{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T19:55:56Z","timestamp":1725998156506},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319981604"},{"type":"electronic","value":"9783319981611"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-98161-1_11","type":"book-chapter","created":{"date-parts":[[2018,10,26]],"date-time":"2018-10-26T15:59:02Z","timestamp":1540569542000},"page":"281-305","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Systems for Privacy-Preserving Mobility Data Management"],"prefix":"10.1007","author":[{"given":"Despina","family":"Kopanaki","sequence":"first","affiliation":[]},{"given":"Nikos","family":"Pelekis","sequence":"additional","affiliation":[]},{"given":"Yannis","family":"Theodoridis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,27]]},"reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Abul, O., Bonchi, F., and Nanni, M. (2008) Never walk alone: Uncertainty for anonymity in moving objects databases. In Proceedings of ICDE, pages 376\u2013385.","DOI":"10.1109\/ICDE.2008.4497446"},{"issue":"8","key":"11_CR2","doi-asserted-by":"publisher","first-page":"884","DOI":"10.1016\/j.is.2010.05.003","volume":"35","author":"O Abul","year":"2010","unstructured":"Abul, O., Bonchi, F., and Nanni, M. (2010) Anonymization of moving objects databases by clustering and perturbation. Information Systems, 35(8), pages 884\u2013910.","journal-title":"Information Systems"},{"issue":"4","key":"11_CR3","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1145\/76894.76895","volume":"21","author":"NR Adam","year":"1989","unstructured":"Adam, N.R. and Worthmann, J. C. (1989) Security-control methods for statistical databases: A comparative study. ACM Computing Surveys, 21(4), pages 515\u2013556.","journal-title":"ACM Computing Surveys"},{"key":"11_CR4","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/B978-155860869-6\/50021-4","volume-title":"VLDB '02: Proceedings of the 28th International Conference on Very Large Databases","author":"Rakesh Agrawal","year":"2002","unstructured":"Agrawal, R., Kiernan, J., Srikant, R., & Xu, Y. (2002) Hippocratic databases. In Proceedings of VLDB Endowment, pages 143\u2013154"},{"key":"11_CR5","unstructured":"Brakatsoulas, S., Pfoser, D., Salas, R. and Wenk, C. (2005) On map-matching vehicle tracking data. In Proceedings of VLDB Endowment, pages 853\u2013864."},{"issue":"2","key":"11_CR6","doi-asserted-by":"publisher","first-page":"112","DOI":"10.3138\/FM57-6770-U75U-7727","volume":"10","author":"D Douglas","year":"1973","unstructured":"Douglas, D. and Peucker, T. (1973) Algorithms for the reduction of the number of points required to represent a digitized line or its caricature. Cartographica: The International Journal for Geographic Information and Geovisualization, 10(2), pages 112\u2013122.","journal-title":"Cartographica: The International Journal for Geographic Information and Geovisualization"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Giannotti, F., Nanni, M., Pedreschi, D., and Pinelli, F. (2007) Trajectory Pattern Mining. In Proceedings of SIGKDD, pages 330\u2013339.","DOI":"10.1145\/1281192.1281230"},{"issue":"1","key":"11_CR8","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/1412734.1412739","volume":"10","author":"A Gkoulalas-Divanis","year":"2008","unstructured":"Gkoulalas-Divanis, A. and Verykios, V. S. (2008) A privacy\u2013aware trajectory tracking query engine. ACM SIGKDD Explorations Newsletter, 10(1), pages 40\u201349.","journal-title":"ACM SIGKDD Explorations Newsletter"},{"key":"11_CR9","unstructured":"Hoh, B. and Gruteser, M. (2005) Protecting location privacy through path confusion. In SECURECOMM, pages 194\u2013205."},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Hoh, B., Gruteser, M., Xiong, H. and Alrabady, A. (2007) Preserving privacy in GPS traces via uncertainty-aware path cloaking. In Proceedings of CCS, pages 161\u2013171.","DOI":"10.1145\/1315245.1315266"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Kaufman, L., Rousseeuw, P. J. (1990) Finding Groups in Data: An Introduction to Cluster Analysis. Wiley, NY, Vol. 334.","DOI":"10.1002\/9780470316801"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Lee, J. G., Han, J., and Whang, K. Y. (2007) Trajectory clustering: a partition-and-group framework. In Proceedings of SIGMOD, pages 593\u2013604.","DOI":"10.1145\/1247480.1247546"},{"key":"11_CR13","first-page":"25","volume-title":"Mondrian multidimensional k-anonymity","author":"K LeFevre","year":"2006","unstructured":"LeFevre, K., DeWitt, D. and Ramakrishnan, R. (2006) Mondrian multidimensional k-anonymity. In Proceedings of ICDE, page 25."},{"issue":"3","key":"11_CR14","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/s10844-006-9953-7","volume":"27","author":"M Nanni","year":"2006","unstructured":"Nanni, M. and Pedreschi, D. (2006) Time-focused clustering of trajectories of moving objects. Journal of Intelligent Information Systems, 27(3), pages 267\u2013289.","journal-title":"Journal of Intelligent Information Systems"},{"key":"11_CR15","unstructured":"NASA, World Wind Java SDK. URL: \nhttp:\/\/worldwind.arc.nasa.gov\/java\n\n. (accessed: 6 Oct. 2011)."