{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T17:40:14Z","timestamp":1743183614453,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":38,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642309724"},{"type":"electronic","value":"9783642309731"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-30973-1_13","type":"book-chapter","created":{"date-parts":[[2012,5,23]],"date-time":"2012-05-23T15:32:31Z","timestamp":1337787151000},"page":"150-161","source":"Crossref","is-referenced-by-count":3,"title":["Towards a New Classification of Location Privacy Methods in Pervasive Computing"],"prefix":"10.1007","author":[{"given":"Mads Schaarup","family":"Andersen","sequence":"first","affiliation":[]},{"given":"Mikkel Baun","family":"Kj\u00e6rgaard","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1007\/s00779-004-0305-8","volume":"8","author":"M.S. Ackerman","year":"2004","unstructured":"Ackerman, M.S.: Privacy in pervasive environments: next generation labeling protocols. Personal Ubiquitous Comput.\u00a08, 430\u2013439 (2004)","journal-title":"Personal Ubiquitous Comput."},{"unstructured":"Al-Muhtadi, J., Campbell, R., Kapadia, A., Mickunas, M.D., Yi, S.: Routing through the mist: privacy preserving communication in ubiquitous computing environments. In: Proc. 22nd Int. Conference on Distributed Computing Systems, 2002, pp. 74\u201383 (2002)","key":"13_CR2"},{"unstructured":"Andersen, M.S.: On limitations of existing methods for location privacy. In: 3rd International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use (2011)","key":"13_CR3"},{"key":"13_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/978-3-540-73538-0_4","volume-title":"Data and Applications Security XXI","author":"C.A. Ardagna","year":"2007","unstructured":"Ardagna, C.A., Cremonini, M., Damiani, E., De Capitani di Vimercati, S., Samarati, P.: Location Privacy Protection Through Obfuscation-Based Techniques. In: Barker, S., Ahn, G.-J. (eds.) Data and Applications Security 2007. LNCS, vol.\u00a04602, pp. 47\u201360. Springer, Heidelberg (2007)"},{"key":"13_CR5","first-page":"77","volume-title":"Proc. of the 3rd conf. on European Conference on Computer-Supported Cooperative Work","author":"V. Bellotti","year":"1993","unstructured":"Bellotti, V., Sellen, A.: Design for privacy in ubiquitous computing environments. In: Proc. of the 3rd conf. on European Conference on Computer-Supported Cooperative Work, pp. 77\u201392. Kluwer Academic Publishers, Norwell (1993)"},{"issue":"1","key":"13_CR6","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MPRV.2003.1186725","volume":"2","author":"A.R. Beresford","year":"2003","unstructured":"Beresford, A.R., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Computing\u00a02(1), 46\u201355 (2003)","journal-title":"IEEE Pervasive Computing"},{"doi-asserted-by":"crossref","unstructured":"Cheng, R., Zhang, Y., Bertino, E., Prabhakar, S.: Preserving user location privacy in mobile data management infrastructures (2006)","key":"13_CR7","DOI":"10.1007\/11957454_23"},{"doi-asserted-by":"crossref","unstructured":"Christin, D., Reinhardt, A., Kanhere, S., Hollick, M.: A survey on privacy in mobile participatory sensing applications. Journal of Systems and Software (2011) (in Press) (accepted manuscript)","key":"13_CR8","DOI":"10.1016\/j.jss.2011.06.073"},{"key":"13_CR9","first-page":"211","volume-title":"Proc. of the 6th Int. Conf. on Mobile Systems, Applications, and Services, MobiSys 2008","author":"C. Cornelius","year":"2008","unstructured":"Cornelius, C., Kapadia, A., Kotz, D., Peebles, D., Shin, M., Triandopoulos, N.: Anonysense: privacy-aware people-centric sensing. In: Proc. of the 6th Int. Conf. on Mobile Systems, Applications, and Services, MobiSys 2008, pp. 211\u2013224. ACM, New York (2008)"},{"doi-asserted-by":"crossref","unstructured":"Cornwell, J., Fette, I., Hsieh, G., Prabaker, M., Rao, J., Tang, K., Vaniea, K., Bauer, L., Cranor, L., Hong, J., McLaren, B., Reiter, M., Sadeh, N.: User-controllable security and privacy for pervasive computing. In: Proc. of the 8th IEEE Workshop on Mobile Computing Systems and Applications (2007)","key":"13_CR10","DOI":"10.1109\/WMCSA.2007.4389552"},{"key":"13_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/11748625_9","volume-title":"Pervasive Computing","author":"V. Coroama","year":"2006","unstructured":"Coroama, V.: The Smart Tachograph \u2013 Individual Accounting of Traffic Costs and Its Implications. In: Fishkin, K.P., Schiele, B., Nixon, P., Quigley, A. (eds.) PERVASIVE 2006. LNCS, vol.