{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T04:11:11Z","timestamp":1750824671963,"version":"3.41.0"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319644820"},{"type":"electronic","value":"9783319644837"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-64483-7_3","type":"book-chapter","created":{"date-parts":[[2017,7,26]],"date-time":"2017-07-26T17:19:07Z","timestamp":1501089547000},"page":"32-45","source":"Crossref","is-referenced-by-count":1,"title":["A Middleware Enforcing Location Privacy in Mobile Platform"],"prefix":"10.1007","author":[{"given":"Asma","family":"Patel","sequence":"first","affiliation":[]},{"given":"Esther","family":"Palomar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,27]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Almuhimedi, H., Schaub, F., Sadeh, N., Adjerid, I., Acquisti, A., Gluck, J., Cranor, L.F., Agarwal, Y.: Your Location has been Shared 5,398 Times! A Field Study on Mobile App Privacy Nudging. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, pp. 787\u2013796. ACM (2015)","DOI":"10.1145\/2702123.2702210"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Amini, S., Lindqvist, J., Hong, J., Lin, J., Toch, E., Sadeh, N.: Cach\u00e9: caching location-enhanced content to improve user privacy. In: Proceedings of ACM International Conference on Mobile Systems, Applications, and Services, pp. 197\u2013210. ACM (2011)","DOI":"10.1145\/1999995.2000015"},{"key":"3_CR3","unstructured":"Android Developer Reference: March 2016. http:\/\/developer.android.com\/reference\/"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Ardagna, C.A., Livraga, G., Samarati, P.: Protecting privacy of user information in continuous location-based services. In: 2012 IEEE 15th International Conference on Computational Science and Engineering (CSE), pp. 162\u2013169. IEEE (2012)","DOI":"10.1109\/ICCSE.2012.31"},{"key":"3_CR5","unstructured":"Bugiel, S., Heuser, S., Sadeghi, A.R.: Flexible and fine-grained mandatory access control on android for diverse security and privacy policies. In: Usenix Security, pp. 131\u2013146 (2013)"},{"key":"3_CR6","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1109\/MSP.2013.25","volume":"2","author":"LF Cranor","year":"2013","unstructured":"Cranor, L.F., Sadeh, N.: A shortage of privacy engineers. IEEE Secur. Priv. 2, 77\u201379 (2013)","journal-title":"IEEE Secur. Priv."},{"issue":"2","key":"3_CR7","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1145\/2619091","volume":"32","author":"W Enck","year":"2014","unstructured":"Enck, W., Gilbert, P., Han, S., Tendulkar, V., Chun, B.G.: Others: TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. TOCS 32(2), 5 (2014)","journal-title":"TOCS"},{"key":"3_CR8","unstructured":"European Commission: Protection of personal data (2016). http:\/\/ec.europa.eu\/justice\/data-protection\/"},{"issue":"2","key":"3_CR9","doi-asserted-by":"crossref","first-page":"998","DOI":"10.1109\/COMST.2014.2386139","volume":"17","author":"P Faruki","year":"2015","unstructured":"Faruki, P., Bharmal, A., Laxmi, V., Ganmoor, V., Gaur, M.S., Conti, M., Rajarajan, M.: Android security: a survey of issues, malware penetration, and defenses. IEEE Commun. Surv. Tutor. 17(2), 998\u20131022 (2015)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"3_CR10","unstructured":"Fawaz, K., Feng, H., Shin, K.G.: Anatomization and protection of mobile apps\u2019 location privacy threats. In: 24th USENIX Security Symposium (USENIX Security 15), pp. 753\u2013768. USENIX Association (2015)"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Fawaz, K., Shin, K.G.: Location privacy protection for smartphone users. In: Proceedings of ACM Conference on Computer and Communications Security, pp. 239\u2013250. ACM (2014)","DOI":"10.1145\/2660267.2660270"},{"key":"3_CR12","unstructured":"Google Weave: Weave. https:\/\/developers.google.com\/weave\/"},{"key":"3_CR13","unstructured":"Guha, S., Jain, M., Padmanabhan, V.N.: Koi: a location-privacy platform for smartphone apps. In: Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation, pp. 14\u201314. USENIX Association (2012)"},{"key":"3_CR14","volume-title":"Android Programming: Pushing the Limits","author":"E Hellman","year":"2013","unstructured":"Hellman, E.: Android Programming: Pushing the Limits. Wiley, Hoboken (2013)"},{"key":"3_CR15","unstructured":"IETF: Geographic Location Privacy, March 2016. http:\/\/datatracker.ietf.org\/wg\/geopriv\/charter\/"},{"issue":"3","key":"3_CR16","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1016\/j.clsr.2013.03.004","volume":"29","author":"K Michael","year":"2013","unstructured":"Michael, K., Clarke, R.: Location and tracking of mobile devices: \u00dcberveillance stalks the streets. Comput. Law Secur. Rev. 29(3), 216\u2013228 (2013)","journal-title":"Comput. Law Secur. Rev."