-
1
-
-
3042774924
-
Location management for mobile commerce applications in wireless internet environment
-
August
-
Varshney, U., Location management for mobile commerce applications in wireless internet environment. ACM Transactions on Internet Technology, 3(3): 236-255, August 2003.
-
(2003)
ACM Transactions on Internet Technology
, vol.3
, Issue.3
, pp. 236-255
-
-
Varshney, U.1
-
2
-
-
2342484676
-
Location-based services for mobile telephony: A study of user’s privacy concerns
-
Zurich, Switzerland, September
-
Barkhuus, L. and Dey, A., Location-based services for mobile telephony: A study of user’s privacy concerns. In Proc. of the 9th IFIP TC13 International Conference on Human-Computer Interaction (INTERACT 2003), pp. 709-712, Zurich, Switzerland, September 2003.
-
(2003)
Proc. of the 9th IFIP TC13 International Conference on Human-Computer Interaction (INTERACT 2003)
, pp. 709-712
-
-
Barkhuus, L.1
Dey, A.2
-
3
-
-
0037285343
-
An overview of location-based services
-
January
-
D’Roza, T. and Bilchev, G., An overview of location-based services. BT Technology Journal, 21(1): 20-27, January 2003.
-
(2003)
BT Technology Journal
, vol.21
, Issue.1
, pp. 20-27
-
-
D’Roza, T.1
Bilchev, G.2
-
4
-
-
33845572567
-
-
Privacy Rights Clearinghouse/UCAN. A Chronology of Data Breaches, 2006. http://www.privacyrights.org/ar/ChronDataBreaches.htm
-
(2006)
A Chronology of Data Breaches
-
-
-
5
-
-
70349087593
-
-
Associated Press: Chicago, Tribune, July 2
-
Chicago Tribune, “Rental Firm Uses GPS in Speeding Fine” Associated Press: Chicago, Tribune, July 2, 2001, p. 9.
-
(2001)
Rental Firm Uses GPS in Speeding Fine
, pp. 9
-
-
-
6
-
-
85024154804
-
Location-tracing sparks privacy concerns
-
16 November, Accessed 22 December 2006
-
Lee, J-W., Location-tracing sparks privacy concerns. Korea Times. http://times.hankooki.com, 16 November 2004. Accessed 22 December 2006.
-
(2004)
Korea Times
-
-
Lee, J.-W.1
-
7
-
-
0034784999
-
A diary study of rendezvousing: Implications for position-aware computing and communications for the general public
-
Boulder, CO, September-October
-
Colbert, M., A diary study of rendezvousing: Implications for position-aware computing and communications for the general public. In Proc. of the International 2001 ACM SIGGROUP Conference on Supporting Groupwork, pp. 15-23, Boulder, CO, September-October, 2001.
-
(2001)
Proc. of the International 2001 ACM SIGGROUP Conference on Supporting Groupwork
, pp. 15-23
-
-
Colbert, M.1
-
8
-
-
2942524994
-
Location privacy in pervasive computing
-
Beresford, A.R. and Stajano, F., Location privacy in pervasive computing. IEEE Pervasive Computing, 2(1): 46-55, 2003.
-
(2003)
IEEE Pervasive Computing
, vol.2
, Issue.1
, pp. 46-55
-
-
Beresford, A.R.1
Stajano, F.2
-
9
-
-
33646153058
-
Protecting privacy against locationbased personal identification
-
Jonker, W. and Petkovic, M., Eds, LNCS 3674, Springer-Verlag, Heidelberg, Germany
-
Bettini, C., Wang, X.S., and Jajodia, S., Protecting privacy against locationbased personal identification. In Jonker, W. and Petkovic, M., Eds., Proc. of the 2nd VLDB Workshop on Secure Data Management, pp. 185-199, LNCS 3674, Springer-Verlag, Heidelberg, Germany, 2005.
