{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,26]],"date-time":"2025-01-26T05:38:26Z","timestamp":1737869906140,"version":"3.33.0"},"publisher-location":"Boston, MA","reference-count":16,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387308586"},{"type":"electronic","value":"9780387359731"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-0-387-35973-1_1022","type":"book-chapter","created":{"date-parts":[[2008,1,8]],"date-time":"2008-01-08T23:20:31Z","timestamp":1199834431000},"page":"906-912","source":"Crossref","is-referenced-by-count":3,"title":["Privacy Threats in Location-Based Services"],"prefix":"10.1007","author":[{"given":"Claudio","family":"Bettini","sequence":"first","affiliation":[]},{"given":"Sergio","family":"Mascetti","sequence":"additional","affiliation":[]},{"given":"X.\u00a0Sean","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"1022_CR1","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MPRV.2003.1186725","volume":"2","author":"A.R. Beresford","year":"2003","unstructured":"Beresford,\u00a0A.R., Stajano,\u00a0F.: Location Privacy in Pervasive Computing. IEEE Pervasive Computing 2(1):46\u201355 January\u2013March (2003)","journal-title":"IEEE Pervasive Computing"},{"key":"1022_CR2","first-page":"127","volume-title":"IEEE Workshop on Pervasive Computing and Communication Security (PerSec)","author":"A. Beresford","year":"2004","unstructured":"Beresford,\u00a0A.R., Stajano,\u00a0F.: Mix zones: User privacy in location-aware services. In: PerCom Workshops, pp.\u00a0127\u2013131. IEEE Computer Society (2004)"},{"key":"1022_CR3","doi-asserted-by":"crossref","unstructured":"Bettini,\u00a0C., Mascetti,\u00a0S., Wang,\u00a0X.S., Jajodia,\u00a0S.: Anonymity in Location-based Services: Towards a\u00a0General Framework. In: Proc. of the 8th International Conference on Mobile Data Management (MDM). IEEE Computer Society (2007)","DOI":"10.1109\/MDM.2007.19"},{"key":"1022_CR4","doi-asserted-by":"crossref","unstructured":"Bettini,\u00a0C., Wang,\u00a0X.S., Jajodia,\u00a0S.: Protecting privacy against location-based personal identification. In: Jonker,\u00a0W., Petkovic,\u00a0M. (eds.) Secure Data Management, Lecture Notes in Computer Science, vol.\u00a03674, pp.\u00a0185\u2013199. Springer (2005)","DOI":"10.1007\/11552338_13"},{"issue":"2","key":"1022_CR5","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D. Chaum","year":"1981","unstructured":"Chaum,\u00a0D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24(2):84\u201388 (1981)","journal-title":"Communications of the ACM"},{"key":"1022_CR6","volume-title":"Geopriv requirements","author":"J. Cuellar","year":"2004","unstructured":"Cuellar,\u00a0J., Morris,\u00a0J., Mulligan,\u00a0D., Peterson,\u00a0J., Polk,\u00a0J.: Geopriv requirements. RFC\u00a03693, IETF (2004)"},{"key":"1022_CR7","doi-asserted-by":"crossref","unstructured":"Gedik,\u00a0B., Liu,\u00a0L.: Location privacy in mobile systems: A\u00a0personalized anonymization model. In: ICDCS, pp.\u00a0620\u2013629. IEEE Computer Society (2005)","DOI":"10.1109\/ICDCS.2005.48"},{"key":"1022_CR8","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1145\/1066116.1189037","volume-title":"Proceedings of the First International Conference on Mobile Systems, Applications, and Services, San Francisco, CA","author":"M. Gruteser","year":"2003","unstructured":"Gruteser,\u00a0M., Grunwald,\u00a0D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proc. of the First International Conference on Mobile Systems, Applications, and Services (MobiSys), USENIX (2003)"},{"key":"1022_CR9","doi-asserted-by":"crossref","unstructured":"Gruteser,\u00a0M., Hoh,\u00a0B.: On the anonymity of periodic location samples. In: Hutter,\u00a0D., Ullmann,\u00a0M. (eds.) SPC, Lecture Notes in Computer Science, vol.\u00a03450, pp.\u00a0179\u2013192. Springer (2005)","DOI":"10.1007\/978-3-540-32004-3_19"},{"issue":"2","key":"1022_CR10","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MSECP.2004.1281242","volume":"2","author":"M. Gruteser","year":"2004","unstructured":"Gruteser,\u00a0M., Liu,\u00a0X.: Protecting privacy in continuous location-tracking applications. IEEE Security & Privacy 2(2):28\u201334 (2004)","journal-title":"IEEE Secur. Priv."},{"key":"1022_CR11","volume-title":"Preserving anonymity in location based services. Technical report TRB6\/06","author":"P. Kalnis","year":"2006","unstructured":"Kalnis,\u00a0P., Ghinta,\u00a0G., Mouratidis,\u00a0K., Papadias,\u00a0D.: Preserving anonymity in location based services. Technical report TRB6\/06, University of Singapore (2006)"},{"key":"1022_CR12","doi-asserted-by":"crossref","unstructured":"LeFevre,\u00a0K., DeWitt,\u00a0D.J., Ramakrishnan,\u00a0R.: Incognito: efficient full-domain k-anonymity. In: SIGMOD '05: Proceedings of the 2005 ACM SIGMOD international conference on Management of data, pp.\u00a049\u201360. ACM Press (2005)","DOI":"10.1145\/1066157.1066164"},{"key":"1022_CR13","unstructured":"Mokbel,\u00a0M.F., Chow,\u00a0C., Aref,\u00a0W.G.: The new casper: query processing for location services without compromising privacy. In: Proc. of the 32nd International Conference on Very Large Data Bases (VLDB), ACM (2006)"},{"issue":"1","key":"1022_CR14","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MPRV.2003.1186726","volume":"2","author":"G. Myles","year":"2003","unstructured":"Myles,\u00a0G., Friday,\u00a0A., Davies,\u00a0N.: Preserving Privacy in Environments with Location-Based Applications. IEEE Pervasive Computing 2(1):56\u201364 January\u2013March (2003)","journal-title":"IEEE Pervasive Computing"},{"issue":"6","key":"1022_CR15","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P. Samarati","year":"2001","unstructured":"Samarati,\u00a0P.: Protecting respondents' identities in microdata release. IEEE Transactions on Knowledge and Data Engineering 13(6):1010\u20131027 (2001)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"1022_CR16","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1145\/1071246.1071257","volume-title":"MDM '05: Proceedings of the 6th international conference on Mobile Data Management","author":"M. Youssef","year":"2005","unstructured":"Youssef,\u00a0M., Atluri,\u00a0V., Adam,\u00a0N.R.: Preserving mobile customer privacy: an access control system for moving objects and customer profiles. In: MDM '05: Proceedings of the 6th international conference on Mobile Data Management, pp.\u00a067\u201376, New York, NY, USA, ACM Press (2005)"}],"container-title":["Encyclopedia of GIS"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-35973-1_1022","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,25]],"date-time":"2025-01-25T12:58:16Z","timestamp":1737809896000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-35973-1_1022"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9780387308586","9780387359731"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-35973-1_1022","relation":{},"subject":[],"published":{"date-parts":[[2008]]}}}