{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:25:42Z","timestamp":1725517542920},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540856535"},{"type":"electronic","value":"9783540856542"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-85654-2_6","type":"book-chapter","created":{"date-parts":[[2008,8,27]],"date-time":"2008-08-27T07:30:03Z","timestamp":1219822203000},"page":"49-56","source":"Crossref","is-referenced-by-count":14,"title":["A Free Terrain Model for Trajectory K\u2013Anonymity"],"prefix":"10.1007","author":[{"given":"Aris","family":"Gkoulalas-Divanis","sequence":"first","affiliation":[]},{"given":"Vassilios S.","family":"Verykios","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Gid\u00f3falvi, G., Pedersen, T.B.: Mining long, sharable patterns in trajectories of moving objects. In: Third Workshop on Spatio-Temporal Database Management (2006)","DOI":"10.1007\/s10707-007-0042-z"},{"key":"6_CR2","unstructured":"Agrawal, R., Srikant, R.: Fast algorithms for mining association rules in large databases. In: 20th International Conference on Very Large Databases, pp. 487\u2013499 (1994)"},{"key":"6_CR3","unstructured":"Jensen, C.S., Lahrmann, H., Pakalnis, S., Runge, J.: The INFATI data. Time Center TR-79 (2004), http:\/\/www.cs.aau.dk\/TimeCenter"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: First International Conference on Mobile Systems, Applications, and Services, pp. 31\u201342 (2003)","DOI":"10.1145\/1066116.1189037"},{"key":"6_CR5","unstructured":"Gedik, B., Liu, L.: A customizable K-anonymity model for protecting location privacy. Technical report, Georgia Institute of Technology (April 2004)"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Bettini, C., Wang, X.S., Jajodia, S.: Protecting privacy against location-based personal identification. In: Second VLDB Workshop on Secure Data Management, pp. 185\u2013199 (2005)","DOI":"10.1007\/11552338_13"},{"key":"6_CR7","unstructured":"Mokbel, M.F., Chow, C.Y., Aref, W.G.: The new casper: query processing for location services without compromising privacy. In: 32nd International Conference on Very Large Data Bases, pp. 763\u2013774 (2006)"}],"container-title":["Lecture Notes in Computer Science","Database and Expert Systems Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-85654-2_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:33:39Z","timestamp":1606185219000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-85654-2_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540856535","9783540856542"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-85654-2_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}