},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Muslukhov, I., Boshmaf, Y., Kuo, C., Lester, J., Beznosov, K.: Understanding users\u2019 requirements for data protection in smartphones. In: IEEE International Conference on Secure Data Management on Smartphones and Mobiles, pp. 228\u2013235. IEEE (2012)","DOI":"10.1109\/ICDEW.2012.83"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Niu, B., Li, Q., Zhu, X., Cao, G., Li, H.: Enhancing privacy through caching in location-based services. In: Proceedings of IEEE INFOCOM (2015)","DOI":"10.1109\/INFOCOM.2015.7218474"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Patel, A., Palomar, E.: Privacy preservation in location-based mobile applications: research directions. In: Proceeings of IEEE International Conference on Availability, Reliability and Security (ARES), pp. 227\u2013233. IEEE (2014)","DOI":"10.1109\/ARES.2014.37"},{"key":"3_CR20","doi-asserted-by":"crossref","unstructured":"Patel, A., Palomar, E.: LP-Cach\u00e9: Privacy-aware cache model for location-based apps. In: Proceedings of the 13th International Conference on Security and Cryptography (SECRYPT), pp. 183\u2013194 (2016)","DOI":"10.5220\/0005970101830194"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Pontes, T., Vasconcelos, M., Almeida, J., Kumaraguru, P., Almeida, V.: We know where you live: privacy characterization of foursquare behavior. In: Proceedings of ACM Conference on Ubiquitous Computing, pp. 898\u2013905. ACM (2012)","DOI":"10.1145\/2370216.2370419"},{"issue":"1","key":"3_CR22","doi-asserted-by":"crossref","first-page":"38","DOI":"10.2307\/2309088","volume":"64","author":"CC Robusto","year":"1957","unstructured":"Robusto, C.C.: The cosine-haversine formula. Am. Math. Mon. 64(1), 38\u201340 (1957)","journal-title":"Am. Math. Mon."},{"key":"3_CR23","unstructured":"Samsung: smartthings. http:\/\/www.samsung.com\/uk\/smartthings\/"},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"Shklovski, I., Mainwaring, S.D., Sk\u00falad\u00f3ttir, H.H., Borgthorsson, H.: Leakiness and creepiness in app space: perceptions of privacy and mobile app use. In: Proceedings of ACM Conference on Human factors in computing systems, pp. 2347\u20132356. ACM (2014)","DOI":"10.1145\/2556288.2557421"},{"issue":"1","key":"3_CR25","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1007\/s00779-012-0633-z","volume":"18","author":"M Wernke","year":"2014","unstructured":"Wernke, M., Skvortsov, P., D\u00fcrr, F., Rothermel, K.: A classification of location privacy attacks and approaches. Pers. Ubiquit. Comput. 18(1), 163\u2013175 (2014)","journal-title":"Pers. Ubiquit. Comput."},{"key":"3_CR26","doi-asserted-by":"crossref","unstructured":"Xie, J., Knijnenburg, B.P., Jin, H.: Location sharing privacy preference: analysis and personalized recommendation. In: Proceedings of the 19th International Conference on Intelligent User Interfaces, pp. 189\u2013198. ACM (2014)","DOI":"10.1145\/2557500.2557504"},{"key":"3_CR27","doi-asserted-by":"crossref","unstructured":"Zhu, X., Chi, H., Niu, B., Zhang, W., Li, Z., Li, H.: Mobicache: when k-anonymity meets cache. In: GLOBECOM, pp. 820\u2013825. IEEE (2013)","DOI":"10.1109\/GLOCOM.2013.6831174"}],"container-title":["Lecture Notes in Computer Science","Trust, Privacy and Security in Digital Business"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-64483-7_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T18:12:32Z","timestamp":1750788752000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-64483-7_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319644820","9783319644837"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-64483-7_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}