\u00a03968, pp. 135\u2013152. Springer, Heidelberg (2006)"},{"unstructured":"Duckham, M., Kulik, L.: In: Drummond, J. (ed.) Dynamic & mobile GIS: investigating change in space and time. CRC (2006)","key":"13_CR12"},{"key":"13_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/11428572_10","volume-title":"Pervasive Computing","author":"M. Duckham","year":"2005","unstructured":"Duckham, M., Kulik, L.: A Formal Model of Obfuscation and Negotiation for Location Privacy. In: Gellersen, H.-W., Want, R., Schmidt, A. (eds.) PERVASIVE 2005. LNCS, vol.\u00a03468, pp. 152\u2013170. Springer, Heidelberg (2005)"},{"doi-asserted-by":"crossref","unstructured":"Gedik, B., Liu, L.: Location privacy in mobile systems: A personalized anonymization model. In: Proc. of the 25th IEEE Int. Conf on Distributed Computing Systems, pp. 620\u2013629 (2005)","key":"13_CR14","DOI":"10.1109\/ICDCS.2005.48"},{"unstructured":"Gedik, B., Liu, L.: A customizable k-anonymity model for protecting location privacy. In: ICDCS, pp. 620\u2013629 (2004)","key":"13_CR15"},{"doi-asserted-by":"crossref","unstructured":"Gidofalvi, G., Huang, X., Pedersen, T.B.: Privacy-preserving data mining on moving object trajectories. In: 2007 Int. Conf. on Mobile Data Management (2007)","key":"13_CR16","DOI":"10.1109\/MDM.2007.18"},{"key":"13_CR17","first-page":"31","volume-title":"Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, MobiSys 2003","author":"M. Gruteser","year":"2003","unstructured":"Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, MobiSys 2003, pp. 31\u201342. ACM, New York (2003)"},{"unstructured":"Gruteser, M., Schelle, G., Jain, A., Han, R., Grunwald, D.: Privacy-aware location sensor networks. In: Proc. of the 9th Conf. on Hot Topics in Operating Systems, vol.\u00a09 (2003)","key":"13_CR18"},{"issue":"4","key":"13_CR19","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MPRV.2006.69","volume":"5","author":"B. Hoh","year":"2006","unstructured":"Hoh, B., Gruteser, M., Xiong, H., Alrabady, A.: Enhancing security and privacy in traffic-monitoring systems. IEEE Pervasive Computing\u00a05(4), 38\u201346 (2006)","journal-title":"IEEE Pervasive Computing"},{"unstructured":"Hoh, B., Gruteser, M.: Protecting location privacy through path confusion. In: 1st Int. Conf. on Security and Privacy for Emerging Areas in Communications Networks (2005)","key":"13_CR20"},{"doi-asserted-by":"crossref","unstructured":"Hong, D., Yuan, M., Shen, V.Y.: Dynamic privacy management: a plug-in service for the middleware in pervasive computing. In: Proc. of the 7th Int. Conf. on Human Computer Interaction with Mobile Devices & Services (2005)","key":"13_CR21","DOI":"10.1145\/1085777.1085779"},{"key":"13_CR22","first-page":"177","volume-title":"Proceedings of the 2nd International Conference on Mobile Systems, Applications, and Services, MobiSys 2004","author":"J.I. Hong","year":"2004","unstructured":"Hong, J.I., Landay, J.A.: An architecture for privacy-sensitive ubiquitous computing. In: Proceedings of the 2nd International Conference on Mobile Systems, Applications, and Services, MobiSys 2004, pp. 177\u2013189. ACM, New York (2004)"},{"key":"13_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/978-3-540-73540-3_14","volume-title":"Advances in Spatial and Temporal Databases","author":"A. Khoshgozaran","year":"2007","unstructured":"Khoshgozaran, A., Shahabi, C.: Blind Evaluation of Nearest Neighbor Queries Using Space Transformation to Preserve Location Privacy. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, vol.\u00a04605, pp. 239\u2013257. Springer, Heidelberg (2007)"},{"key":"13_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/978-3-540-72037-9_8","volume-title":"Pervasive Computing","author":"J. Krumm","year":"2007","unstructured":"Krumm, J.: Inference Attacks on Location Tracks. In: LaMarca, A., Langheinrich, M., Truong, K.N. (eds.) Pervasive 2007. LNCS, vol.\u00a04480, pp. 127\u2013143. Springer, Heidelberg (2007)"},{"key":"13_CR25","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1007\/s00779-008-0212-5","volume":"13","author":"J. Krumm","year":"2009","unstructured":"Krumm, J.: A survey of computational location privacy. Personal Ubiquitous Comput.\u00a013, 391\u2013399 (2009)","journal-title":"Personal Ubiquitous Comput."