{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,23]],"date-time":"2025-01-23T05:37:28Z","timestamp":1737610648835,"version":"3.33.0"},"publisher-location":"Boston, MA","reference-count":17,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387485324"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-48533-1_21","type":"book-chapter","created":{"date-parts":[[2007,12,2]],"date-time":"2007-12-02T08:10:18Z","timestamp":1196583018000},"page":"509-530","source":"Crossref","is-referenced-by-count":6,"title":["Privacy Protection through Anonymity in Location-based Services"],"prefix":"10.1007","author":[{"given":"Claudio","family":"Bettini","sequence":"first","affiliation":[]},{"given":"Sergio","family":"Mascetti","sequence":"additional","affiliation":[]},{"given":"X. Sean","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","doi-asserted-by":"crossref","unstructured":"Alastair R. Beresford and Frank Stajano. Mix zones: User privacy in location-aware services. In PERCOMW \u201904: Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, page 127, 2004.","DOI":"10.1109\/PERCOMW.2004.1276918"},{"key":"21_CR2","doi-asserted-by":"crossref","unstructured":"Claudio Bettini, Sushil Jajodia, and Linda Pareschi. Anonymity and diversity in LBS: a preliminary investigation. In Proc. of the 5th International Conference on Pervasive Computing and Communication (PerCom), 2007.","DOI":"10.1109\/PERCOMW.2007.23"},{"key":"21_CR3","doi-asserted-by":"crossref","unstructured":"Claudio Bettini, Sergio Mascetti, X. Sean Wang, and Sushil Jajodia. Anonymity in location-based services: towards a general framework. In Proc. of the 8th International Conference on Mobile Data Management (MDM). IEEE Computer Society, 2007.","DOI":"10.1109\/MDM.2007.19"},{"key":"21_CR4","doi-asserted-by":"crossref","unstructured":"Claudio Bettini, X. Sean Wang, and Sushil Jajodia. Protecting privacy against location-based personal identification. In Proc. of the 2nd workshop on Secure Data Management (SDM), volume 3674 of LNCS, pages 185\u2013199. Springer, 2005.","DOI":"10.1007\/11552338_13"},{"key":"21_CR5","unstructured":"Claudio Bettini, X. Sean Wang, and Sushil Jajodia. The role of quasi-identifiers in k-anonymity revisited. Technical Report RT-11-06, DICo, University of Milan, 2006."},{"issue":"2","key":"21_CR6","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1023\/A:1015231126594","volume":"6","author":"Brinkhoff Thomas","year":"2002","unstructured":"Thomas Brinkhoff. A framework for generating network-based moving objects. GeoInformatica, 6(2):153\u2013180, 2002.","journal-title":"GeoInformatica"},{"issue":"3","key":"21_CR7","first-page":"329","volume":"2","author":"Dalenius Tore","year":"1986","unstructured":"Tore Dalenius. Finding a needle in a haystack - or identifying anonymous census record. Journal of Official Statistics, 2(3):329\u2013336, 1986.","journal-title":"Journal of Official Statistics"},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"Bugra Gedik and Ling Liu. Location privacy in mobile systems: A personalized anonymization model. In Proc. of the 25th International Conference on Distributed Computing Systems (ICDCS), pages 620\u2013629. IEEE Computer Society, 2005.","DOI":"10.1109\/ICDCS.2005.48"},{"key":"21_CR9","doi-asserted-by":"crossref","unstructured":"Marco Gruteser and Dirk Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In Proc. of the 1st International Conference on Mobile Systems, Applications and Services (MobiSys). The USENIX Association, 2003.","DOI":"10.1145\/1066116.1189037"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Baik Hoh and Marco Gruteser. Protecting location privacy through path confusion. In Proc. of the 1st International Conference on Security and Privacy for Emerging Areas in Communications Networks (SecureComm), pages 194\u2013205. IEEE Computer Society, 2005.","DOI":"10.1109\/SECURECOMM.2005.33"},{"key":"21_CR11","unstructured":"Panos Kalnis, Gabriel Ghinta, Kyriakos Mouratidis, and Dimitri Papadias. Preserving anonymity in location based services. Technical Report B6\/06, National University of Singapore, 2006."},{"key":"21_CR12","doi-asserted-by":"crossref","unstructured":"Hidetoshi Kido, Yutaka Yanagisawa, and Tetsuji Satoh. An anonymous communication technique using dummies for location-based services. In Proc. of the International Conference on Pervasive Services (ICPS), pages 88\u201397. IEEE Computer Society, 2005.","DOI":"10.1109\/PERSER.2005.1506394"},{"key":"21_CR13","doi-asserted-by":"crossref","unstructured":"Kristen LeFevre, David J. DeWitt, and Raghu Ramakrishnan. Mondrian multidimensional k-anonymity. In Proc. of the 22nd International Conference on Data Engineering (ICDE). IEEE Computer Society, 2006.","DOI":"10.1109\/ICDE.2006.101"},{"key":"21_CR14","doi-asserted-by":"crossref","unstructured":"Ashwin Machanavajjhala, Johannes Gehrke, Daniel Kifer, and Muthuramakrishnan Venkitasubramaniam. l-diversity: Privacy beyond k-anonymity. In Proc. of the 22nd International Conference on Data Engineering (ICDE). IEEE Computer Society, 2006.","DOI":"10.1109\/ICDE.2006.1"},{"key":"21_CR15","doi-asserted-by":"crossref","unstructured":"Sergio Mascetti and Claudio Bettini. A comparison of spatial generalization algorithms for LBS privacy preservation. In Proc. of the 1st International Workshop on Privacy-Aware Location-based Mobile Services (PALMS), 2007.","DOI":"10.1109\/MDM.2007.54"},{"key":"21_CR16","unstructured":"Mohamed F. Mokbel, Chi-Yin Chow, and Walid G. Aref. The new casper: query processing for location services without compromising privacy. In Proc. of the 32nd International Conference on Very Large Data Bases (VLDB), pages 763\u2013774. VLDB Endowment, 2006."},{"issue":"6","key":"21_CR17","doi-asserted-by":"crossref","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P. Samarati","year":"2001","unstructured":"P. Samarati. Protecting respondents\u2019 identities in microdata release. IEEE Transactions on Knowledge and Data Engineering, 13(6):1010\u20131027, 2001.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"}],"container-title":["Handbook of Database Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-48533-1_21.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,23]],"date-time":"2025-01-23T03:57:45Z","timestamp":1737604665000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-48533-1_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387485324"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-48533-1_21","relation":{},"subject":[]}}