharing applications. IEEE Pervasive Computing 2011; 10 (4): 64-72.
    • (2011) IEEE Pervasive Computing , vol.10 , Issue.4 , pp. 64-72
    • Damiani, M.1    Silvestri, C.2    Bertino, E.3
  • 26
    • 52649118020 scopus 로고    scopus 로고
    • Spacetwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services
    • México
    • Yiu M, Jensen C, Huang X, Lu H,. Spacetwist: managing the trade-offs among location privacy, query performance, and query accuracy in mobile services. IEEE 24th International conference on Data Engineering, IEEE, Cancún, México, 2008; 366-375.
    • (2008) IEEE 24th International Conference on Data Engineering, IEEE, Cancún , pp. 366-375
    • Yiu, M.1    Jensen, C.2    Huang, X.3    Lu, H.4
  • 35
    • 52649118020 scopus 로고    scopus 로고
    • Spacetwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services
    • México
    • Yiu M, Jensen C, Huang X, Lu H,. Spacetwist: managing the trade-offs among location privacy, query performance, and query accuracy in mobile services. IEEE 24th International Conference on Data Engineering, IEEE, Cancùn, México, 2008; 366-375.
    • (2008) IEEE 24th International Conference on Data Engineering, IEEE, Cancùn , pp. 366-375
    • Yiu, M.1    Jensen, C.2    Huang, X.3    Lu, H.4
  • 36
    • 0000301097 scopus 로고
    • A greedy heuristic for the set-covering problem
    • Chvatal V,. A greedy heuristic for the set-covering problem. Mathematics of Operations Research 1979; 4 (3): 233-235.
    • (1979) Mathematics of Operations Research , vol.4 , Issue.3 , pp. 233-235
    • Chvatal, V.1
  • 37
  • 38
    • 0023452095 scopus 로고
    • Some np-complete problems in quadratic and nonlinear programming
    • Murty K, Kabadi S,. Some np-complete problems in quadratic and nonlinear programming. Mathematical Programming 1987; 39 (2): 117-129.
    • (1987) Mathematical Programming , vol.39 , Issue.2 , pp. 117-129
    • Murty, K.1    Kabadi, S.2
  • 39
    • 0021425650 scopus 로고
    • New np-hard and np-complete polynomial and integer divisibility problems
    • Plaisted D,. New np-hard and np-complete polynomial and integer divisibility problems. Theoretical Computer Science 1984; 31 (1): 125-138.
    • (1984) Theoretical Computer Science , vol.31 , Issue.1 , pp. 125-138
    • Plaisted, D.1
  • 41
    • 0004116989 scopus 로고    scopus 로고
    • The MIT press: Cambridge, Massachusetts, USA
    • Cormen T,. Introduction to Algorithms. The MIT press: Cambridge, Massachusetts, USA, 2001.
    • (2001) Introduction to Algorithms
    • Cormen, T.1
  • 44
    • 67650320950 scopus 로고    scopus 로고
    • A survey of computational location privacy
    • Krumm J,. A survey of computational location privacy. Personal and Ubiquitous Computing 2009; 13 (6): 391-399.
    • (2009) Personal and Ubiquitous Computing , vol.13 , Issue.6 , pp. 391-399
    • Krumm, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.