},{"key":"13_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/3-540-45427-6_23","volume-title":"Ubicomp 2001: Ubiquitous Computing","author":"M. Langheinrich","year":"2001","unstructured":"Langheinrich, M.: Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol.\u00a02201, pp. 273\u2013291. Springer, Heidelberg (2001)"},{"doi-asserted-by":"crossref","unstructured":"Mascetti, S., Bettini, C., Freni, D., Sean Wang, X., Jajodia, S.: Privacy-aware proximity based services. In: Proc. of the 10th Int. Conf. on Mobile Data Management: Systems, Services and Middleware (2009)","key":"13_CR27","DOI":"10.1109\/MDM.2009.14"},{"doi-asserted-by":"crossref","unstructured":"Mehta, K., Liu, D., Wright, M.: Location privacy in sensor networks against a global eavesdropper. In: IEEE Int. Conf. on Network Protocols (2007)","key":"13_CR28","DOI":"10.1109\/ICNP.2007.4375862"},{"doi-asserted-by":"crossref","unstructured":"Meyerowitz, J., Choudhury, R.R.: Hiding stars with fireworks: location privacy through camouflage. In: Proc. of the 15th Annual Int. Conf. on Mobile Computing and Networking (2009)","key":"13_CR29","DOI":"10.1145\/1614320.1614358"},{"unstructured":"Mokbel, M.F., Chow, C.-Y., Aref, W.G.: The new casper: query processing for location services without compromising privacy. In: Proc. of the 32nd Int. Conf. on Very Large Data Bases (2006)","key":"13_CR30"},{"unstructured":"Mun, M., Reddy, S., Shilton, K., Yau, N., Burke, J., Estrin, D., Hansen, M., Howard, E., West, R., Boda, P.: Peir, the personal environmental impact report, as a platform for participatory sensing systems research. In: Proc. of the 7th Int. Conf. on Mobile Systems, Applications, and Services","key":"13_CR31"},{"key":"13_CR32","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MPRV.2003.1186726","volume":"2","author":"G. Myles","year":"2003","unstructured":"Myles, G., Friday, A., Davies, N.: Preserving privacy in environments with location-based applications. IEEE Pervasive Computing\u00a02, 56\u201364 (2003)","journal-title":"IEEE Pervasive Computing"},{"key":"13_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44702-4_1","volume-title":"Designing Privacy Enhancing Technologies","author":"A. Pfitzmann","year":"2001","unstructured":"Pfitzmann, A., K\u00f6hntopp, M.: Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology. In: Federrath, H. (ed.) Anonymity 2000. LNCS, vol.\u00a02009, pp. 1\u20139. Springer, Heidelberg (2001)"},{"unstructured":"Scipioni, M.P., Langheinrich, M.: I\u2019m here! privacy challenges in mobile location sharing. In: 2nd Int. Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use (2010)","key":"13_CR34"},{"doi-asserted-by":"crossref","unstructured":"Tang, K.P., Keyani, P., Fogarty, J., Hong, J.I.: Putting people in their place: an anonymous and privacy-sensitive approach to collecting sensed data in location-based applications. In: Proc. of the SIGCHI Conf. on Human Factors in Computing Systems (2006)","key":"13_CR35","DOI":"10.1145\/1124772.1124788"},{"doi-asserted-by":"crossref","unstructured":"Yiu, M.L., Jensen, C.S., Huang, X., Lu, H.: Spacetwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services. In: IEEE 24th Int. Conf. on Data Engineering (2008)","key":"13_CR36","DOI":"10.1109\/ICDE.2008.4497445"},{"unstructured":"Zhi, Z., Choong, Y.K.: Anonymizing geographic ad hoc routing for preserving location privacy. In: 25th IEEE Int. Conf. on Distributed Computing Systems Workshops (2005)","key":"13_CR37"},{"key":"13_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/978-3-540-75551-7_5","volume-title":"Privacy Enhancing Technologies","author":"G. Zhong","year":"2007","unstructured":"Zhong, G., Goldberg, I., Hengartner, U.: Louis, Lester and Pierre: Three Protocols for Location Privacy. In: Borisov, N., Golle, P. (eds.) PET 2007. LNCS, vol.\u00a04776, pp. 62\u201376. Springer, Heidelberg (2007)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Mobile and Ubiquitous Systems: Computing, Networking, and Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30973-1_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T17:16:26Z","timestamp":1743182186000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-30973-1_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642309724","9783642309731"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30973-1_13","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2012]]}}}