{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T11:00:36Z","timestamp":1725706836029},"publisher-location":"Dordrecht","reference-count":30,"publisher":"Springer Netherlands","isbn-type":[{"type":"print","value":"9789400751842"},{"type":"electronic","value":"9789400751705"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-94-007-5170-5_10","type":"book-chapter","created":{"date-parts":[[2012,11,22]],"date-time":"2012-11-22T19:14:18Z","timestamp":1353611658000},"page":"223-239","source":"Crossref","is-referenced-by-count":7,"title":["Privacy Enhancing Techniques for the Protection of Mobility Patterns in LBS: Research Issues and Trends"],"prefix":"10.1007","author":[{"given":"Maria Luisa","family":"Damiani","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2012,10,12]]},"reference":[{"key":"10_CR1","unstructured":"Ardagna, Claudio, Marco Cremonini, Ernesto Damiani, Sabrina De Capitani di Vimercati, and Pierangela Samarati. 2007. Location privacy protection through obfuscation-based techniques. InProceedings of the 21st annual IFIP WG 11.3 working conference on data and applications security, Redondo Beach, July 2007."},{"key":"10_CR2","unstructured":"ARTICLE 29 Data Protection Working Party. 2011. Opinion 13\/2011 on Geolocation services on smart mobile devices.\n                  http:\/\/ec.europa.eu\/justice\/data-protection\/article-29\/documentation\/opinion-recommendation\/files\/2011\/wp185_en.pdf\n                  \n                Last visit: July 2012."},{"key":"10_CR3","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MPRV.2003.1186725","volume":"2","author":"A Beresford","year":"2003","unstructured":"Beresford, Alastair, and Frank Stajano. 2003. Location privacy in pervasive computing.IEEE Pervasive Computing 2: 46\u201355.","journal-title":"IEEE Pervasive Computing"},{"issue":"1\u20132","key":"10_CR4","doi-asserted-by":"crossref","first-page":"1009","DOI":"10.14778\/1920841.1920968","volume":"3","author":"X Cao","year":"2010","unstructured":"Cao, Xin, Gao Cong, and Christian S. Jensen. 2010. Mining significant semantic locations from GPS data.Proceedings of VLDB Endow 3(1\u20132): 1009\u20131020.","journal-title":"Proceedings of VLDB Endow"},{"issue":"1","key":"10_CR5","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1145\/2031331.2031335","volume":"13","author":"C-Y Chow","year":"2011","unstructured":"Chow, Chi-Yin, and Mohamed Mokbel. 2011. Trajectory privacy in location-based services and data publication.SIGKDD Explorations 13(1): 19\u201329.","journal-title":"SIGKDD Explorations"},{"issue":"6","key":"10_CR6","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MSECP.2003.1253568","volume":"1","author":"L Cranor","year":"2003","unstructured":"Cranor, Lorrie. 2003. P3P: Making privacy policies more useful.IEEE Security and Privacy 1(6): 50\u201355.","journal-title":"IEEE Security and Privacy"},{"issue":"2","key":"10_CR7","first-page":"55","volume":"4","author":"ML Damiani","year":"2011","unstructured":"Damiani, Maria Luisa. 2011. Third party geo-location services: Privacy requirements and research issues.Transaction on Data Privacy 4(2): 55\u201372.","journal-title":"Transaction on Data Privacy"},{"issue":"2","key":"10_CR8","first-page":"123","volume":"3","author":"ML Damiani","year":"2010","unstructured":"Damiani, Maria Luisa, Elisa Bertino, and Claudio Silvestri. 2010. The PROBE framework for the personalized cloaking of private locations.Transactions on Data Privacy 3(2): 123\u2013148.","journal-title":"Transactions on Data Privacy"},{"issue":"4","key":"10_CR9","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/MPRV.2011.18","volume":"10","author":"ML Damiani","year":"2011","unstructured":"Damiani, Maria Luisa, Claudio Silvestri, and Elisa Bertino. 2011. Fine-grained cloaking of sensitive positions in location sharing applications.IEEE Pervasive Computing 10(4): 64\u201372.","journal-title":"IEEE Pervasive Computing"},{"key":"10_CR10","unstructured":"Doty, Nick, Deirdre Mulligan, and Erik Wilde. 2010. Privacy issues of the W3C Geolocation API. Technical report, UC Berkeley, School of Information, Berkeley."},{"key":"10_CR11","unstructured":"Duckham, Matt, and Lars Kulik. 2005. A formal model of obfuscation and negotiation for location privacy. InPervasive computing. Berlin\/Heidelberg: Springer, 152\u2013170."},{"key":"10_CR110","unstructured":"Ericsson, Traffic market and data report. Nov. 2011.\n                  http:\/\/www.ericsson.com\/res\/docs\/2012\/tmd_report_feb_web.pdf\n                  \n                Last visit: July 2012."},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Ghinita, Gabriel, Panos Kalnis, and Spiros Skiadopoulos. 2007. MobiHide: A mobile peer-to-peer system for anonymous location-based queries. In SSTD, 221\u2013238, Boston.","DOI":"10.1007\/978-3-540-73540-3_13"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Ghinita, Gabriel, Panos Kalnis, Ali Khoshgozaran, Cyrus Shahabi, and Kian-Lee Tan. 2008. Private queries in location based services: Anonymizers are not necessary. InProceedings of the ACM SIGMOD international conference on management of data. Vancouver, Canada.","DOI":"10.1145\/1376616.1376631"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Ghinita, Gabriel, Maria Luisa Damiani, Claudio Silvestri, and Elisa Bertino. 2009. Preventing velocity-based linkage attacks in location-aware applications. InProceedings of the ACM international conference on advances in geographic information systems. New York: ACM.","DOI":"10.1145\/1653771.1653807"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Giannotti, Fosca, Mirco Nanni, Fabio Pinelli, and Dino Pedreschi. 