메뉴 건너뛰기




Volumn , Issue , 2007, Pages 307-326

Privacy-enhanced location services information

Author keywords

[No Author keywords available]

Indexed keywords


EID: 85056510751     PISSN: None     EISSN: None     Source Type: Book    
DOI: None     Document Type: Chapter
Times cited : (8)

References (49)
  • 1
    • 3042774924 scopus 로고    scopus 로고
    • Location management for mobile commerce applications in wireless internet environment
    • August
    • Varshney, U., Location management for mobile commerce applications in wireless internet environment. ACM Transactions on Internet Technology, 3(3): 236-255, August 2003.
    • (2003) ACM Transactions on Internet Technology , vol.3 , Issue.3 , pp. 236-255
    • Varshney, U.1
  • 3
    • 0037285343 scopus 로고    scopus 로고
    • An overview of location-based services
    • January
    • D’Roza, T. and Bilchev, G., An overview of location-based services. BT Technology Journal, 21(1): 20-27, January 2003.
    • (2003) BT Technology Journal , vol.21 , Issue.1 , pp. 20-27
    • D’Roza, T.1    Bilchev, G.2
  • 4
    • 33845572567 scopus 로고    scopus 로고
    • Privacy Rights Clearinghouse/UCAN. A Chronology of Data Breaches, 2006. http://www.privacyrights.org/ar/ChronDataBreaches.htm
    • (2006) A Chronology of Data Breaches
  • 5
    • 70349087593 scopus 로고    scopus 로고
    • Associated Press: Chicago, Tribune, July 2
    • Chicago Tribune, “Rental Firm Uses GPS in Speeding Fine” Associated Press: Chicago, Tribune, July 2, 2001, p. 9.
    • (2001) Rental Firm Uses GPS in Speeding Fine , pp. 9
  • 6
    • 85024154804 scopus 로고    scopus 로고
    • Location-tracing sparks privacy concerns
    • 16 November, Accessed 22 December 2006
    • Lee, J-W., Location-tracing sparks privacy concerns. Korea Times. http://times.hankooki.com, 16 November 2004. Accessed 22 December 2006.
    • (2004) Korea Times
    • Lee, J.-W.1
  • 7
    • 0034784999 scopus 로고    scopus 로고
    • A diary study of rendezvousing: Implications for position-aware computing and communications for the general public
    • Boulder, CO, September-October
    • Colbert, M., A diary study of rendezvousing: Implications for position-aware computing and communications for the general public. In Proc. of the International 2001 ACM SIGGROUP Conference on Supporting Groupwork, pp. 15-23, Boulder, CO, September-October, 2001.
    • (2001) Proc. of the International 2001 ACM SIGGROUP Conference on Supporting Groupwork , pp. 15-23
    • Colbert, M.1
  • 8
    • 2942524994 scopus 로고    scopus 로고
    • Location privacy in pervasive computing
    • Beresford, A.R. and Stajano, F., Location privacy in pervasive computing. IEEE Pervasive Computing, 2(1): 46-55, 2003.
    • (2003) IEEE Pervasive Computing , vol.2 , Issue.1 , pp. 46-55
    • Beresford, A.R.1    Stajano, F.2
  • 9
    • 33646153058 scopus 로고    scopus 로고
    • Protecting privacy against locationbased personal identification
    • Jonker, W. and Petkovic, M., Eds, LNCS 3674, Springer-Verlag, Heidelberg, Germany
    • Bettini, C., Wang, X.S., and Jajodia, S., Protecting privacy against locationbased personal identification. In Jonker, W. and Petkovic, M., Eds., Proc. of the 2nd VLDB Workshop on Secure Data Management, pp. 185-199, LNCS 3674, Springer-Verlag, Heidelberg, Germany, 2005.
    • (2005) Proc. of the 2nd VLDB Workshop on Secure Data Management , pp. 185-199
    • Bettini, C.1    Wang, X.S.2    Jajodia, S.3
  • 14
    • 33846190518 scopus 로고    scopus 로고
