{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T10:48:17Z","timestamp":1725706097371},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642346002"},{"type":"electronic","value":"9783642346019"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34601-9_12","type":"book-chapter","created":{"date-parts":[[2012,11,16]],"date-time":"2012-11-16T02:04:18Z","timestamp":1353031458000},"page":"149-165","source":"Crossref","is-referenced-by-count":9,"title":["A Clustering-Based Approach for Personalized Privacy Preserving Publication of Moving Object Trajectory Data"],"prefix":"10.1007","author":[{"given":"Samaneh","family":"Mahdavifar","sequence":"first","affiliation":[]},{"given":"Mahdi","family":"Abadi","sequence":"additional","affiliation":[]},{"given":"Mohsen","family":"Kahani","sequence":"additional","affiliation":[]},{"given":"Hassan","family":"Mahdikhani","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1007\/11535331_19","volume-title":"Advances in Spatial and Temporal Databases","author":"E. Frentzos","year":"2005","unstructured":"Frentzos, E., Gratsias, K., Pelekis, N., Theodoridis, Y.: Nearest Neighbor Search on Moving Object Trajectories. In: Medeiros, C.B., Egenhofer, M., Bertino, E. (eds.) SSTD 2005. LNCS, vol.\u00a03633, pp. 328\u2013345. Springer, Heidelberg (2005)"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Lee, J.-G., Han, J., Li, X., Gonzalez, H.: raClass: Trajectory Classification Using Hierarchical Region-based and Trajectory-based Clustering. In: Proc. of the 34th Int. Conf. on Very Large Databases (VLDB 2008), Auckland, New Zealand (2008)","DOI":"10.14778\/1453856.1453972"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Lee, J.-G., Han, J., Whang, K.-Y.: Trajectory Clustering: a Partition-and-Group Framework. In: Proc. of the ACM SIGMOD Int. Conf. on Management of Data (SIGMOD 2007), Beijing, China, pp. 593\u2013604 (2007)","DOI":"10.1145\/1247480.1247546"},{"key":"12_CR4","series-title":"SCI","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/978-3-540-69209-6_19","volume-title":"Intelligence and Security Informatics: Techniques and Applications","author":"X. Li","year":"2008","unstructured":"Li, X., Han, J., Kim, S., Gonzalez, H.: Anomaly Detection in Moving Object. In: Chen, H., Yang, C.C. (eds.) Intelligence and Security Informatics. SCI, vol.\u00a0135, pp. 357\u2013381. Springer, Heidelberg (2008)"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Pelekis, N., Kopanakis, I., Kotsifakos, E.E., Frentzos, E., Theodoridis, Y.: Clustering Trajectories of Moving Objects in an Uncertain World. In: Proc. of the 9th IEEE Int. Conf. on Data Mining (ICDM 2009), Miami, USA, pp. 417\u2013427 (2009)","DOI":"10.1109\/ICDM.2009.57"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: l-diversity: Privacy beyond k-anonymity. ACM Transactions on Knowledge Discovery from Data\u00a01(1) (2007)","DOI":"10.1145\/1217299.1217302"},{"issue":"6","key":"12_CR7","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P. Samarati","year":"2001","unstructured":"Samarati, P.: Protecting Respondents Privacy in Microdata Release. IEEE Transactions on Knowledge and Data Engineering\u00a013(6), 1010\u20131027 (2001)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"5","key":"12_CR8","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: k-Anonymity: a Model for Protecting Privacy. International Journal of Uncertainty, Fuzziness Knowledge-Based Systems\u00a010(5), 557\u2013570 (2002)","journal-title":"International Journal of Uncertainty, Fuzziness Knowledge-Based Systems"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Chen, L., \u00d6zsu, M.T., Oria, V.: Robust and Fast Similarity Search for Moving Object Trajectories. In: Proc. of the 24th ACM SIGMOD Int. Conf. on Management of Data (SIGMOD 2005), Maryland, USA, pp. 491\u2013502 (2005)","DOI":"10.1145\/1066157.1066213"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Terrovitis, M., Mamoulis, N.: Privacy Preservation in the Publication of Trajectories. In: Proc. of the 9th Int. Conf. on Mobile Data Management (MDM 2008), Beijing, China, pp. 65\u201372 (2008)","DOI":"10.1109\/MDM.2008.29"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Yarovoy, R., Bonchi, F., Lakshmanan, L.V.S., Wang, W.H.: Anonymizing Moving Objects: How to Hide a MOB in a Crowd? In: Proc. of the 12th Int. Conf. on Extending Database Technology (EDBT 2009), Saint Petersburg, Russia, pp. 72\u201383 (2009)","DOI":"10.1145\/1516360.1516370"},{"issue":"1","key":"12_CR12","first-page":"47","volume":"2","author":"E. Nergiz","year":"2009","unstructured":"Nergiz, E., Atzori, M., Saygin, Y.: Towards Trajectory Anonymization: a Generalization-Based Approach. Transactions on Data Privacy\u00a02(1), 47\u201375 (2009)","journal-title":"Transactions on Data Privacy"},{"issue":"8","key":"12_CR13","doi-asserted-by":"publisher","first-page":"884","DOI":"10.1016\/j.is.2010.05.003","volume":"35","author":"O. Abul","year":"2010","unstructured":"Abul, O., Bonchi, F., Nanni, M.: Anonymization of Moving Objects Databases by Clustering and Perturbation. Information Systems\u00a035(8), 884\u2013910 (2010)","journal-title":"Information Systems"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Abul, O., Bonchi, F., Nanni, M.: Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases. In: Proc. of the 24th IEEE Int. Conf. on Data Engineering (ICDE 2008), Cancun, Mexico, pp. 376\u2013385 (2008)","DOI":"10.1109\/ICDE.2008.4497446"},{"issue":"2","key":"12_CR15","first-page":"91","volume":"3","author":"A. Monreale","year":"2010","unstructured":"Monreale, A., Andrienko, G., Andrienko, N., Giannotti, F., Pedreschi, D., Rinzivillo, S., Wrobel, S.: Movement Data Anonymity through Generalization. Transactions on Data Privacy\u00a03(2), 91\u2013121 (2010)","journal-title":"Transactions on Data Privacy"},{"key":"12_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1007\/978-3-642-03511-1_9","volume-title":"Privacy in Location-Based Applications","author":"F. Bonchi","year":"2009","unstructured":"Bonchi, F.: Privacy Preserving Publication of Moving Object Data. In: Bettini, C., Jajodia, S., Samarati, P., Wang, X.S. (eds.) Privacy in Location-Based Applications. LNCS, vol.\u00a05599, pp. 190\u2013215. Springer, Heidelberg (2009)"},{"issue":"2","key":"12_CR17","first-page":"19","volume":"26","author":"T. Brinkhoff","year":"2003","unstructured":"Brinkhoff, T.: Generating Traffic Data. IEEE Data Engineering Bulletin\u00a026(2), 19\u201325 (2003)","journal-title":"IEEE Data Engineering Bulletin"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34601-9_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T13:00:16Z","timestamp":1620133216000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34601-9_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642346002","9783642346019"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34601-9_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}