Databases Reference
In-Depth Information
References
1. Duckham, M., Kulik, L.: Location privacy and location-aware computing. In:
Dynamic & Mobile GIS: Investigating Change in Space and Time. Taylor &
Francis (2006) 34-51
2. Lee, J.W.: Location-tracing sparks privacy concerns. Korea Times.
http://times.hankooki.com, 16 November 2004. Accessed 22 December 2006
3. Foxs News: Man Accused of Stalking Ex-Girlfriend With GPS.
http://www.foxnews.com/story/0,2933,131487,00.html, 04 September 2004. Ac-
cessed 22 March 2007
4. Beresford, A.R., Stajano, F.: Location privacy in pervasive computing. IEEE
Pervasive Computing 2 (1) (2003) 46-55
5. Bettini, C., Wang, X., Jajodia, S.: Protecting privacy against location-based
personal identification. In: Proc. of the 2nd VLDB Workshop on Secure Data
Management, LNCS 3674, Springer-Verlag (2005)
6. Gruteser, M., Grunwald, D.: Anonymous usage of location-based services
through spatial and temporal cloaking. In: Proc. of the 1st International Con-
ference on Mobile Systems, Applications, and Services. (May 2003)
7. Duckham, M., Kulik, L.: A formal model of obfuscation and negotiation for
location privacy. In: Proc. of the 3rd International Conference PERVASIVE
2005, Munich, Germany (May 2005)
8. Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Samarati, P.: K-Anonymity.
In: Security in Decentralized Data Management. Springer (2007)
9. Samarati, P.: Protecting respondents' identities in microdata release. IEEE
Transactions on Knowledge and Data Engineering 13 (6) (2001) 1010-1027
10. Ardagna, C., Cremonini, M., Damiani, E., De Capitani di Vimercati, S., Sama-
rati, P.: Supporting location-based conditions in access control policies. In:
Proc. of the ACM Symposium on Information, Computer and Communications
Security (ASIACCS'06), Taipei, Taiwan (March 2006)
11. Bonatti, P., Samarati, P.: A unified framework for regulating access and infor-
mation release on the web. Journal of Computer Security 10 (3) (2002) 241-272
12. Marsit, N., Hameurlain, A., Mammeri, Z., Morvan, F.: Query processing in
mobile environments: a survey and open problems. In: Proc. of the 1st In-
ternational Conference on Distributed Framework for Multimedia Applications
(DFMA'05), Besancon, France (February 2005)
13. Jajodia, S., Samarati, P., Sapino, M., Subrahmanian, V.: Flexible support for
multiple access control policies. ACM Transactions on Database Systems 26 (2)
(June 2001) 214-260
14. OASIS: eXtensible Access Control Markup Language (XACML) Version 1.0.
http://www.oasis-open.org/committees/xacml. (2003)
15. van der Horst, T., Sundelin, T., Seamons, K., Knutson, C.: Mobile trust negoti-
ation: Authentication and authorization in dynamic mobile networks. In: Proc.
of the 8th IFIP Conference on Communications and Multimedia Security, Lake
Windermere, England (September 2004)
16. Gedik, B., Liu, L.: Location privacy in mobile systems: A personalized
anonymization model. In: Proc. of the 25th International Conference on Dis-
tributed Computing Systems (IEEE ICDCS 2005), Columbus, Ohio (June 2005)
17. Gruteser, M., Bredin, J., Grunwald, D.: Path privacy in location-aware com-
puting. In: Proc. of the Second International Conference on Mobile Systems,
Search WWH ::




Custom Search