{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T14:11:18Z","timestamp":1725718278483},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642368172"},{"type":"electronic","value":"9783642368189"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-36818-9_12","type":"book-chapter","created":{"date-parts":[[2013,3,4]],"date-time":"2013-03-04T11:14:54Z","timestamp":1362395694000},"page":"111-120","source":"Crossref","is-referenced-by-count":3,"title":["Semantic-Aware Obfuscation for Location Privacy at Database Level"],"prefix":"10.1007","author":[{"given":"Thu Thi Bao","family":"Le","sequence":"first","affiliation":[]},{"given":"Tran Khanh","family":"Dang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","unstructured":"Ardagna, C.A., Cremonini, M., Vimercati, S.D.C., Samarati, P.: An Obfuscation-based Approach for Protecting Location Privacy. IEEE Transactions on Dependable and Secure Computing (2009)"},{"key":"12_CR2","unstructured":"Mohamed, F.M.: Privacy in Location-based Services: State-of-the-art and Research Directions. In: 8th International Conference on Mobile Data Management, Germany (2007)"},{"key":"12_CR3","unstructured":"Damiani, M.L., Bertino, E., Silvestri, C.: Protecting Location Privacy through Semantics-aware Obfuscation Techniques. In: IFIP Int. Federation for Information Processing (2008)"},{"key":"12_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/11428572_10","volume-title":"Pervasive Computing","author":"M. Duckham","year":"2005","unstructured":"Duckham, M., Kulik, L.: A Formal Model of Obfuscation and Negotiation for Location Privacy. In: Gellersen, H.-W., Want, R., Schmidt, A. (eds.) PERVASIVE 2005. LNCS, vol.\u00a03468, pp. 152\u2013170. Springer, Heidelberg (2005)"},{"issue":"3","key":"12_CR5","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1007\/s00778-006-0013-2","volume":"17","author":"M.L. Yiu","year":"2008","unstructured":"Yiu, M.L., Tao, Y., Mamoulis, N.: The Bdual-Tree: Indexing Moving Objects by Space-Filling Curves in the Dual Space. VLDB Journal\u00a017(3), 379\u2013400 (2008)","journal-title":"VLDB Journal"},{"key":"12_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/978-3-642-20039-7_11","volume-title":"Intelligent Information and Database Systems","author":"Q.C. To","year":"2011","unstructured":"To, Q.C., Dang, T.K., K\u00fcng, J.: Bob-Tree: An Efficient B\u2009+\u2009-Tree Based Index Structure for Geographic-Aware Obfuscation. In: Nguyen, N.T., Kim, C.-G., Janiak, A. (eds.) ACIIDS 2011, Part I. LNCS, vol.\u00a06591, pp. 109\u2013118. Springer, Heidelberg (2011)"},{"key":"12_CR7","unstructured":"Dang, T.K., Thoai, N., To, Q.C., Phan, T.N.: A database-centric approach to privacy protection in location-based applications. In: RCICT, Lao PDR, pp. 65\u201371 (March 2011)"},{"issue":"1","key":"12_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TMC.2007.1062","volume":"7","author":"B. Gedik","year":"2008","unstructured":"Gedik, B., Liu, L.: Protecting Location Privacy with Personalized k- Anonymity. IEEE Transactions on Mobile Computing\u00a07(1), 1\u201318 (2008)","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Kupper, A.: Location-based Services-Fundamentals and Operation (2005)","DOI":"10.1002\/0470092335"},{"key":"12_CR10","series-title":"SCI","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/978-3-642-12090-9_12","volume-title":"Adv. in Intelligent Inform. and Database Systems","author":"A.T. Truong","year":"2010","unstructured":"Truong, A.T., Truong, Q.C., Dang, T.K.: An Adaptive Grid-Based Approach to Location Privacy Preservation. In: Nguyen, N.T., Katarzyniak, R., Chen, S.-M. (eds.) Adv. in Intelligent Inform. and Database Systems. SCI, vol.