    • A formal model of obfuscation and negotiation for location privacy
    • Gellersen, H-W., Want, R., and Schmidt, A., Eds, Munich, Germany, May
    • Duckham, M. and Kulik, L., A formal model of obfuscation and negotiation for location privacy. In Gellersen, H-W., Want, R., and Schmidt, A., Eds., Proc. of the Third International Conference PERVASIVE 2005, Munich, Germany, May 2005.
    • (2005) Proc. of the Third International Conference PERVASIVE 2005
    • Duckham, M.1    Kulik, L.2
  • 16
    • 0035517699 scopus 로고    scopus 로고
    • Protecting respondents’ identities in microdata release
    • Samarati, P., Protecting respondents’ identities in microdata release. IEEE Transactions on Knowledge and Data Engineering, 13(6): 1010-1027, 2001.
    • (2001) IEEE Transactions on Knowledge and Data Engineering , vol.13 , Issue.6 , pp. 1010-1027
    • Samarati, P.1
  • 17
    • 0027874215 scopus 로고
    • The global positioning system
    • December
    • Getting, I., The global positioning system. IEEE Spectrum, 30(12): 36-47, December 1993.
    • (1993) IEEE Spectrum , vol.30 , Issue.12 , pp. 36-47
    • Getting, I.1
  • 18
    • 0003472424 scopus 로고    scopus 로고
    • Progress in Austronautics and Aerounautics Series, V-164. American Institute of Astronautics and Aeronautics (AIAA), Reston, VA
    • Parkinson, B. et al., Global Positioning System: Theory and Application, vol. II, Progress in Austronautics and Aerounautics Series, V-164. American Institute of Astronautics and Aeronautics (AIAA), Reston, VA, 1996.
    • (1996) Global Positioning System: Theory and Application , vol.2
    • Parkinson, B.1
  • 19
    • 85032751370 scopus 로고    scopus 로고
    • Mobile positioning using wireless networks: Possibilities and fundamental limitations based on available wireless network measurements
    • July
    • Gustafsson, F. and Gunnarsson, F., Mobile positioning using wireless networks: Possibilities and fundamental limitations based on available wireless network measurements. IEEE Signal Processing Magazine, pp. 41-53, July 2005.
    • (2005) IEEE Signal Processing Magazine , pp. 41-53
    • Gustafsson, F.1    Gunnarsson, F.2
  • 20
    • 85032752279 scopus 로고    scopus 로고
    • Signal processing techniques in network-aided positioning: A survey of state-of-the-art positioning designs
    • July
    • Sun, G. et al., Signal processing techniques in network-aided positioning: A survey of state-of-the-art positioning designs. IEEE Signal Processing Magazine, pp. 12-23, July 2005.
    • (2005) IEEE Signal Processing Magazine , pp. 12-23
    • Sun, G.1
  • 22
    • 34247380764 scopus 로고    scopus 로고
    • Supporting location-based conditions in access control policies
    • Lin, F-C., Lee, D-T., Lin, B-S, Shieh, S., and Jajodia, S., Eds, Taipei, Taiwan, March
    • Ardagna, C.A. et al., Supporting location-based conditions in access control policies. In Lin, F-C., Lee, D-T., Lin, B-S, Shieh, S., and Jajodia, S., Eds., Proc. of the ACM Symposium on Information, Computer and Communications Security (ASIACCS’06), pp. 212-222, Taipei, Taiwan, March 2006.
    • (2006) Proc. of the ACM Symposium on Information, Computer and Communications Security (ASIACCS’06) , pp. 212-222
    • Ardagna, C.A.1
  • 24
    • 85056493068 scopus 로고    scopus 로고
    • uLocate. http://www.ulocate.com
    • uLocate
  • 26
    • 85056541637 scopus 로고    scopus 로고
    • Mologogo. http://mologogo.com
    • Mologogo
  • 30
    • 85056503425 scopus 로고
    • United Nations Resolution, December
