Spatial generalisation algorithms for LBS privacy preservation
暂无分享,去创建一个
Claudio Bettini | Xiaoyang Sean Wang | Sergio Mascetti | Dario Freni | C. Bettini | X. Wang | D. Freni | S. Mascetti
[1] Panos Kalnis,et al. PRIVE: anonymous location-based queries in distributed mobile systems , 2007, WWW '07.
[2] Thomas Brinkhoff,et al. A Framework for Generating Network-Based Moving Objects , 2002, GeoInformatica.
[3] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[4] Alastair R. Beresford,et al. Location privacy in ubiquitous computing , 2005 .
[5] Pierangela Samarati,et al. Location privacy in pervasive computing , 2008 .
[6] Ling Liu,et al. Location Privacy in Mobile Systems: A Personalized Anonymization Model , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).
[7] Sushil Jajodia,et al. The Role of Quasi-identifiers in k-Anonymity Revisited , 2006, ArXiv.
[8] Chi-Yin Chow,et al. Enabling Private Continuous Queries for Revealed User Locations , 2007, SSTD.
[9] Kyriakos Mouratidis,et al. Preventing Location-Based Identity Inference in Anonymous Spatial Queries , 2007, IEEE Transactions on Knowledge and Data Engineering.
[10] Sushil Jajodia,et al. Protecting Privacy Against Location-Based Personal Identification , 2005, Secure Data Management.
[11] Sushil Jajodia,et al. Anonymity in Location-Based Services: Towards a General Framework , 2007, 2007 International Conference on Mobile Data Management.
[12] Claudio Bettini,et al. A Comparison of Spatial Generalization Algorithms for LBS Privacy Preservation , 2007, 2007 International Conference on Mobile Data Management.
[13] ASHWIN MACHANAVAJJHALA,et al. L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[14] Walid G. Aref,et al. Casper*: Query processing for location services without compromising privacy , 2006, TODS.
[15] David J. DeWitt,et al. Mondrian Multidimensional K-Anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[16] Elisa Bertino,et al. Secure Anonymization for Incremental Datasets , 2006, Secure Data Management.
[17] Roberto J. Bayardo,et al. Data privacy through optimal k-anonymization , 2005, 21st International Conference on Data Engineering (ICDE'05).
[18] Tetsuji Satoh,et al. An anonymous communication technique using dummies for location-based services , 2005, ICPS '05. Proceedings. International Conference on Pervasive Services, 2005..
[19] Ashwin Machanavajjhala,et al. On the efficiency of checking perfect privacy , 2006, PODS '06.
[20] Latanya Sweeney,et al. Achieving k-Anonymity Privacy Protection Using Generalization and Suppression , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[21] Marco Gruteser,et al. USENIX Association , 1992 .
[22] Yufei Tao,et al. Personalized privacy preservation , 2006, Privacy-Preserving Data Mining.
[23] Sushil Jajodia,et al. k-Anonymity in Databases with Timestamped Data , 2006, Thirteenth International Symposium on Temporal Representation and Reasoning (TIME'06).
[24] Yufei Tao,et al. M-invariance: towards privacy preserving re-publication of dynamic datasets , 2007, SIGMOD '07.
[25] Raymond Chi-Wing Wong,et al. (α, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing , 2006, KDD '06.
[26] X. S. Wang,et al. Preserving Anonymity in Location-based Services When Requests from the Same Issuer May Be Correlated , 2007 .
[27] Pierangela Samarati,et al. Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..
[28] Samir Khuller,et al. Achieving anonymity via clustering , 2006, PODS '06.