Preserving Privacy for Location-Based Services with Continuous Queries
暂无分享,去创建一个
[1] Ian Goldberg,et al. Louis, Lester and Pierre: Three Protocols for Location Privacy , 2007, Privacy Enhancing Technologies.
[2] Ying Cai,et al. Location anonymity in continuous location-based services , 2007, GIS.
[3] Lars Kulik. Privacy for real-time location-based services , 2009, SIGSPACIAL.
[4] Jae-Woo Chang,et al. A New Grid-Based Cloaking Algorithm for Privacy Protection in Location-Based Services , 2009, 2009 11th IEEE International Conference on High Performance Computing and Communications.
[5] Alissa Cooper,et al. Binding privacy rules to location on the web , 2009, LOCWEB '09.
[6] Jianliang Xu,et al. A Cloaking Algorithm Based on Spatial Networks for Location Privacy , 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008).
[7] Gabriel Ghinita. Private Queries and Trajectory Anonymization: a Dual Perspective on Location Privacy , 2009, Trans. Data Priv..
[8] Agusti Solanas,et al. A TTP-free protocol for location privacy in location-based services , 2008, Comput. Commun..
[9] Sushil Jajodia,et al. Answering Queries Based on Imprecision and Uncertainty Trade-Offs in Numeric Databases , 2007, Secure Data Management.
[10] Romit Roy Choudhury,et al. Realtime location privacy via mobility prediction: creating confusion at crossroads , 2009, HotMobile '09.
[11] Panos K. Chrysanthis,et al. Proceedings of the 6th international conference on Mobile data management , 2003 .
[12] M. Gruteser,et al. Non-Inference: An Information Flow Control Model for Location-based Services , 2006, 2006 3rd Annual International Conference on Mobile and Ubiquitous Systems - Workshops.
[13] Ling Liu,et al. Location Privacy in Mobile Systems: A Personalized Anonymization Model , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).
[14] Doo-Kwon Baik,et al. An anonymous communication model for privacy-enhanced location based service using an echo agent , 2009, ICUIMC '09.
[15] Hua Lu,et al. SpaceTwist: Managing the Trade-Offs Among Location Privacy, Query Performance, and Query Accuracy in Mobile Services , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[16] Thomas Brinkhoff,et al. A Framework for Generating Network-Based Moving Objects , 2002, GeoInformatica.
[17] Oded Goldreich,et al. Foundations of Cryptography: Volume 1, Basic Tools , 2001 .
[18] Chi-Yin Chow,et al. A peer-to-peer spatial cloaking algorithm for anonymous location-based service , 2006, GIS '06.
[19] Kyriakos Mouratidis,et al. Preventing Location-Based Identity Inference in Anonymous Spatial Queries , 2007, IEEE Transactions on Knowledge and Data Engineering.
[20] Gabriel Ghinita. Understanding the privacy-efficiency trade-off in location based queries , 2008, SPRINGL '08.
[21] Frank Stajano,et al. Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..
[22] Yufei Tao,et al. Continuous Nearest Neighbor Search , 2002, VLDB.
[23] Hui Xiong,et al. Enhancing Security and Privacy in Traffic-Monitoring Systems , 2006, IEEE Pervasive Computing.
[24] Francis Y. L. Chin,et al. Security problems on inference control for SUM, MAX, and MIN queries , 1986, JACM.
[25] Jianliang Xu,et al. p-Sensitivity: A Semantic Privacy-Protection Model for Location-based Services , 2008, 2008 Ninth International Conference on Mobile Data Management Workshops, MDMW.
[26] Lien Fa Lin,et al. Continuous nearest neighbor search , 2008 .
[27] Frank Stajano. Security in Pervasive Computing , 2003, SPC.
[28] Jon M. Kleinberg,et al. Auditing Boolean attributes , 2003, J. Comput. Syst. Sci..
[29] X. S. Wang,et al. Preserving Anonymity in Location-based Services When Requests from the Same Issuer May Be Correlated , 2007 .
[30] Nina Mishra,et al. Simulatable auditing , 2005, PODS.
[31] Walid G. Aref,et al. Casper*: Query processing for location services without compromising privacy , 2006, TODS.
[32] George Danezis,et al. Towards an Information Theoretic Metric for Anonymity , 2002, Privacy Enhancing Technologies.
[33] Jeffrey D. Ullman,et al. A model of statistical database their security , 1977, TODS.
[34] Marco Gruteser,et al. Protecting Location Privacy Through Path Confusion , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[35] Frank Stajano. Security in Pervasive Computing (Abstract of Invited Talk) , 2004 .
[36] Yan Huang,et al. Cloaking locations for anonymous location based services: a hybrid approach , 2009, GeoInformatica.
[37] Panos Kalnis,et al. PRIVE: anonymous location-based queries in distributed mobile systems , 2007, WWW '07.
[38] Marco Gruteser,et al. Protecting privacy, in continuous location-tracking applications , 2004, IEEE Security & Privacy Magazine.
[39] Chi-Yin Chow,et al. Privacy in location-based services: a system architecture perspective , 2009, SIGSPACIAL.
[40] Aziz Mohaisen,et al. Privacy in Location Based Services: Primitives Toward the Solution , 2008, 2008 Fourth International Conference on Networked Computing and Advanced Information Management.
[41] Nick Roussopoulos,et al. K-Nearest Neighbor Search for Moving Query Point , 2001, SSTD.
[42] Liviu Iftode,et al. Non-Inference: An Information Flow Control Model for Location-based Services , 2006, 2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services.
[43] Ying Cai,et al. Exploring Historical Location Data for Anonymity Preservation in Location-Based Services , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[44] Urs Hengartner,et al. Hiding Location Information from Location-Based Services , 2007, 2007 International Conference on Mobile Data Management.
[45] M.O. Gheorghita,et al. Location Privacy in Chain-Based Protocols for Location-Based Services , 2008, 2008 The Third International Conference on Digital Telecommunications (icdt 2008).
[46] Panos Kalnis,et al. Private queries in location based services: anonymizers are not necessary , 2008, SIGMOD Conference.
[47] Wang-Chien Lee,et al. Search continuous nearest neighbors on the air , 2004, The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004..
[48] Marco Gruteser,et al. On the Anonymity of Periodic Location Samples , 2005, SPC.
[49] Steven P. Reiss. Security in Databases: A Combinatorial Study , 1979, JACM.
[50] Marco Gruteser,et al. USENIX Association , 1992 .
[51] Ling Liu,et al. Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.
[52] Vijayalakshmi Atluri,et al. A Profile Anonymization Model for Privacy in a Personalized Location Based Service Environment , 2008, The Ninth International Conference on Mobile Data Management (mdm 2008).
[53] Gultekin Özsoyoglu,et al. Auditing for secure statistical databases , 1981, ACM '81.
[54] Panos Kalnis,et al. Providing K-Anonymity in location based services , 2010, SKDD.
[55] Bart Preneel,et al. Towards Measuring Anonymity , 2002, Privacy Enhancing Technologies.
[56] Richard J. Lipton,et al. Secure databases: protection against user influence , 1979, TODS.
[57] Thomas F. La Porta,et al. A Flexible Privacy-Enhanced Location-Based Services System Framework and Practice , 2009, IEEE Transactions on Mobile Computing.
[58] Jing Xu,et al. A Method for Privacy Protection in Location Based Services , 2009, 2009 Ninth IEEE International Conference on Computer and Information Technology.