{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T11:08:37Z","timestamp":1774264117098,"version":"3.50.1"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030047702","type":"print"},{"value":"9783030047719","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-04771-9_10","type":"book-chapter","created":{"date-parts":[[2018,12,5]],"date-time":"2018-12-05T17:02:53Z","timestamp":1544029373000},"page":"114-129","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Analyzing Privacy Risk in Human Mobility Data"],"prefix":"10.1007","author":[{"given":"Roberto","family":"Pellungrini","sequence":"first","affiliation":[]},{"given":"Luca","family":"Pappalardo","sequence":"additional","affiliation":[]},{"given":"Francesca","family":"Pratesi","sequence":"additional","affiliation":[]},{"given":"Anna","family":"Monreale","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,6]]},"reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Abul, O., Bonchi, F., Nanni, M.: Never walk alone: uncertainty for anonymity in moving objects databases. In ICDE 2008, pp. 376\u2013385 (2008)","DOI":"10.1109\/ICDE.2008.4497446"},{"key":"10_CR2","unstructured":"Alberts, C., Behrens, S., Pethia, R., Wilson, W.: Operationally critical threat, asset, and vulnerability evaluation (OCTAVE) framework, version 1.0. CMU\/SEI-99-TR-017. Software Engineering Institute, Carnegie Mellon University (1999). http:\/\/resources.sei.cmu.edu\/library\/asset-view.cfm?AssetID=13473"},{"issue":"2","key":"10_CR3","doi-asserted-by":"publisher","first-page":"70","DOI":"10.4018\/IJSSE.2015040104","volume":"6","author":"A Armando","year":"2015","unstructured":"Armando, A., Bezzi, M., Metoui, N., Sabetta, A.: Risk-based privacy-aware information disclosure. Int. J. Secur. Softw. Eng. 6(2), 70\u201389 (2015)","journal-title":"Int. J. Secur. Softw. Eng."},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Cormode, G., Procopiuc, C.M., Srivastava, D., Tran, T.T.L.: Differentially private summaries for sparse data. In: ICDT 2012, pp. 299\u2013311 (2012)","DOI":"10.1145\/2274576.2274608"},{"issue":"1","key":"10_CR5","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s00766-010-0115-7","volume":"16","author":"M Deng","year":"2011","unstructured":"Deng, M., Wuyts, K., Scandariato, R., Preneel, B., Joosen, W.: A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements. Requir. Eng. 16(1), 3\u201332 (2011)","journal-title":"Requir. Eng."},{"key":"10_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11681878_14","volume-title":"Theory of Cryptography","author":"C Dwork","year":"2006","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265\u2013284. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11681878_14"},{"issue":"7","key":"10_CR7","doi-asserted-by":"publisher","first-page":"1057","DOI":"10.1007\/s00265-009-0739-0","volume":"63","author":"N Eagle","year":"2009","unstructured":"Eagle, N., Pentland, A.S.: Eigenbehaviors: identifying structure in routine. Behav. Ecol. Sociobiol. 63(7), 1057\u20131066 (2009)","journal-title":"Behav. Ecol. Sociobiol."},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Gambs, S., Killijian, M.O., del Prado Cortez, M.N.: Next place prediction using mobility Markov chains. In: MPM, Article no. 4 (2012)","DOI":"10.1145\/2181196.2181199"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Mohammed, N., Fung, B.C.M., Debbabi, M.: Walking in the crowd: anonymizing trajectory data for pattern analysis. In: CIKM 2009, pp. 1441\u20131444 (2009)","DOI":"10.1145\/1645953.1646140"},{"key":"10_CR10","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/978-3-319-00615-4_13","volume-title":"Geographic Information Science at the Heart of Europe","author":"A Monreale","year":"2013","unstructured":"Monreale, A., et al.: Privacy-preserving distributed movement data aggregation. In: Vandenbroucke, D., Bucher, B., Crompvoets, J. (eds.) Geographic Information Science at the Heart of Europe, pp. 225\u2013245. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-319-00615-4_13"},{"issue":"3","key":"10_CR11","doi-asserted-by":"publisher","first-page":"829","DOI":"10.1109\/TMC.2016.2561281","volume":"16","author":"AM Olteanu","year":"2017","unstructured":"Olteanu, A.M., Huguenin, K., Shokri, R., Humbert, M., Hubaux, J.P.: Quantifying interdependent privacy risks with location data. IEEE Trans. Mob. Comput. 16(3), 829\u2013842 (2017)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"10_CR12","doi-asserted-by":"publisher","first-page":"8166","DOI":"10.1038\/ncomms9166","volume":"6","author":"L Pappalardo","year":"2015","unstructured":"Pappalardo, L., Simini, F., Rinzivillo, S., Pedreschi, D., Giannotti, F., Barabasi, A.-L.: Returners and explorers dichotomy in human mobility. Nat. Commun. 6, 8166 (2015)","journal-title":"Nat. Commun."