-
(2005)
Proc. of the 2nd VLDB Workshop on Secure Data Management
, pp. 185-199
-
-
Bettini, C.1
Wang, X.S.2
Jajodia, S.3
-
10
-
-
27944454864
-
Location privacy in mobile systems: A personalized anonymization model
-
Columbus, OH, June
-
Gedik, B. and Liu, L., Location privacy in mobile systems: A personalized anonymization model. In Proc. of the 25th International Conference on Distributed Computing Systems (IEEE ICDCS 2005), pp. 620-629, Columbus, OH, June 2005.
-
(2005)
Proc. of the 25th International Conference on Distributed Computing Systems (IEEE ICDCS 2005)
, pp. 620-629
-
-
Gedik, B.1
Liu, L.2
-
11
-
-
85018204196
-
Anonymous usage of location-based services through spatial and temporal cloaking
-
San Francisco, CA, May
-
Gruteser, M. and Grunwald, D., Anonymous usage of location-based services through spatial and temporal cloaking. In Proc. of the First ACM/USENIX International Conference on Mobile Systems, Applications, and Services (MobiSys 2003), San Francisco, CA, May 2003.
-
(2003)
Proc. of the First ACM/USENIX International Conference on Mobile Systems, Applications, and Services (MobiSys 2003)
-
-
Gruteser, M.1
Grunwald, D.2
-
12
-
-
4544259863
-
An architecture for privacy-sensitive ubiquitous computing
-
Boston, MA, June
-
Hong, J.I. and Landay, J.A., An architecture for privacy-sensitive ubiquitous computing. In Proc. of the 2nd International Conference on Mobile Systems, Applications, and Services (MobiSys 2004), pp. 177-189, Boston, MA, June 2004.
-
(2004)
Proc. of the 2nd International Conference on Mobile Systems, Applications, and Services (MobiSys 2004)
, pp. 177-189
-
-
Hong, J.I.1
Landay, J.A.2
-
13
-
-
84945556728
-
Privacy by design-principles of privacy-aware ubiquitous systems
-
Springer, Heidelberg, Germany
-
Langheinrich, M., Privacy by design-principles of privacy-aware ubiquitous systems. In Ubicomp 2001, Ubiquitous Computing, vol. 2201 of Lecture Notes in Computer Science, pp. 273-291, Springer, Heidelberg, Germany, 2001.
-
(2001)
Ubicomp 2001, Ubiquitous Computing, vol. 2201 of Lecture Notes in Computer Science
, pp. 273-291
-
-
Langheinrich, M.1
-
14
-
-
33846190518
-
A formal model of obfuscation and negotiation for location privacy
-
Gellersen, H-W., Want, R., and Schmidt, A., Eds, Munich, Germany, May
-
Duckham, M. and Kulik, L., A formal model of obfuscation and negotiation for location privacy. In Gellersen, H-W., Want, R., and Schmidt, A., Eds., Proc. of the Third International Conference PERVASIVE 2005, Munich, Germany, May 2005.
-
(2005)
Proc. of the Third International Conference PERVASIVE 2005
-
-
Duckham, M.1
Kulik, L.2
-
15
-
-
79960907469
-
-
Chap. K-Anonymity. Springer, Heidelberg, Germany
-
V. Ciriani, S. De Capitani di Vimercati, S. Foresti, and P. Samarati. Security in Decentralized Data Management, Chap. K-Anonymity. Springer, Heidelberg, Germany, 2007.
-
(2007)
Security in Decentralized Data Management
-
-
Ciriani, V.1
De Capitani di Vimercati, S.2
Foresti, S.3
Samarati, P.4
-
16
-
-
0035517699
-
Protecting respondents’ identities in microdata release
-
Samarati, P., Protecting respondents’ identities in microdata release. IEEE Transactions on Knowledge and Data Engineering, 13(6): 1010-1027, 2001.
-
(2001)
IEEE Transactions on Knowledge and Data Engineering
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
17
-
-
0027874215
-
The global positioning system
-
December
-
Getting, I., The global positioning system. IEEE Spectrum, 30(12): 36-47, December 1993.