\u00a0283, pp. 133\u2013144. Springer, Heidelberg (2010)"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Ardagna, C.A., Cremonini, M., Vimercati, S.D.C., Samarati, P.: Privacy-enhanced Location-based Access Control. In: Handbook of Database Security-Applications and Trends, pp. 531\u2013552. Springer (2008)","DOI":"10.1007\/978-0-387-48533-1_22"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"To, Q.C., Dang, T.K., K\u00fcng, J.: A Hilbert-based Framework for Preserving Privacy in Location-based Services. Int. Journal of Intelligent Information and Database Systems (2013) ISSN 1751-5858","DOI":"10.1504\/IJIIDS.2013.053546"},{"key":"12_CR13","series-title":"LNAI","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1007\/978-3-642-34630-9_13","volume-title":"Computational Collective Intelligence. Technologies and Applications","author":"T.N. Phan","year":"2012","unstructured":"Phan, T.N., Dang, T.K.: A Novel Trajectory Privacy-Preserving Future Time Index Structure in Moving Object Databases. In: Nguyen, N.-T., Hoang, K., J\u0119drzejowicz, P. (eds.) ICCCI 2012, Part I. LNCS (LNAI), vol.\u00a07653, pp. 124\u2013134. Springer, Heidelberg (2012)"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Verykios, V.S., Damiani, M.L., GkoulalasDivanis, A.: Privacy and Security in Spatiotemporal Data and Trajectories. In: Mobility, Data Mining and Privacy: Geographic Knowledge Discovery, ch. 8, pp. 213\u2013240. Springer (2008)","DOI":"10.1007\/978-3-540-75177-9_9"},{"key":"12_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1007\/978-3-642-36818-9_11","volume-title":"ICT-EurAsia 2013","author":"C.N. Ngo","year":"2013","unstructured":"Ngo, C.N., Dang, T.K.: On Efficient Processing of Complicated Cloaked Region for Location Privacy Aware Nearest-Neighbor Queries. In: Mustofa, K., Neunold, E., Tjoa, A M., Weippl, E., You, I. (eds.) ICT-EurAsia 2013. LNCS, vol.\u00a07804, pp. 101\u2013110. Springer, Heidelberg (2013)"},{"key":"12_CR16","volume-title":"ACM ICUIMC 2012","author":"T.K. Dang","year":"2012","unstructured":"Dang, T.K., Ngo, C.N., Phan, T.N., Ngo, N.N.M.: An Open Design Privacy-enhancing Platform Supporting Location-based Applications. In: ACM ICUIMC 2012. Springer, Kuala Lumpur (2012)"},{"key":"12_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1007\/978-3-642-23088-2_20","volume-title":"Database and Expert Systems Applications","author":"A.T. Truong","year":"2011","unstructured":"Truong, A.T., Dang, T.K., K\u00fcng, J.: On Guaranteeing k-Anonymity in Location Databases. In: Hameurlain, A., Liddle, S.W., Schewe, K.-D., Zhou, X. (eds.) DEXA 2011, Part I. LNCS, vol.\u00a06860, pp. 280\u2013287. Springer, Heidelberg (2011)"},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"Dang, T.K., Truong, A.T.: Anonymizing but Deteriorating Location Databases. Int. Research Journal of Computer Science and Computer Engineering with Applications (POLIBITS)\u00a0(46), 73\u201381 (2012) ISSN 1870-9044","DOI":"10.17562\/PB-46-9"},{"issue":"4","key":"12_CR19","doi-asserted-by":"publisher","first-page":"65","DOI":"10.4018\/jmcmc.2010100104","volume":"2","author":"Q.C. Truong","year":"2010","unstructured":"Truong, Q.C., Truong, A.T., Dang, T.K.: The Memorizing Algorithm: Protecting User Privacy in Location-Based Services using Historical Services Information. Int. Journal of Mobile Computing and Multimedia Communications (a slected paper of MoMM 2009)\u00a02(4), 65\u201386 (2010)","journal-title":"Int. Journal of Mobile Computing and Multimedia Communications (a slected paper of MoMM 2009)"}],"container-title":["Lecture Notes in Computer Science","Information and Communicatiaon Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-36818-9_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,11]],"date-time":"2019-05-11T10:01:32Z","timestamp":1557568892000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-36818-9_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642368172","9783642368189"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-36818-9_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}