},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Nergiz, M. E., Atzori, M. and Saygin, Y. (2008) Towards trajectory anonymization: A generalization-based approach. In Proceedings of the SIGSPATIAL, pages 52\u201361.","DOI":"10.1145\/1503402.1503413"},{"key":"11_CR17","unstructured":"Object Refinery, the JFreeChart project. URL: \nhttp:\/\/www.jfree.org\/jfreechart\n\n. (accessed: 6 Oct. 2011)"},{"key":"11_CR18","unstructured":"Oracle, The Swing Tutorial. URL: \nhttp:\/\/download.oracle.com\/javase\/tutorial\/uiswing\n\n. (accessed: 6 Oct. 2011)."},{"key":"11_CR19","first-page":"52","volume-title":"The DAEDALUS Framework: Progressive Querying and Mining of Movement Data","author":"R Ortale","year":"2008","unstructured":"Ortale, R., Ritacco, E., Pelekis, N., Trasarti, R., Costa, G., Giannotti, F., Manco, G., Renso, C., and Theodoridis, Y. (2008) The DAEDALUS Framework: Progressive Querying and Mining of Movement Data. In Proceedings of ACM SIGSPATIAL, page 52."},{"issue":"2","key":"11_CR20","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/s10844-011-0159-2","volume":"38","author":"N Pelekis","year":"2011","unstructured":"Pelekis, N., Andrienko, G., Andrienko, N., Kopanakis, I., Marketos, G., and Theodoridis, Y. (2011) Visually Exploring Movement Data via Similarity-based Analysis. Journal of Intelligent Information Systems, 38(2), pages 343\u2013391.","journal-title":"Journal of Intelligent Information Systems"},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"Pelekis, N., Frentzos, E., Giatrakos, N., and Theodoridis, Y. (2008) Hermes: Aggregative LBS via a trajectory DB engine. In Proceedings of SIGMOD, pages 1255\u20131258.","DOI":"10.1145\/1376616.1376748"},{"key":"11_CR22","doi-asserted-by":"crossref","unstructured":"Pelekis, N., Gkoulalas-Divanis, A., Vodas, M., Kopanaki, D., and Theodoridis, Y. (2011). Privacy-aware querying over sensitive trajectory data. In Proceedings of CIKM, pages 895\u2013904.","DOI":"10.1145\/2063576.2063706"},{"key":"11_CR23","doi-asserted-by":"crossref","unstructured":"Pelekis, N., Gkoulalas-Divanis, A., Vodas, M., Plemenos, A., Kopanaki, D., and Theodoridis, Y. (2012) Private-Hermes: A Benchmark Framework for Privacy-Preserving Mobility Data Querying and Mining Methods. In Proceedings of EDBT, pages 598\u2013601.","DOI":"10.1145\/2247596.2247675"},{"issue":"1","key":"11_CR24","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/s10115-010-0316-x","volume":"28","author":"N Pelekis","year":"2011","unstructured":"Pelekis, N., Kopanakis, I., Kotsifakos, E., Frentzos, E. and Theodoridis, Y. (2011) Clustering uncertain trajectories. Knowledge and Information Systems, 28(1), pages 117\u2013147.","journal-title":"Knowledge and Information Systems"},{"key":"11_CR25","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-642-15939-8_2","volume-title":"Machine Learning and Knowledge Discovery in Databases","author":"Nikos Pelekis","year":"2010","unstructured":"Pelekis, N., Panagiotakis, C., Kopanakis, I., and Theodoridis, Y. (2010) Unsupervised trajectory sampling. In Proceedings of ECML PKDD, pages 17\u201333."},{"key":"11_CR26","unstructured":"Pfoser, D., Jensen, C. S., and Theodoridis, Y. (2000) Novel approaches to the indexing of moving object trajectories. In Proceedings of VLDB, pages 395\u2013406."},{"issue":"6","key":"11_CR27","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P Samarati","year":"2001","unstructured":"Samarati, P. (2001) Protecting respondents\u2019 identities in microdata release. Transactions on Knowledge and Data Engineering, 13(6), pages 1010\u20131027.","journal-title":"Transactions on Knowledge and Data Engineering"},{"issue":"1","key":"11_CR28","first-page":"525","volume":"400","author":"M Steinbach","year":"2000","unstructured":"Steinbach, M., Karypis, G., Kumar, V. (2000). A comparison of document clustering techniques. In Proceedings of KDD Workshop on Text Mining, 400(1), pages 525\u2013526.","journal-title":"Proceedings of KDD Workshop on Text Mining"},{"issue":"5","key":"11_CR29","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L. (2002) k-anonymity: A model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge Based Systems, 10(5), pages 557\u2013570.","journal-title":"International Journal on Uncertainty, Fuzziness and Knowledge Based Systems"},{"key":"11_CR30","doi-asserted-by":"crossref","unstructured":"Terrovitis, M. and Mamoulis, N. (2008) Privacy preservation in the publication of trajectories. In Proceedings of Mobile Data Management, pages 65\u201372.","DOI":"10.1109\/MDM.2008.29"},{"key":"11_CR31","doi-asserted-by":"crossref","unstructured":"Wu, H., Xiang, S., Ng, W. S., Wu, W., & Xue, M. (2014) HipStream: A Privacy-Preserving System for Managing Mobility Data Streams. In Proceedings of Mobile Data Management, Vol. 1, pages 360\u2013363.","DOI":"10.1109\/MDM.2014.54"}],"container-title":["Handbook of Mobile Data Privacy"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-98161-1_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,10,26]],"date-time":"2018-10-26T16:17:35Z","timestamp":1540570655000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-98161-1_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319981604","9783319981611"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-98161-1_11","relation":{},"subject":[],"published":{"date-parts":[[2018]]}}}