    • General Assembly of the United Nations. “Universal Declaration of Human Rights.” United Nations Resolution 217 A (III). December 1948.
    • (1948) Universal Declaration of Human Rights , vol.217 A , Issue.3
  • 31
    • 33750243621 scopus 로고    scopus 로고
    • Location privacy and location-aware computing
    • Drummond, J., Billen, R., and Joao, E., Eds, Taylor & Francis, Boca Raton, FL
    • Duckham, M. and Kulik, L., Location privacy and location-aware computing. In Drummond, J., Billen, R., and Joao, E., Eds., Dynamic and Mobile GIS: Investigating Change in Space and Time, Taylor & Francis, Boca Raton, FL, 2007.
    • (2007) Dynamic and Mobile GIS: Investigating Change in Space and Time
    • Duckham, M.1    Kulik, L.2
  • 33
    • 84856043672 scopus 로고
    • A mathematical theory of communication
    • July, October
    • Shannon, C.E., A mathematical theory of communication. Bell System Technical Journal, 27(379-423): 623-656, July, October 1948.
    • (1948) Bell System Technical Journal , vol.27 , Issue.379-423 , pp. 623-656
    • Shannon, C.E.1
  • 35
    • 2342562393 scopus 로고    scopus 로고
    • Protecting privacy in continuous location-tracking applications
    • March-April
    • Gruteser, M. and Liu, X., Protecting privacy in continuous location-tracking applications. IEEE Security & Privacy Magazine, 2(2): 28-34, March-April 2004.
    • (2004) IEEE Security & Privacy Magazine , vol.2 , Issue.2 , pp. 28-34
    • Gruteser, M.1    Liu, X.2
  • 37
    • 33646156642 scopus 로고    scopus 로고
    • Simulation of obfuscation and negotiation for location privacy
    • Cohn, A.G. and Mark, D.M., Eds, Ellicottville, NY, September
    • Duckham, M. and Kulik, L., Simulation of obfuscation and negotiation for location privacy. In Cohn, A.G. and Mark, D.M., Eds., Proc. of the COSIT 2005, pp. 31-48, Ellicottville, NY, September 2005.
    • (2005) Proc. of the COSIT 2005 , pp. 31-48
    • Duckham, M.1    Kulik, L.2
  • 45
    • 84937411601 scopus 로고    scopus 로고
    • A privacy awareness system for ubiquitous computing environments
    • Borriello, G. and Holmquist, L.E., Eds, Göteborg, Sweden, September
    • Langheinrich, M., A privacy awareness system for ubiquitous computing environments. In Borriello, G. and Holmquist, L.E., Eds., Proc. of the 4th International Conference on Ubiquitous Computing (Ubicomp 2002), pp. 237-245, Göteborg, Sweden, September 2002.
    • (2002) Proc. of the 4th International Conference on Ubiquitous Computing (Ubicomp 2002) , pp. 237-245
    • Langheinrich, M.1
  • 46
    • 24344477424 scopus 로고    scopus 로고
    • Protecting access to people location information
    • Hutter, D., Müller, G., Stephan, W., and Ullmann, M., Eds, Boppard, Germany, March
    • Hengartner, U. and Steenkiste, P., Protecting access to people location information. In Hutter, D., Müller, G., Stephan, W., and Ullmann, M., Eds., Proc. of First International Conference on Security in Pervasive Computing, pp. 25-38, Boppard, Germany, March 2003.
    • (2003) Proc. of First International Conference on Security in Pervasive Computing , pp. 25-38
    • Hengartner, U.1    Steenkiste, P.2
  • 49
    • 0018689571 scopus 로고
    • An algorithm for tracking multiple targets
    • December
    • Reid, D.B., An algorithm for tracking multiple targets. IEEE Transactions on Automatic Control, 24(6): 843-854, December 1979.
    • (1979) IEEE Transactions on Automatic Control , vol.24 , Issue.6 , pp. 843-854
    • Reid, D.B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.