메뉴 건너뛰기




Volumn 1, Issue 3, 2007, Pages 179-207

Spatial generalisation algorithms for LBS privacy preservation

Author keywords

Anonymity; Privacy; Spatial cloaking; Spatial generalisation; Spatial queries

Indexed keywords


EID: 84992757948     PISSN: 17489725     EISSN: 17489733     Source Type: Journal    
DOI: 10.1080/17489720801941789     Document Type: Article
Times cited : (35)

References (28)
  • 2
    • 28444449426 scopus 로고    scopus 로고
    • Proc. of the 21st international conference on data engineering, IEEE Computer Society
    • Bayardo, RJ, and Agrawal, R. 2005. Data privacy through optimal k-anonymization. Proc. of the 21st international conference on data engineering. 2005. pp. 217–228. IEEE Computer Society.
    • (2005) Data privacy through optimal k-anonymization , pp. 217-228
    • Bayardo, R.J.1    Agrawal, R.2
  • 3
    • 2942524994 scopus 로고    scopus 로고
    • Location privacy in pervasive computing
    • Beresford, AR, and Stajano, F. 2003. Location privacy in pervasive computing. IEEE Pervasive Computing, 2 (1):46–55.
    • (2003) IEEE Pervasive Computing , vol.2 , Issue.1 , pp. 46-55
    • Beresford, A.R.1    Stajano, F.2
  • 4
    • 33745844081 scopus 로고    scopus 로고
    • Location Privacy in Ubiquitous Computing
    • University of Cambridge
    • Beresford, AR. 2005. “ Location Privacy in Ubiquitous Computing ”. In Thesis (PhD), University of Cambridge.
    • (2005) Thesis (PhD)
    • Beresford, A.R.1
  • 6
    • 33646153058 scopus 로고    scopus 로고
    • Protecting privacy against location-based personal identification
    • Heidelberg: Springer, 3674 of LNCS
    • Bettini, C, Wang, XS, and Jajodia, S. 2005. “ Protecting privacy against location-based personal identification ”. In Proc. of the 2nd workshop on secure data management (SDM), 185–199. Heidelberg:Springer. 3674 of LNCS
    • (2005) Proc. of the 2nd workshop on secure data management (SDM) , pp. 185-199
    • Bettini, C.1    Wang, X.S.2    Jajodia, S.3
  • 7
    • 38149096067 scopus 로고    scopus 로고
    • The role of quasi-identifiers in k-anonymity revisited
    • Milan: DICo, University of Milan
    • Bettini, C, Wang, XS, and Jajodia, S. 2006. “ The role of quasi-identifiers in k-anonymity revisited ”. In Technical Report RT-11-06, Milan:DICo, University of Milan.
    • (2006) Technical Report RT-11-06
    • Bettini, C.1    Wang, X.S.2    Jajodia, S.3
  • 8
    • 0036606530 scopus 로고    scopus 로고
    • A framework for generating network-based moving objects
    • Brinkhoff, T. 2002. A framework for generating network-based moving objects. GeoInformatica, 6 (2):153–180.
    • (2002) GeoInformatica , vol.6 , Issue.2 , pp. 153-180
    • Brinkhoff, T.1
  • 11
    • 0000072558 scopus 로고
    • Finding a needle in a haystack - or identifying anonymous census record
    • Dalenius, T. 1986. Finding a needle in a haystack - or identifying anonymous census record. Journal of Official Statistics, 2 (3):329–336.
    • (1986) Journal of Official Statistics , vol.2 , Issue.3 , pp. 329-336
    • Dalenius, T.1
  • 12
    • 33745725717 scopus 로고    scopus 로고
    • An anonymous communication technique using dummies for location-based services
    • Washington, DC: IEEE Computer Society
    • Kido, H, Yanagisawa, Y, and Satoh, T. 2005. “ An anonymous communication technique using dummies for location-based services ”. In Proc. of the international conference on pervasive services (ICPS), 88–97. Washington, DC:IEEE Computer Society.
    • (2005) Proc. of the international conference on pervasive services (ICPS) , pp. 88-97
    • Kido, H.1    Yanagisawa, Y.2    Satoh, T.3
  • 18
  • 20
    • 85024198356 scopus 로고    scopus 로고
    • Proc. of the 1st international workshop on privacy-aware location-based mobile services (PALMS), Washington, DC: IEEE Computer Society
    • Mascetti, S, and Bettini, C. 2007. A comparison of spatial generalization algorithms for LBS privacy preservation. Proc. of the 1st international workshop on privacy-aware location-based mobile services (PALMS). 2007. Washington, DC:IEEE Computer Society.
    • (2007) A comparison of spatial generalization algorithms for LBS privacy preservation
    • Mascetti, S.1    Bettini, C.2
  • 21
    • 33751394416 scopus 로고    scopus 로고
    • Proc. of 13th international symposium on temporal representation and reasoning, Washington, DC: IEEE Computer Society
    • Mascetti, S, Bettini, C, Wang, XS, and Jajodia, S. 2006. k-anonymity in databases with timestamped data. Proc. of 13th international symposium on temporal representation and reasoning. 2006. Washington, DC:IEEE Computer Society.
    • (2006) k-anonymity in databases with timestamped data
    • Mascetti, S.1    Bettini, C.2    Wang, X.S.3    Jajodia, S.4
  • 23
    • 0035517699 scopus 로고    scopus 로고
    • Protecting respondents’ identities in microdata release
    • Samarati, P. 2001. Protecting respondents’ identities in microdata release. IEEE Transactions on Knowledge and Data Engineering, 13 (6):1010–1027.
    • (2001) IEEE Transactions on Knowledge and Data Engineering , vol.13 , Issue.6 , pp. 1010-1027
    • Samarati, P.1
  • 27
    • 34250680246 scopus 로고    scopus 로고
    • SIGMOD ‘06: Proceedings of the 2006 ACM SIGMOD international conference on management of data, New York: ACM Press
    • Xiao, X, and Tao, Y. 2006. Personalized privacy preservation. SIGMOD ‘06:Proceedings of the 2006 ACM SIGMOD international conference on management of data. 2006. pp. 229–240. New York:ACM Press.
    • (2006) Personalized privacy preservation , pp. 229-240
    • Xiao, X.1    Tao, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.