{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T09:45:38Z","timestamp":1725529538230},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642007293"},{"type":"electronic","value":"9783642007309"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-00730-9_8","type":"book-chapter","created":{"date-parts":[[2009,3,17]],"date-time":"2009-03-17T07:22:23Z","timestamp":1237274543000},"page":"116-133","source":"Crossref","is-referenced-by-count":3,"title":["Protecting Location Privacy through a Graph-Based Location Representation and a Robust Obfuscation Technique"],"prefix":"10.1007","author":[{"given":"Jafar Haadi","family":"Jafarian","sequence":"first","affiliation":[]},{"given":"Ali Noorollahi","family":"Ravari","sequence":"additional","affiliation":[]},{"given":"Morteza","family":"Amini","sequence":"additional","affiliation":[]},{"given":"Rasool","family":"Jalili","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","first-page":"35","volume-title":"Dynamic & Mobile GIS: Investigating Change in Space and Time","author":"M. Duckham","year":"2006","unstructured":"Duckham, M., Kulik, L.: Location privacy and location-aware computing. In: Dynamic & Mobile GIS: Investigating Change in Space and Time, pp. 35\u201351. CRC Press, Boca Raton (2006)"},{"key":"8_CR2","unstructured":"Krumm, J.: A survey of computational location privacy. In: Workshop On Ubicomp Privacy Technologies, Innsbruck, Austria (2007)"},{"key":"8_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/11428572_10","volume-title":"Pervasive Computing","author":"M. Duckham","year":"2005","unstructured":"Duckham, M., Kulik, L.: A formal model of obfuscation and negotiation for location privacy. In: Gellersen, H.-W., Want, R., Schmidt, A. (eds.) PERVASIVE 2005. LNCS, vol.\u00a03468, pp. 152\u2013170. Springer, Heidelberg (2005)"},{"key":"8_CR4","first-page":"531","volume-title":"Handbook of database security: Applications and trends","author":"C. Ardagna","year":"2007","unstructured":"Ardagna, C., Cremonini, M., Vimercati, S.D.C.d., Samarati, P.: Privacy-enhanced location-based access control. In: Gertz, M., Jajodia, S. (eds.) Handbook of database security: Applications and trends, pp. 531\u2013552. Springer, Heidelberg (2007)"},{"key":"8_CR5","first-page":"127","volume-title":"2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW 2004)","author":"A.R. Beresford","year":"2004","unstructured":"Beresford, A.R., Stajano, F.: Mix zones: User privacy in location-aware services. In: 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW 2004), pp. 127\u2013131. IEEE Computer Society Press, Los Alamitos (2004)"},{"key":"8_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/11552338_13","volume-title":"Secure Data Management","author":"C. Bettini","year":"2005","unstructured":"Bettini, C., Wang, X.S., Jajodia, S.: Protecting privacy against location-based personal identification. In: Jonker, W., Petkovi\u0107, M. (eds.) SDM 2005. LNCS, vol.\u00a03674, pp. 185\u2013199. Springer, Heidelberg (2005)"},{"key":"8_CR7","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1145\/1066116.1189037","volume-title":"1st International Conference on Mobile Systems, Applications, and Services","author":"M. Gruteser","year":"2003","unstructured":"Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: 1st International Conference on Mobile Systems, Applications, and Services, pp. 31\u201342. ACM, New York (2003)"},{"key":"8_CR8","unstructured":"Hauser, C., Kabatnik, M.: Towards privacy support in a global location service. In: Workshop on IP and ATM Traffic Management (WATM\/EUNICE 2001), Paris, France, pp. 81\u201389 (2001)"},{"key":"8_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/3-540-45809-3_19","volume-title":"UbiComp 2002: Ubiquitous Computing","author":"M. Langheinrich","year":"2002","unstructured":"Langheinrich, M.: A privacy awareness system for ubiquitous computing environments. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol.\u00a02498, pp. 237\u2013245. Springer, Heidelberg (2002)"},{"key":"8_CR10","unstructured":"Openwave: Openwave location manager (2006), http:\/\/www.openwave.com"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Bellavista, P., Corradi, A., Giannelli, C.: Efficiently managing location information with privacy requirements in wi-fi networks: a middleware approach. In: 2nd International Symposium on Wireless Communication Systems (ISWCS 2005), Siena, Italy, pp. 91\u201395 (2005)","DOI":"10.1109\/ISWCS.2005.1547662"},{"key":"8_CR12","first-page":"212","volume-title":"ACM Symposium on Information, Computer and Communications Security (ASIACCS 2006)","author":"C. Ardagna","year":"2006","unstructured":"Ardagna, C., Cremonini, M., Damiani, E., Vimercati, S.D.C.d., Samarati, P.: Supporting location-based conditions in access control policies. In: ACM Symposium on Information, Computer and Communications Security (ASIACCS 2006), Taipei, Taiwan, pp. 212\u2013222. ACM Press, New York (2006)"},{"key":"8_CR13","first-page":"7","volume-title":"Second IEEE International Symposium on Pervasive Computing and Ad Hoc Communications (PCAC 2007)","author":"C. Ardagna","year":"2007","unstructured":"Ardagna, C., Cremonini, M., Damiani, E., Vimercati, S.D.C.d., Samarati, P.: Managing privacy in lbac systems. In: Second IEEE International Symposium on Pervasive Computing and Ad Hoc Communications (PCAC 2007), Niagara Falls, Canada, pp. 7\u201312. IEEE Computer Society, Los Alamitos (2007)"},{"key":"8_CR14","first-page":"313","volume-title":"22nd IFIP TC-11 International Information Security Conference (SEC 2007)","author":"C. Ardagna","year":"2007","unstructured":"Ardagna, C., Cremonini, M., Damiani, E., Vimercati, S.D.C.d., Samarati, P.: A middleware architecture for integrating privacy preferences and location accuracy. In: 22nd IFIP TC-11 International Information Security Conference (SEC 2007), Sandton, South Africa, vol.\u00a0232, pp. 313\u2013324. Springer, Heidelberg (2007)"},{"key":"8_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/978-3-540-73538-0_4","volume-title":"Data and Applications Security XXI","author":"C.A. Ardagna","year":"2007","unstructured":"Ardagna, C.A., Cremonini, M., Damiani, E., De Capitani di Vimercati, S., Samarati, P.: Location privacy protection through obfuscation-based techniques. In: Barker, S., Ahn, G.-J. (eds.) Data and Applications Security 2007. LNCS, vol.\u00a04602, pp. 47\u201360. Springer, Heidelberg (2007)"},{"key":"8_CR16","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MPRV.2003.1186725","volume":"2","author":"A. Beresford","year":"2003","unstructured":"Beresford, A., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Computing\u00a02, 46\u201355 (2003)","journal-title":"IEEE Pervasive Computing"},{"key":"8_CR17","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/S0198-9715(00)00040-5","volume":"25","author":"M. Duckham","year":"2001","unstructured":"Duckham, M., Mason, K., Stell, J., Worboys, M.: A formal approach to imperfection in geographic information. Computers, Environment and Urban Systems\u00a025, 89\u2013103 (2001)","journal-title":"Computers, Environment and Urban Systems"},{"key":"8_CR18","unstructured":"Mokbel, M., Chow, C.Y., Aref, W.: The new casper: Query processing for location services without compromising privacy. In: 32nd International Conference on Very Large Data Bases, Korea, pp. 763\u2013774 (2006)"},{"key":"8_CR19","first-page":"12","volume":"22","author":"G. Sun","year":"2005","unstructured":"Sun, G., Chen, J., Guo, W., Liu, K.R.: Signal processing techniques in network-aided positioning: A survey of state-of-the-art positioning designs. IEEE Signal Processing Magazine\u00a022, 12\u201323 (2005)","journal-title":"IEEE Signal Processing Magazine"},{"key":"8_CR20","unstructured":"Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Dynamic programming. In: Introduction to Algorithms, 2nd edn., pp. 323\u2013370 (2001)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology \u2013 ICISC 2008"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-00730-9_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,24]],"date-time":"2023-05-24T09:34:29Z","timestamp":1684920869000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-00730-9_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642007293","9783642007309"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-00730-9_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}