TAPAS: Trustworthy privacy-aware participatory sensing
暂无分享,去创建一个
[1] Deborah Estrin,et al. Center for Embedded Networked Sensing , 2006 .
[2] Ranjita Bhagwan,et al. Anonygator: Privacy and Integrity Preserving Data Aggregation , 2010, Middleware.
[3] Chi-Yin Chow,et al. Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments , 2011, GeoInformatica.
[4] Margaret Martonosi,et al. Location-based trust for mobile user-generated content: applications, challenges and implementations , 2008, HotMobile '08.
[5] Chi-Yin Chow,et al. A peer-to-peer spatial cloaking algorithm for anonymous location-based service , 2006, GIS '06.
[6] Kyriakos Mouratidis,et al. Preventing Location-Based Identity Inference in Anonymous Spatial Queries , 2007, IEEE Transactions on Knowledge and Data Engineering.
[7] Radu Sion,et al. Query Execution Assurance for Outsourced Databases , 2005, VLDB.
[8] Yin Yang,et al. Spatial Outsourcing for Location-based Services , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[9] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[10] Yang Zhang,et al. CarTel: a distributed mobile sensor computing system , 2006, SenSys '06.
[11] Beng Chin Ooi,et al. Managing Trust in Peer-to-Peer Systems Using Reputation-Based Techniques , 2003, WAIM.
[12] Haixun Wang,et al. Query Integrity Assurance of Location-Based Services Accessing Outsourced Spatial Databases , 2009, SSTD.
[13] Cristina Nita-Rotaru,et al. A survey of attack and defense techniques for reputation systems , 2009, CSUR.
[14] Philip S. Yu,et al. Privacy-preserving data publishing: A survey of recent developments , 2010, CSUR.
[15] Minho Shin,et al. Anonysense: privacy-aware people-centric sensing , 2008, MobiSys '08.
[16] Nabil R. Adam,et al. Security-control methods for statistical databases: a comparative study , 1989, ACM Comput. Surv..
[17] David Wetherall,et al. Toward trustworthy mobile sensing , 2010, HotMobile '10.
[18] Panos Kalnis,et al. Outsourcing Search Services on Private Spatial Data , 2009, 2009 IEEE 25th International Conference on Data Engineering.
[19] Deborah Estrin,et al. Participatory Privacy in Urban Sensing , 2008 .
[20] Pierangela Samarati,et al. Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..
[21] Urs Hengartner,et al. Hiding Location Information from Location-Based Services , 2007, 2007 International Conference on Mobile Data Management.
[22] Ling Liu,et al. Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.
[23] Cyrus Shahabi,et al. A privacy-aware framework for participatory sensing , 2011, SKDD.
[24] Ling Liu,et al. Supporting anonymous location queries in mobile environments with privacygrid , 2008, WWW.
[25] Ramakrishnan Srikant,et al. Privacy-preserving data mining , 2000, SIGMOD '00.
[26] Panos Kalnis,et al. Enabling search services on outsourced private spatial data , 2009, The VLDB Journal.
[27] Ramachandran Ramjee,et al. Nericell: rich monitoring of road and traffic conditions using mobile smartphones , 2008, SenSys '08.
[28] Mostafa H. Ammar,et al. A reputation system for peer-to-peer networks , 2003, NOSSDAV '03.
[29] Edmund A. Mennis. The Wisdom of Crowds: Why the Many Are Smarter than the Few and How Collective Wisdom Shapes Business, Economies, Societies, and Nations , 2006 .
[30] Hari Balakrishnan,et al. Not-a-Bot: Improving Service Availability in the Face of Botnet Attacks , 2009, NSDI.
[31] Panos Kalnis,et al. MobiHide: A Mobilea Peer-to-Peer System for Anonymous Location-Based Queries , 2007, SSTD.
[32] Panos Kalnis,et al. Private queries in location based services: anonymizers are not necessary , 2008, SIGMOD Conference.
[33] Wen Hu,et al. Towards privacy-sensitive participatory sensing , 2009, 2009 IEEE International Conference on Pervasive Computing and Communications.
[34] Cyrus Shahabi,et al. Towards preserving privacy in participatory sensing , 2011, 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).
[35] Panos Kalnis,et al. A reciprocal framework for spatial K-anonymity , 2010, Inf. Syst..
[36] Cyrus Shahabi,et al. Privacy assurance in mobile sensing networks: Go beyond trusted servers , 2010, 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).
[37] Albert-László Barabási,et al. Understanding individual human mobility patterns , 2008, Nature.
[38] Wen Hu,et al. Towards trustworthy participatory sensing , 2009 .
[39] Cyrus Shahabi,et al. Location privacy: going beyond K-anonymity, cloaking and anonymizers , 2011, Knowledge and Information Systems.
[40] Cyrus Shahabi,et al. Blind Evaluation of Nearest Neighbor Queries Using Space Transformation to Preserve Location Privacy , 2007, SSTD.
[41] Alec Wolman,et al. I am a sensor, and I approve this message , 2010, HotMobile '10.
[42] Walid G. Aref,et al. Casper*: Query processing for location services without compromising privacy , 2006, TODS.