Designs of privacy protection in location-aware mobile social networking applications
暂无分享,去创建一个
[1] Guanling Chen,et al. Analyzing Privacy Designs of Mobile Social Networking Applications , 2008, 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.
[2] Tara Matthews,et al. Location disclosure to social relations: why, when, & what people want to share , 2005, CHI.
[3] George M. Gray,et al. Risk: A Practical Guide for Deciding What's Really Safe and What's Really Dangerous in the World Around You , 2002 .
[4] Lorrie Faith Cranor,et al. Understanding and capturing people’s privacy policies in a mobile social networking application , 2009, Personal and Ubiquitous Computing.
[5] Pierangela Samarati,et al. Location privacy in pervasive computing , 2008 .
[6] Roger Wattenhofer,et al. VENETA: Serverless Friend-of-Friend Detection in Mobile Social Networking , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.
[7] Junzhong Gu,et al. Event Based Semantic Location Model in Cooperative Mobile Computing , 2009, 2009 Ninth International Conference on Hybrid Intelligent Systems.
[8] Yang Jing,et al. An Ontology-Based Approach for Mobile Personalized Recommendation , 2009 .
[9] George Danezis,et al. How Much Is Location Privacy Worth? , 2005, WEIS.
[10] Helen Nissenbaum,et al. Privacy and contextual integrity: framework and applications , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[11] Lorrie Faith Cranor,et al. Understanding and Capturing People’s Privacy Policies in a People Finder Application , 2008 .
[12] Liang He,et al. Location Aware Mobile Cooperation-Design and System , 2009 .
[13] Ling Liu,et al. Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.
[14] Yao-Jen Chang,et al. A General Architecture of Mobile Social Network Services , 2007, 2007 International Conference on Convergence Information Technology (ICCIT 2007).
[15] Li Shan. Attacking Algorithms Against Continuous Queries in LBS and Anonymity Measurement , 2009 .
[16] Marijke Coetzee,et al. BlueTrust in a Real World , 2008, 2008 Third International Conference on Availability, Reliability and Security.
[17] Xu Wei,et al. BM-CVI: A Backup Method Based on a Cross-Version Integration Mechanism , 2007, 2007 International Conference on Convergence Information Technology (ICCIT 2007).
[18] Liang He,et al. LaMOC - A Location Aware Mobile Cooperative System , 2009, FGIT-SIP.
[19] Junzhong Gu,et al. Privacy-Preserving Skyline Queries in LBS , 2010, 2010 International Conference on Machine Vision and Human-machine Interface.
[20] Anind K. Dey,et al. Who wants to know what when? privacy preference determinants in ubiquitous computing , 2003, CHI Extended Abstracts.
[21] John Kelley,et al. WhozThat? evolving an ecosystem for context-aware mobile social networks , 2008, IEEE Network.