-
(1993)
IEEE Spectrum
, vol.30
, Issue.12
, pp. 36-47
-
-
Getting, I.1
-
18
-
-
0003472424
-
-
Progress in Austronautics and Aerounautics Series, V-164. American Institute of Astronautics and Aeronautics (AIAA), Reston, VA
-
Parkinson, B. et al., Global Positioning System: Theory and Application, vol. II, Progress in Austronautics and Aerounautics Series, V-164. American Institute of Astronautics and Aeronautics (AIAA), Reston, VA, 1996.
-
(1996)
Global Positioning System: Theory and Application
, vol.2
-
-
Parkinson, B.1
-
19
-
-
85032751370
-
Mobile positioning using wireless networks: Possibilities and fundamental limitations based on available wireless network measurements
-
July
-
Gustafsson, F. and Gunnarsson, F., Mobile positioning using wireless networks: Possibilities and fundamental limitations based on available wireless network measurements. IEEE Signal Processing Magazine, pp. 41-53, July 2005.
-
(2005)
IEEE Signal Processing Magazine
, pp. 41-53
-
-
Gustafsson, F.1
Gunnarsson, F.2
-
20
-
-
85032752279
-
Signal processing techniques in network-aided positioning: A survey of state-of-the-art positioning designs
-
July
-
Sun, G. et al., Signal processing techniques in network-aided positioning: A survey of state-of-the-art positioning designs. IEEE Signal Processing Magazine, pp. 12-23, July 2005.
-
(2005)
IEEE Signal Processing Magazine
, pp. 12-23
-
-
Sun, G.1
-
22
-
-
34247380764
-
Supporting location-based conditions in access control policies
-
Lin, F-C., Lee, D-T., Lin, B-S, Shieh, S., and Jajodia, S., Eds, Taipei, Taiwan, March
-
Ardagna, C.A. et al., Supporting location-based conditions in access control policies. In Lin, F-C., Lee, D-T., Lin, B-S, Shieh, S., and Jajodia, S., Eds., Proc. of the ACM Symposium on Information, Computer and Communications Security (ASIACCS’06), pp. 212-222, Taipei, Taiwan, March 2006.
-
(2006)
Proc. of the ACM Symposium on Information, Computer and Communications Security (ASIACCS’06)
, pp. 212-222
-
-
Ardagna, C.A.1
-
24
-
-
85056493068
-
-
uLocate. http://www.ulocate.com
-
uLocate
-
-
-
26
-
-
85056541637
-
-
Mologogo. http://mologogo.com
-
Mologogo
-
-
-
27
-
-
0034539093
-
Experiences of developing and deploying a contextaware tourist guide: The guide project
-
Boston, MA, August
-
Cheverst, K. et al., Experiences of developing and deploying a contextaware tourist guide: The guide project. In Proc. of the 6th Annual International Conference on Mobile Computing and Networking (MOBICOM-00), pp. 20-31, Boston, MA, August 2000.
-
(2000)
Proc. of the 6th Annual International Conference on Mobile Computing and Networking (MOBICOM-00)
, pp. 20-31
-
-
Cheverst, K.1
-
28
-
-
84869057324
-
Safe and sound a wireless leash
-
Cockton, G. and Korhonen, P., Eds, Ft. Lauderdale, FL, April
-
Marmasse, N. and Schmandt, C., Safe and sound a wireless leash. In Cockton, G. and Korhonen, P., Eds., Proc. of ACM Conference on Human Factors in Computing Systems (CHI 2003), pp. 726-727, Ft. Lauderdale, FL, April 2003.
-
(2003)
Proc. of ACM Conference on Human Factors in Computing Systems (CHI 2003)
, pp. 726-727
-
-
Marmasse, N.1
Schmandt, C.2
-
30
-
-
85056503425
-
-
United Nations Resolution, December
-
General Assembly of the United Nations. “Universal Declaration of Human Rights.” United Nations Resolution 217 A (III). December 1948.
