Preserving User Location Privacy in Mobile Data Management Infrastructures
暂无分享,去创建一个
Yu Zhang | Elisa Bertino | Sunil Prabhakar | Reynold Cheng | E. Bertino | S. Prabhakar | Reynold Cheng | Yu Zhang | Sunil Prabhakar
[1] Mark de Berg,et al. Computational geometry: algorithms and applications , 1997 .
[2] Victor C. M. Leung,et al. Location management for next-generation personal communications networks , 2000, IEEE Netw..
[3] A. Shostack,et al. Anonymity , Unobservability , Pseudonymity , and Identity Management – A Proposal for Terminology , 2000 .
[4] Einar Snekkenes,et al. Concepts for personal location privacy policies , 2001, EC '01.
[5] P. Giblin. Computational geometry: algorithms and applications (2nd edn.), by M. de Berg, M. van Kreveld, M. Overmars and O. Schwarzkopf. Pp. 367. £20.50. 2000. ISBN 3 540 65620 0 (Springer-Verlag). , 2001, The Mathematical Gazette.
[6] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[7] George Danezis,et al. Towards an Information Theoretic Metric for Anonymity , 2002, Privacy Enhancing Technologies.
[8] Sunil Prabhakar,et al. Evaluating probabilistic queries over imprecise data , 2003, SIGMOD '03.
[9] Marco Gruteser,et al. USENIX Association , 1992 .
[10] Michael Alan Caplinger,et al. Cover story: they know where you are , 2003 .
[11] Peter Steenkiste,et al. Access Control to Information in Pervasive Computing Environments , 2003, HotOS.
[12] Upkar Varshney,et al. Location management for mobile commerce applications in wireless Internet environment , 2003, TOIT.
[13] Peter Steenkiste,et al. Protecting Access to People Location Information , 2003, SPC.
[14] Jogesh Warrior,et al. They know where you are [location detection] , 2003 .
[15] Ling Liu,et al. A Customizable k-Anonymity Model for Protecting Location Privacy , 2004 .
[16] Mikhail J. Atallah,et al. Privacy-preserving location-dependent query processing , 2004, The IEEE/ACS International Conference onPervasive Services, 2004. ICPS 2004. Proceedings..
[17] S. Prabhakar,et al. Using Uncertainty to Provide Privacy-Preserving and High-Quality Location-Based Services , 2004 .
[18] Walid G. Aref,et al. SINA: scalable incremental processing of continuous queries in spatio-temporal databases , 2004, SIGMOD '04.
[19] I Chih-Lin,et al. Wireless Communications and Networks , 2004 .
[20] Marco Gruteser,et al. Protecting privacy, in continuous location-tracking applications , 2004, IEEE Security & Privacy Magazine.
[21] Elisa Bertino,et al. Querying Private Data in Moving-Object Environments , 2005 .
[22] Beng Chin Ooi,et al. Privacy and ownership preserving of outsourced medical data , 2005, 21st International Conference on Data Engineering (ICDE'05).
[23] David J. DeWitt,et al. Incognito: efficient full-domain K-anonymity , 2005, SIGMOD '05.
[24] Gus Hosein,et al. They Know Where You Are , 2007 .
[25] Pierangela Samarati,et al. Location privacy in pervasive computing , 2008 .