Location privacy models in mobile applications: conceptual view and research directions
暂无分享,去创建一个
[1] Frank Stajano,et al. Mix zones: user privacy in location-aware services , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.
[2] Christian S. Jensen,et al. Location-Related Privacy in Geo-Social Networks , 2011, IEEE Internet Computing.
[3] Roberto Tamassia,et al. Haze: privacy-preserving real-time traffic statistics , 2013, SIGSPATIAL/GIS.
[4] Ernesto Damiani,et al. Location Privacy Protection Through Obfuscation-Based Techniques , 2007, DBSec.
[5] Stefano Spaccapietra,et al. Semantic trajectories modeling and analysis , 2013, CSUR.
[6] Sushil Jajodia,et al. Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies , 2010, The VLDB Journal.
[7] Panos Kalnis,et al. Private queries in location based services: anonymizers are not necessary , 2008, SIGMOD Conference.
[8] Dirk von Suchodoletz,et al. Reclaiming Location Privacy in Mobile Telephony Networks—Effects and Consequences for Providers and Subscribers , 2013, IEEE Systems Journal.
[9] Lorrie Faith Cranor,et al. Analyzing use of privacy policy attributes in a location sharing application , 2009, SOUPS.
[10] Ling Liu,et al. Supporting anonymous location queries in mobile environments with privacygrid , 2008, WWW.
[11] Robert Boguslaw,et al. Privacy and Freedom , 1968 .
[12] Dear Mr Sotiropoulos. ARTICLE 29 Data Protection Working Party , 2013 .
[13] Emiliano Miluzzo,et al. A survey of mobile phone sensing , 2010, IEEE Communications Magazine.
[14] Marco Gruteser,et al. USENIX Association , 1992 .
[15] Ling Liu,et al. MobiMix: Protecting location privacy with mix-zones over road networks , 2011, 2011 IEEE 27th International Conference on Data Engineering.
[16] Chi-Yin Chow,et al. A peer-to-peer spatial cloaking algorithm for anonymous location-based service , 2006, GIS '06.
[17] Daniel J. Solove,et al. Privacy Self-Management and the Consent Dilemma , 2012 .
[18] Kyriakos Mouratidis,et al. Anonymous Query Processing in Road Networks , 2010, IEEE Transactions on Knowledge and Data Engineering.
[19] Karl Aberer,et al. User-side adaptive protection of location privacy in participatory sensing , 2013, GeoInformatica.
[20] Maria Luisa Damiani. Privacy Enhancing Techniques for the Protection of Mobility Patterns in LBS: Research Issues and Trends , 2013, European Data Protection.
[21] Catuscia Palamidessi,et al. Broadening the Scope of Differential Privacy Using Metrics , 2013, Privacy Enhancing Technologies.
[22] Nigel Davies,et al. Preserving Privacy in Environments with Location-Based Applications , 2003, IEEE Pervasive Comput..
[23] Carmela Troncoso,et al. Unraveling an old cloak: k-anonymity for location privacy , 2010, WPES '10.
[24] Latanya Sweeney,et al. Achieving k-Anonymity Privacy Protection Using Generalization and Suppression , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[25] Elisa Bertino,et al. Fine-Grained Cloaking of Sensitive Positions in Location-Sharing Applications , 2011, IEEE Pervasive Computing.
[26] Minho Shin,et al. Anonysense: privacy-aware people-centric sensing , 2008, MobiSys '08.
[27] Christian S. Jensen,et al. Effective Privacy-Preserving Online Route Planning , 2011, 2011 IEEE 12th International Conference on Mobile Data Management.
[28] Hua Lu,et al. Location Privacy Techniques in Client-Server Architectures , 2009, Privacy in Location-Based Applications.
[29] Hua Lu,et al. PAD: privacy-area aware, dummy-based location privacy in mobile services , 2008, MobiDE '08.
[30] Wouter Joosen,et al. A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements , 2011, Requirements Engineering.
[31] Frank Stajano,et al. Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..
[32] Elisa Bertino,et al. The PROBE Framework for the Personalized Cloaking of Private Locations , 2010, Trans. Data Priv..
[33] Marco Gruteser,et al. Protecting Location Privacy Through Path Confusion , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[34] Klaus Rechert,et al. Report from Dagstuhl: the liberation of mobile location data and its implications for privacy research , 2013, MOCO.
[35] Suman Nath,et al. MaskIt: privately releasing user context streams for personalized mobile applications , 2012, SIGMOD Conference.
[36] Herman T. Tavani,et al. Privacy protection, control of information, and privacy-enhancing technologies , 2001, CSOC.
[37] Maria Luisa Damiani,et al. Handling user-defined private contexts for location privacy in LBS , 2012, SIGSPATIAL/GIS.
[38] Yu Zhang,et al. Preserving User Location Privacy in Mobile Data Management Infrastructures , 2006, Privacy Enhancing Technologies.
[39] Maria Luisa Damiani,et al. Third party geolocation services in LBS: privacy requirements and research issues , 2011, Trans. Data Priv..
[40] Maria Luisa Damiani,et al. Privacy-Preserving Sharing of Sensitive Semantic Locations under Road-Network Constraints , 2012, 2012 IEEE 13th International Conference on Mobile Data Management.
[41] Walid G. Aref,et al. Casper*: Query processing for location services without compromising privacy , 2006, TODS.
[42] Carmela Troncoso,et al. Protecting location privacy: optimal strategy against localization attacks , 2012, CCS.
[43] Panos Kalnis,et al. PRIVE: anonymous location-based queries in distributed mobile systems , 2007, WWW '07.
[44] H. Nissenbaum. A Contextual Approach to Privacy Online , 2011, Daedalus.
[45] Lars Kulik,et al. Location privacy and location-aware computing , 2006 .
[46] Jong Kim,et al. Protecting location privacy using location semantics , 2011, KDD.
[47] Matthias Hollick,et al. European Data Protection: Coming of Age , 2013 .
[48] Elisa Bertino,et al. Protecting Location Privacy through Semantics-aware Obfuscation Techniques , 2008, IFIPTM.
[49] Hua Lu,et al. SpaceTwist: Managing the Trade-Offs Among Location Privacy, Query Performance, and Query Accuracy in Mobile Services , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[50] Panos Kalnis,et al. Location Diversity: Enhanced Privacy Protection in Location Based Services , 2009, LoCA.
[51] Jean-Yves Le Boudec,et al. Quantifying Location Privacy , 2011, 2011 IEEE Symposium on Security and Privacy.
[52] Gabriel Ghinita,et al. Privacy for Location-based Services , 2013, Privacy for Location-based Services.
[53] Elisa Bertino,et al. Preventing velocity-based linkage attacks in location-aware applications , 2009, GIS.
[54] Tetsuji Satoh,et al. Protection of Location Privacy using Dummies for Location-based Services , 2005, 21st International Conference on Data Engineering Workshops (ICDEW'05).
[55] Maria Luisa Damiani,et al. Privacy-aware geolocation interfaces for volunteered geography: a case study , 2012, GEOCROWD '12.
[56] Ling Liu,et al. Location Privacy in Mobile Systems: A Personalized Anonymization Model , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).
[57] Guanling Chen,et al. Sharing location in online social networks , 2010, IEEE Network.