{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T14:04:33Z","timestamp":1725890673965},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540694762"},{"type":"electronic","value":"9783540694977"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-69497-7_9","type":"book-chapter","created":{"date-parts":[[2008,8,12]],"date-time":"2008-08-12T12:07:43Z","timestamp":1218542863000},"page":"95-113","source":"Crossref","is-referenced-by-count":5,"title":["Privacy-Preserving Publication of User Locations in the Proximity of Sensitive Sites"],"prefix":"10.1007","author":[{"given":"Bharath","family":"Krishnamachari","sequence":"first","affiliation":[]},{"given":"Gabriel","family":"Ghinita","sequence":"additional","affiliation":[]},{"given":"Panos","family":"Kalnis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","unstructured":"Aggarwal, C.C.: On k-Anonymity and the Curse of Dimensionality. In: Proc. of VLDB, pp. 901\u2013909 (2005)"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Bayardo, R., Agrawal, R.: Data Privacy through Optimal k-Anonymization. In: Proc. of ICDE, pp. 217\u2013228 (2005)","DOI":"10.1109\/ICDE.2005.42"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Beckmann, N., Kriegel, H.-P., Schneider, R., Seeger, B.: The R*-Tree: An Efficient and Robust Access Method for Points and Rectangles. In: Proc. of ACM SIGMOD, pp. 322\u2013331 (1990)","DOI":"10.1145\/93597.98741"},{"key":"9_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/11552338_13","volume-title":"Secure Data Management","author":"C. Bettini","year":"2005","unstructured":"Bettini, C., SeanWang, X., Jajodia, S.: Protecting Privacy Against Location-Based Personal Identification. In: Jonker, W., Petkovi\u0107, M. (eds.) SDM 2005. LNCS, vol.\u00a03674, pp. 185\u2013199. Springer, Heidelberg (2005)"},{"key":"9_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/978-3-540-73540-3_15","volume-title":"Advances in Spatial and Temporal Databases","author":"C.-Y. Chow","year":"2007","unstructured":"Chow, C.-Y., Mokbel, M.F.: Enabling Private Continuous Queries for Revealed User Locations. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, vol.\u00a04605, pp. 258\u2013275. Springer, Heidelberg (2007)"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Gedik, B., Liu, L.: Location Privacy in Mobile Systems: A Personalized Anonymization Model. In: Proc. of ICDCS, pp. 620\u2013629 (2005)","DOI":"10.1109\/ICDCS.2005.48"},{"key":"9_CR7","unstructured":"Ghinita, G., Karras, P., Kalnis, P., Mamoulis, N.: Fast Data Anonymization with Low Information Loss. In: Proc. of VLDB, pp. 758\u2013769 (2007)"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Gruteser, M., Grunwald, D.: Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In: Proc. of USENIX MobiSys, pp. 31\u201342 (2003)","DOI":"10.1145\/1066116.1189037"},{"key":"9_CR9","unstructured":"Hu, H., Xu, J., Du, J., Ng, J.K.-Y.: Privacy-Aware Location Publishing for Moving Clients. Technical report, Hong Kong Baptist University (2007), http:\/\/www.comp.hkbu.edu.hk\/~haibo\/privacy_join.pdf"},{"issue":"12","key":"9_CR10","first-page":"1719","volume":"19","author":"P. Kalnis","year":"2007","unstructured":"Kalnis, P., Ghinita, G., Mouratidis, K., Papadias, D.: Preventing Location-Based Identity Inference in Anonymous Spatial Queries. IEEE TKDE\u00a019(12), 1719\u20131733 (2007)","journal-title":"IEEE TKDE"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Incognito: Efficient Full-Domain K-Anonymity. In: Proc. of ACM SIGMOD, pp. 49\u201360 (2005)","DOI":"10.1145\/1066157.1066164"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: l-Diversity: Privacy Beyond k-Anonymity. In: Proc. of ICDE (2006)","DOI":"10.1109\/ICDE.2006.1"},{"key":"9_CR13","unstructured":"Mokbel, M.F., Chow, C.Y., Aref, W.G.: The New Casper: Query Processing for Location Services without Compromising Privacy. In: Proc. of VLDB, pp. 763\u2013774 (2006)"},{"issue":"1","key":"9_CR14","first-page":"124","volume":"13","author":"B. Moon","year":"2001","unstructured":"Moon, B., Jagadish, H., Faloutsos, C.: Analysis of the Clustering Properties of the Hilbert Space-Filling Curve. IEEE TKDE\u00a013(1), 124\u2013141 (2001)","journal-title":"IEEE TKDE"},{"key":"9_CR15","doi-asserted-by":"publisher","first-page":"843","DOI":"10.1109\/TAC.1979.1102177","volume":"24","author":"D. Reid","year":"1979","unstructured":"Reid, D.: An algorithm for tracking multiple targets. IEEE Transactions on Automatic Control\u00a024, 843\u2013854 (1979)","journal-title":"IEEE Transactions on Automatic Control"},{"issue":"6","key":"9_CR16","first-page":"1010","volume":"13","author":"P. Samarati","year":"2001","unstructured":"Samarati, P.: Protecting Respondents\u2019 Identities in Microdata Release. IEEE TKDE\u00a013(6), 1010\u20131027 (2001)","journal-title":"IEEE TKDE"},{"issue":"5","key":"9_CR17","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: k-Anonymity: A Model for Protecting Privacy. Int. J. of Uncertainty, Fuzziness and Knowledge-Based Systems\u00a010(5), 557\u2013570 (2002)","journal-title":"Int. J. of Uncertainty, Fuzziness and Knowledge-Based Systems"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Tao, Y., Xiao, X.: Personalized Privacy Preservation. In: Proc. of ACM SIGMOD, pp. 229\u2013240 (2006)","DOI":"10.1145\/1142473.1142500"}],"container-title":["Lecture Notes in Computer Science","Scientific and Statistical Database Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-69497-7_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T00:01:03Z","timestamp":1605744063000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-69497-7_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540694762","9783540694977"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-69497-7_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}