Databases Reference
In-Depth Information
In terms of future work, we pointed out a number of open problems in
Section 4.3. More general future work should include studies of actual LBS
users and their requests. In addition, usability studies of different protection
techniques are also necessary and interesting.
References
1. Alastair R. Beresford and Frank Stajano. Mix zones: User privacy in location-
aware services. In PERCOMW '04: Proceedings of the Second IEEE Annual
Conference on Pervasive Computing and Communications Workshops , page 127,
2004.
2. Claudio Bettini, Sushil Jajodia, and Linda Pareschi. Anonymity and diversity in
LBS: a preliminary investigation. In Proc. of the 5th International Conference
on Pervasive Computing and Communication (PerCom) , 2007.
3. Claudio Bettini, Sergio Mascetti, X. Sean Wang, and Sushil Jajodia. Anonymity
in location-based services: towards a general framework. In Proc. of the 8th In-
ternational Conference on Mobile Data Management (MDM) . IEEE Computer
Society, 2007.
4. Claudio Bettini, X. Sean Wang, and Sushil Jajodia. Protecting privacy against
location-based personal identification. In Proc. of the 2nd workshop on Se-
cure Data Management (SDM) , volume 3674 of LNCS , pages 185-199. Springer,
2005.
5. Claudio Bettini, X. Sean Wang, and Sushil Jajodia. The role of quasi-identifiers
in k-anonymity revisited. Technical Report RT-11-06, DICo, University of Mi-
lan, 2006.
6. Thomas Brinkhoff. A framework for generating network-based moving objects.
GeoInformatica , 6(2):153-180, 2002.
7. Tore Dalenius. Finding a needle in a haystack - or identifying anonymous census
record. Journal of O cial Statistics , 2(3):329-336, 1986.
8. Bugra Gedik and Ling Liu. Location privacy in mobile systems: A personalized
anonymization model. In Proc. of the 25th International Conference on Dis-
tributed Computing Systems (ICDCS) , pages 620-629. IEEE Computer Society,
2005.
9. Marco Gruteser and Dirk Grunwald. Anonymous usage of location-based ser-
vices through spatial and temporal cloaking. In Proc. of the 1st Interna-
tional Conference on Mobile Systems, Applications and Services (MobiSys) .The
USENIX Association, 2003.
10. Baik Hoh and Marco Gruteser. Protecting location privacy through path con-
fusion. In Proc. of the 1st International Conference on Security and Privacy for
Emerging Areas in Communications Networks (SecureComm) , pages 194-205.
IEEE Computer Society, 2005.
11. Panos Kalnis, Gabriel Ghinta, Kyriakos Mouratidis, and Dimitri Papadias. Pre-
serving anonymity in location based services. Technical Report B6/06, National
University of Singapore, 2006.
12. Hidetoshi Kido, Yutaka Yanagisawa, and Tetsuji Satoh. An anonymous com-
munication technique using dummies for location-based services. In Proc. of
the International Conference on Pervasive Services (ICPS) , pages 88-97. IEEE
Computer Society, 2005.
Search WWH ::




Custom Search