},{"issue":"1","key":"10_CR13","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/s41060-016-0013-2","volume":"2","author":"L Pappalardo","year":"2016","unstructured":"Pappalardo, L., Vanhoof, M., Gabrielli, L., Smoreda, Z., Pedreschi, D., Giannotti, F.: An analytical framework to nowcast well-being using mobile phone data. Int. J. Data Sci. Anal. 2(1), 75\u201392 (2016)","journal-title":"Int. J. Data Sci. Anal."},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Pyrgelis, A., De Cristofaro, E., Ross, G.J.: Privacy-friendly mobility analytics using aggregate location data. In: SIGSPATIAL International Conference on Advances in Geographic Information Systems, p. 34 (2016)","DOI":"10.1145\/2996913.2996971"},{"key":"10_CR15","unstructured":"Pratesi, F., Monreale, A., Trasarti, R., Giannotti, F., Pedreschi, D., Yanagihara, T.: PRUDEnce: a system for assessing privacy risk vs utility in data sharing ecosystems. Trans. Data Priv. J., to appear"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Rossi, L., Musolesi, M.: It\u2019s the way you check-in: identifying users in location-based social networks. In: ACM Conference on Online Social Networks, pp. 215\u2013226","DOI":"10.1145\/2660460.2660485"},{"issue":"1","key":"10_CR17","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1140\/epjds\/s13688-015-0049-x","volume":"4","author":"L Rossi","year":"2015","unstructured":"Rossi, L., Walker, J., Musolesi, M.: Spatio-temporal techniques for user identification by means of GPS mobility data. EPJ Data Sci. 4(1), 11 (2015)","journal-title":"EPJ Data Sci."},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Rubinstein, I.S.: Big data: the end of privacy or a new beginning? International Data Privacy Law (2013)","DOI":"10.2139\/ssrn.2157659"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Samarati, P., Sweeney, L.: Generalizing data to provide anonymity when disclosing information (Abstract). In: PODS, vol. 188 (1998a)","DOI":"10.1145\/275487.275508"},{"key":"10_CR20","unstructured":"Song, Y., Dahlmeier, D., Bressan, S.: Not so unique in the crowd: a simple and effective algorithm for anonymizing location data. In PIR@SIGIR 2014, pp. 19\u201324 (2014)"},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Stoneburner, G., Goguen, A., Feringa, A.: Risk Management Guide for Information Technology Systems: Recommendations of the National Institute of Standards and Technology, vol. 800. NIST special publication (2002)","DOI":"10.6028\/NIST.SP.800-30"},{"key":"10_CR22","doi-asserted-by":"crossref","unstructured":"Terrovitis, M., Mamoulis, N.: Privacy preservation in the publication of trajectories. In: MDM, pp. 65\u201372 (2008)","DOI":"10.1109\/MDM.2008.29"},{"key":"10_CR23","doi-asserted-by":"crossref","unstructured":"Trabelsi, S., Salzgeber, V., Bezzi, M., Montagnon, G.: Data disclosure risk evaluation. In: CRiSIS 2009, pp. 35\u201372 (2009)","DOI":"10.1109\/CRISIS.2009.5411979"},{"issue":"7","key":"10_CR24","first-page":"1","volume":"10","author":"NE Williams","year":"2015","unstructured":"Williams, N.E., Thomas, T.A., Dunbar, M., Eagle, N., Dobra, A.: Measures of human mobility using mobile phone records enhanced with GIS data. PLoS One 10(7), 1\u201316 (2015)","journal-title":"PLoS One"},{"key":"10_CR25","doi-asserted-by":"crossref","unstructured":"Yarovoy, R., Bonchi, F., Lakshmanan, L.V.S., Wang, W.H.: Anonymizing moving objects: how to hide a MOB in a crowd? In: EDBT, vol. 72, no. 83 (2009)","DOI":"10.1145\/1516360.1516370"},{"key":"10_CR26","first-page":"3","volume":"6","author":"Y Zheng","year":"2015","unstructured":"Zheng, Y.: Trajectory data mining: an overview. ACM TIST 6, 3 (2015)","journal-title":"ACM TIST"},{"key":"10_CR27","doi-asserted-by":"crossref","unstructured":"Zang, H., Bolot, J.: Anonymization of location data does not work: a large-scale measurement study. In: MobiCom, pp. 145\u2013156 (2011)","DOI":"10.1145\/2030613.2030630"},{"key":"10_CR28","doi-asserted-by":"crossref","unstructured":"Unnikrishnan, J., Naini, F.M.: De-anonymizing private data by matching statistics. In: Allerton, pp. 1616\u20131623 (2013)","DOI":"10.1109\/Allerton.2013.6736722"}],"container-title":["Lecture Notes in Computer Science","Software Technologies: Applications and Foundations"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-04771-9_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T15:52:30Z","timestamp":1573055550000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-04771-9_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030047702","9783030047719"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-04771-9_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"STAF","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Federation of International Conferences on Software Technologies: Applications and Foundations","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Toulouse","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"staf2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.staf2018.fr\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}