2007. Trajectory pattern mining. InACM SIGKDD international conference on knowledge discovery and data mining New York: ACM.","DOI":"10.1145\/1281192.1281230"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Gruteser, Mark, and Dirk Grunwald. 2003. Anonymous usage of location-based services through spatial and temporal cloaking. InProceedings of the 1st international conference on mobile systems, application and services San Francisco.","DOI":"10.1145\/1066116.1189037"},{"issue":"1","key":"10_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1561\/1100000004","volume":"1","author":"G Iachello","year":"2007","unstructured":"Iachello, Giovanni, and Jason Hong. 2007. End-user privacy in human-computer interaction.Foundations and Trends in Human-Computer Interaction 1(1): 1\u2013137.","journal-title":"Foundations and Trends in Human-Computer Interaction"},{"key":"10_CR18","unstructured":"IETF, Request for Comments 6280. 2011. An architecture for location and location privacy in internet application.\n                  http:\/\/tools.ietf.org\/html\/rfc6280\n                  \n                . Last visit: July 2012."},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Jensen, Christian S., Hua Lu, and Man Lung Yiu. 2009. Location privacy techniques in client-server architectures. InPrivacy in location-based applications, Bettini, Claudio, Sushil Jajodia, Pierangela Samarati, and X. Sean Wang, ed. Lecture Notes in Computer Science, vol. 5599, 31\u201358. Berlin\/Heidelberg: Springer.","DOI":"10.1007\/978-3-642-03511-1_2"},{"issue":"6","key":"10_CR20","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1007\/s00779-008-0212-5","volume":"13","author":"J Krumm","year":"2009","unstructured":"Krumm, John. 2009. A survey of computational location privacy.Personal and Ubiquitous Computing 13(6): 391\u2013399.","journal-title":"Personal and Ubiquitous Computing"},{"issue":"2","key":"10_CR21","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MIC.2012.31","volume":"16","author":"P Mehra","year":"2012","unstructured":"Mehra, Pankaj. 2012. Context-aware computing: Beyond search and location-based services.IEEE Internet Computing 16(2): 12\u201316. March\u2013April, 2012.","journal-title":"IEEE Internet Computing"},{"key":"10_CR22","unstructured":"Mokbel, Mohamed, Chin-Yin Chow, and Walid Aref. 2006. The new Casper: Query processing for location services without compromising privacy. InProceedings of very large database conference. Seoul, Korea."},{"key":"10_CR23","unstructured":"Security Steering Committee on the Usability and Privacy of Computer Systems, National Research Council. 2010. Overview of security, privacy, and usability. InToward better usability, security, and privacy of information technology: Report of a workshop. Washington, D.C.: The National Academies Press."},{"key":"10_CR24","doi-asserted-by":"crossref","unstructured":"Shokri, Reza, George Theodorakopoulos, Jean-Yves Le Boudec, and Jean-Pierre Hubaux. 2011. Quantifying location privacy. InIEEE symposium on security and privacy, 247\u2013262. Oakland, CA, USA.","DOI":"10.1109\/SP.2011.18"},{"key":"10_CR25","doi-asserted-by":"crossref","unstructured":"Toch, Eran, Justin Cranshaw, Paul Hankes-Drielsma, Jay Springfield, Patrick Gage Kelley, Lorrie Cranor, Jason Hong, and Norman Sadeh. 2010. Locaccino: A privacy-centric location sharing application. InProceedings of the 12th ACM international conference on Ubiquitous computing. Copenhagen, Denmark.","DOI":"10.1145\/1864431.1864446"},{"key":"10_CR26","doi-asserted-by":"crossref","unstructured":"Tsaj, Janice, et al. 2009. Who\u2019s viewed you?: The impact of feedback in a mobile location-sharing application. InProceedings of the 27th international conference on human factors in computing systems (CHI \u201909). Boston, USA.","DOI":"10.1145\/1518701.1519005"},{"issue":"3","key":"10_CR27","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MIC.2011.29","volume":"15","author":"CR Vicente","year":"2011","unstructured":"Vicente, Carmen Ruiz, Dario Freni, Claudio Bettini, and Christian Jensen. 2011. Location-related privacy in geo-social networks.IEEE Internet Computing 15(3): 20\u201327.","journal-title":"IEEE Internet Computing"},{"key":"10_CR28","doi-asserted-by":"crossref","unstructured":"Ygitoglu, Emre, Maria Luisa Damiani, Osman Abul, and Claudio Silvestri. 2012. Privacy-preserving sharing of sensitive semantic locations under road constraints. InIEEE international conference on mobile data management, July 2012. Bengalore, India.","DOI":"10.1109\/MDM.2012.48"},{"key":"10_CR29","doi-asserted-by":"crossref","unstructured":"Yiu, Man Lung, Christian S. Jensen, Xuegang Huang, and Hua Lu. 2008. SpaceTwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services. InProceedings of the IEEE 24th international conference on data engineering (ICDE \u201808). Cancun, Mexico.","DOI":"10.1109\/ICDE.2008.4497445"}],"container-title":["European Data Protection: Coming of Age"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-94-007-5170-5_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,25]],"date-time":"2020-11-25T14:42:46Z","timestamp":1606315366000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-94-007-5170-5_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10,12]]},"ISBN":["9789400751842","9789400751705"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-94-007-5170-5_10","relation":{},"subject":[],"published":{"date-parts":[[2012,10,12]]}}}