-
(1948)
Universal Declaration of Human Rights
, vol.217 A
, Issue.3
-
-
-
31
-
-
33750243621
-
Location privacy and location-aware computing
-
Drummond, J., Billen, R., and Joao, E., Eds, Taylor & Francis, Boca Raton, FL
-
Duckham, M. and Kulik, L., Location privacy and location-aware computing. In Drummond, J., Billen, R., and Joao, E., Eds., Dynamic and Mobile GIS: Investigating Change in Space and Time, Taylor & Francis, Boca Raton, FL, 2007.
-
(2007)
Dynamic and Mobile GIS: Investigating Change in Space and Time
-
-
Duckham, M.1
Kulik, L.2
-
32
-
-
2942587015
-
Mix zones: User privacy in location-aware services
-
Orlando, FL, March
-
Beresford, A.R. and Stajano, F., Mix zones: User privacy in location-aware services. In Proc. of the 2nd IEEE Annual Conf. on Pervasive Computing and Communications Workshops (PERCOM 2004), pp. 127-131, Orlando, FL, March 2004.
-
(2004)
Proc. of the 2nd IEEE Annual Conf. on Pervasive Computing and Communications Workshops (PERCOM 2004)
, pp. 127-131
-
-
Beresford, A.R.1
Stajano, F.2
-
33
-
-
84856043672
-
A mathematical theory of communication
-
July, October
-
Shannon, C.E., A mathematical theory of communication. Bell System Technical Journal, 27(379-423): 623-656, July, October 1948.
-
(1948)
Bell System Technical Journal
, vol.27
, Issue.379-423
, pp. 623-656
-
-
Shannon, C.E.1
-
34
-
-
84898788360
-
Path privacy in locationaware computing
-
Boston, MA, June
-
Gruteser, M., Bredin, J., and Grunwald, D., Path privacy in locationaware computing. In Proc. of the Second International Conference on Mobile Systems, Application and Services (MobiSys2004), Boston, MA, June 2004.
-
(2004)
Proc. of the Second International Conference on Mobile Systems, Application and Services (MobiSys2004)
-
-
Gruteser, M.1
Bredin, J.2
Grunwald, D.3
-
35
-
-
2342562393
-
Protecting privacy in continuous location-tracking applications
-
March-April
-
Gruteser, M. and Liu, X., Protecting privacy in continuous location-tracking applications. IEEE Security & Privacy Magazine, 2(2): 28-34, March-April 2004.
-
(2004)
IEEE Security & Privacy Magazine
, vol.2
, Issue.2
, pp. 28-34
-
-
Gruteser, M.1
Liu, X.2
-
37
-
-
33646156642
-
Simulation of obfuscation and negotiation for location privacy
-
Cohn, A.G. and Mark, D.M., Eds, Ellicottville, NY, September
-
Duckham, M. and Kulik, L., Simulation of obfuscation and negotiation for location privacy. In Cohn, A.G. and Mark, D.M., Eds., Proc. of the COSIT 2005, pp. 31-48, Ellicottville, NY, September 2005.
-
(2005)
Proc. of the COSIT 2005
, pp. 31-48
-
-
Duckham, M.1
Kulik, L.2
-
39
-
-
33845302630
-
Efficiently managing location information with privacy requirements in wi-fi networks: A middleware approach
-
Siena, Italy, September
-
Bellavista, P., Corradi, A., and Giannelli, C., Efficiently managing location information with privacy requirements in wi-fi networks: A middleware approach. In Proc. of the International Symposium on Wireless Communication Systems (ISWCS’05), pp. 1-8, Siena, Italy, September 2005.
-
(2005)
Proc. of the International Symposium on Wireless Communication Systems (ISWCS’05)
, pp. 1-8
-
-
Bellavista, P.1
Corradi, A.2
Giannelli, C.3
-
40
-
-
34247335287
-
Towards privacy support in a global location service
-
Paris, France
-
Hauser, C., and Kabatnik, M., Towards privacy support in a global location service. In Proc. of the IFIP Workshop on IP and ATM Traffic Management (WATM/EUNICE 2001), Paris, France, 2001.
