A privacy-preserving personal sensor data ecosystem

[1]  Carmela Troncoso,et al.  Unraveling an old cloak: k-anonymity for location privacy , 2010, WPES '10.

[2]  Douglas C. Engelbart,et al.  A research center for augmenting human intellect , 1968, AFIPS Fall Joint Computing Conference.

[3]  Luc Bouganim,et al.  Secure personal data servers , 2010, Proc. VLDB Endow..

[4]  John Krumm,et al.  Inference Attacks on Location Tracks , 2007, Pervasive.

[5]  Pierangela Samarati,et al.  Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression , 1998 .

[6]  L. Cox Suppression Methodology and Statistical Disclosure Control , 1980 .

[7]  Marco Gruteser,et al.  USENIX Association , 1992 .

[8]  A. Pentland,et al.  Life in the network: The coming age of computational social science: Science , 2009 .

[9]  Erez Shmueli,et al.  openPDS: Protecting the Privacy of Metadata through SafeAnswers , 2014, PloS one.

[10]  Markus Jakobsson,et al.  Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking , 2002, USENIX Security Symposium.

[11]  Craig Gentry,et al.  A fully homomorphic encryption scheme , 2009 .

[12]  César A. Hidalgo,et al.  Unique in the Crowd: The privacy bounds of human mobility , 2013, Scientific Reports.

[13]  Sheng Zhong,et al.  Anonymity-preserving data collection , 2005, KDD '05.

[14]  Fabio Pianesi,et al.  Happiness Recognition from Mobile Phone Data , 2013, 2013 International Conference on Social Computing.

[15]  Alex Pentland,et al.  Building privacy-preserving location-based apps , 2014, 2014 Twelfth Annual International Conference on Privacy, Security and Trust.

[16]  N. Eagle,et al.  Network Diversity and Economic Development , 2010, Science.

[17]  Philip S. Yu,et al.  Privacy-preserving data publishing: A survey of recent developments , 2010, CSUR.

[18]  Alex Pentland,et al.  Social fMRI: Investigating and shaping social mechanisms in the real world , 2011, Pervasive Mob. Comput..

[19]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[20]  Fuming Shih,et al.  Understanding People's Preferences for Disclosing Contextual Information to Smartphone Apps , 2013, HCI.

[21]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[22]  S L Warner,et al.  Randomized response: a survey technique for eliminating evasive answer bias. , 1965, Journal of the American Statistical Association.

[23]  Vannevar Bush,et al.  As we may think , 1945, INTR.

[24]  Lars Kulik,et al.  A Formal Model of Obfuscation and Negotiation for Location Privacy , 2005, Pervasive.

[25]  T. Beauchamp,et al.  A History and Theory of Informed Consent , 1986, American Political Science Review.

[26]  Cecilia Mascolo,et al.  An Empirical Study of Geographic User Activity Patterns in Foursquare , 2011, ICWSM.

[27]  Alex Pentland,et al.  Predicting Spending Behavior Using Socio-mobile Features , 2013, 2013 International Conference on Social Computing.

[28]  Frank Stajano,et al.  Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..

[29]  Tom Kirkham,et al.  A personal data store for an Internet of Subjects , 2011, International Conference on Information Society (i-Society 2011).