-
(2001)
Proc. of the IFIP Workshop on IP and ATM Traffic Management (WATM/EUNICE 2001)
-
-
Hauser, C.1
Kabatnik, M.2
-
44
-
-
77953802502
-
Dynamic privacy management: A plugin service for the middleware in pervasive computing
-
Tscheligi, M., Bernhaupt, R., and Mihalic, K., Eds, Salzburg, Austria, September
-
Hong, D., Yuan, M., and Shen, V.Y., Dynamic privacy management: A plugin service for the middleware in pervasive computing. In Tscheligi, M., Bernhaupt, R., and Mihalic, K., Eds., Proc. of the 7th International Conference on Human Computer Interaction with Mobile Devices and Services (MobileHCI’05), pp. 1-8, Salzburg, Austria, September 2005.
-
(2005)
Proc. of the 7th International Conference on Human Computer Interaction with Mobile Devices and Services (MobileHCI’05)
, pp. 1-8
-
-
Hong, D.1
Yuan, M.2
Shen, V.Y.3
-
45
-
-
84937411601
-
A privacy awareness system for ubiquitous computing environments
-
Borriello, G. and Holmquist, L.E., Eds, Göteborg, Sweden, September
-
Langheinrich, M., A privacy awareness system for ubiquitous computing environments. In Borriello, G. and Holmquist, L.E., Eds., Proc. of the 4th International Conference on Ubiquitous Computing (Ubicomp 2002), pp. 237-245, Göteborg, Sweden, September 2002.
-
(2002)
Proc. of the 4th International Conference on Ubiquitous Computing (Ubicomp 2002)
, pp. 237-245
-
-
Langheinrich, M.1
-
46
-
-
24344477424
-
Protecting access to people location information
-
Hutter, D., Müller, G., Stephan, W., and Ullmann, M., Eds, Boppard, Germany, March
-
Hengartner, U. and Steenkiste, P., Protecting access to people location information. In Hutter, D., Müller, G., Stephan, W., and Ullmann, M., Eds., Proc. of First International Conference on Security in Pervasive Computing, pp. 25-38, Boppard, Germany, March 2003.
-
(2003)
Proc. of First International Conference on Security in Pervasive Computing
, pp. 25-38
-
-
Hengartner, U.1
Steenkiste, P.2
-
47
-
-
36249028642
-
A middleware architecture for integrating privacy preferences and location accuracy
-
Sandton, Gauteng, South Africa, May
-
Ardagna, C.A. et al., A middleware architecture for integrating privacy preferences and location accuracy. In Proc. of 22nd IFIP TC 11 International Information Security Conference (IFIP SEC2007), Sandton, Gauteng, South Africa, May 2007.
-
(2007)
Proc. of 22nd IFIP TC 11 International Information Security Conference (IFIP SEC2007)
-
-
Ardagna, C.A.1
-
48
-
-
85056512298
-
Managing Privacy in LBAC Systems
-
Niagara Falls, Ontario, Canada, May
-
Ardagna, C.A. et al., Managing Privacy in LBAC Systems. In Proc. of the Second IEEE International Symposium on Pervasive Computing and Ad Hoc Communications (PCAC-07), Niagara Falls, Ontario, Canada, May 2007.
-
(2007)
Proc. of the Second IEEE International Symposium on Pervasive Computing and Ad Hoc Communications (PCAC-07)
-
-
Ardagna, C.A.1
-
49
-
-
0018689571
-
An algorithm for tracking multiple targets
-
December
-
Reid, D.B., An algorithm for tracking multiple targets. IEEE Transactions on Automatic Control, 24(6): 843-854, December 1979.
-
(1979)
IEEE Transactions on Automatic Control
, vol.24
, Issue.6
, pp. 843-854
-
-
Reid, D.B.1
|