{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,7,25]],"date-time":"2023-07-25T09:20:10Z","timestamp":1690276810477},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,10,18]],"date-time":"2013-10-18T00:00:00Z","timestamp":1382054400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Geoinformatica"],"published-print":{"date-parts":[[2014,1]]},"DOI":"10.1007\/s10707-013-0192-0","type":"journal-article","created":{"date-parts":[[2013,10,17]],"date-time":"2013-10-17T03:09:41Z","timestamp":1381979381000},"page":"95-133","source":"Crossref","is-referenced-by-count":12,"title":["Protecting query privacy in location-based services"],"prefix":"10.1007","volume":"18","author":[{"given":"Xihui","family":"Chen","sequence":"first","affiliation":[]},{"given":"Jun","family":"Pang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,10,18]]},"reference":[{"key":"192_CR1","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1037\/1076-898X.6.2.130","volume":"6","author":"D Ariely","year":"2000","unstructured":"Ariely D, Au WT, Bender RH, Budescu DV, Dietz CB, Gu H, Wallsten TS, Zauberman G (2000) The effects of averaging subjective probability estimates between and within judges. J Exp Psychol Appl 6:130\u2013147","journal-title":"J Exp Psychol Appl"},{"issue":"2","key":"192_CR2","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1109\/MPRV.2008.34","volume":"7","author":"P Bellavista","year":"2008","unstructured":"Bellavista P, K\u00fcpper A, Helal S (2008) Location-based services: back to the future. IEEE Pervasive Comput 7(2):85\u201389","journal-title":"IEEE Pervasive Comput"},{"key":"192_CR3","volume-title":"Location privacy in ubiquitous computing","author":"AR Beresford","year":"2005","unstructured":"Beresford AR (2005) Location privacy in ubiquitous computing. PhD thesis, University of Cambridge"},{"key":"192_CR4","doi-asserted-by":"crossref","unstructured":"Bettini C, Mascetti S, Wang XS, Freni D, Jajodia S (2009) Anonymity and historical k-anonymity in location-based services. In: Privacy in location-based applications. Lecture Notes in Computer Science, vol\u00a05599. Springer, pp\u00a01\u201330","DOI":"10.1007\/978-3-642-03511-1_1"},{"issue":"6","key":"192_CR5","doi-asserted-by":"crossref","first-page":"629","DOI":"10.1016\/0305-0483(93)90005-6","volume":"21","author":"F Bolger","year":"1993","unstructured":"Bolger F, Wright G (1993) Coherence and calibration in expert probability judgement. Omega 21(6):629\u2013644","journal-title":"Omega"},{"issue":"2","key":"192_CR6","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1023\/A:1015231126594","volume":"6","author":"T Brinkhoff","year":"2002","unstructured":"Brinkhoff T (2002) A framework for generating network-based moving objects. Geoinformatica 6(2):153\u2013180","journal-title":"Geoinformatica"},{"key":"192_CR7","doi-asserted-by":"crossref","unstructured":"Chen X, Pang J (2012) Measuring query privacy in location-based services. In: Proc. 2nd ACM conference on data and application security and privacy (CODASPY). ACM Press, pp\u00a049\u201360","DOI":"10.1145\/2133601.2133608"},{"key":"192_CR8","doi-asserted-by":"crossref","unstructured":"Chen X, Pang J (2013) Exploring dependency for query privacy protection in location-based services. In: Proc. 3rd ACM conference on data and application security and privacy (CODASPY). ACM Press, pp\u00a037\u201347","DOI":"10.1145\/2435349.2435354"},{"key":"192_CR9","doi-asserted-by":"crossref","unstructured":"Chen X, Pang J, Xue R (2013) Constructing and comparing user mobility profiles for location-based services. In: Proc. 28th ACM Symposium on Applied Computing (SAC). ACM Press, pp\u00a0261\u2013266","DOI":"10.1145\/2480362.2480418"},{"key":"192_CR10","doi-asserted-by":"crossref","unstructured":"Cheng R, Zhang Y, Bertino E, Prabhakar S (2006) Preserving user location privacy in mobile data management infrastructures. In: Proc. 6th international workshop on Privacy Enhancing Technologies (PET). Lecture Notes in Computer Science, vol\u00a04258. Springer, pp\u00a0393\u2013412","DOI":"10.1007\/11957454_23"},{"issue":"4","key":"192_CR11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1620585.1620591","volume":"34","author":"CY Chow","year":"2009","unstructured":"Chow CY, Mokbel MF, Aref WG (2009) Casper\u2009\u22c6\u2009: query processing for location services without compromising privacy. ACM Trans Database Syst 34(4):1\u201348","journal-title":"ACM Trans Database Syst"},{"key":"192_CR12","doi-asserted-by":"crossref","unstructured":"Devroye, L., Lugosi, G.: Combinatorial methods in density estimation. Springer (2001)","DOI":"10.1007\/978-1-4613-0125-7"},{"key":"192_CR13","doi-asserted-by":"crossref","unstructured":"Dewri R, Ray I, Ray I, Whitley D (2010) On the formation of historically k-anonymous anonymity sets in a continuous LBS. In: Proc. 6th international conference on security and privacy in communication networks (SecureComm). Lecture Notes in Computer Science, vol\u00a050. Springer, pp\u00a071\u201388","DOI":"10.1007\/978-3-642-16161-2_5"},{"key":"192_CR14","doi-asserted-by":"crossref","unstructured":"Dewri, R., Ray, I., Ray, I., Whitley, D.: Query m-invariance: preventing query disclosures in continuous location-based services. In: Proc. 11th international conference on Mobile Data Management (MDM). IEEE Computer Society, pp\u00a095\u2013104 (2010)","DOI":"10.1109\/MDM.2010.52"},{"key":"192_CR15","doi-asserted-by":"crossref","unstructured":"D\u00edaz C, Seys S, Claessens J, Preneel B (2003) Towards measuring anonymity. In: Proc. 2nd international workshop on Privacy Enhancing Technologies (PET). Lecture Notes in Computer Science, vol\u00a02482. Springer, pp\u00a054\u201368","DOI":"10.1007\/3-540-36467-6_5"},{"issue":"1","key":"192_CR16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TMC.2007.1062","volume":"7","author":"B Gedik","year":"2008","unstructured":"Gedik B, Liu L (2008) Protecting location privacy with personalized k-anonymity: architecture and algorithms. IEEE Trans Mob Comput 7(1):1\u201318","journal-title":"IEEE Trans Mob Comput"},{"key":"192_CR17","doi-asserted-by":"crossref","unstructured":"Ghinita G, Kalnis P, Khoshgozaran A, Shahabi C, Tan KL (2008) Private queries in location based services: anonymizers are not necessary. In: Proc. the ACM SIGMOD international conference on management of data. ACM Press, pp\u00a0121\u2013132","DOI":"10.1145\/1376616.1376631"},{"key":"192_CR18","doi-asserted-by":"crossref","unstructured":"Ghinita G, Kalnis P, Skiadopoulos S (2007) PRIVE: anonymous location-based queries in distributed mobile systems. In: Proc. 16th international conference on World Wide Web (WWW). ACM Press, pp\u00a0371\u2013380","DOI":"10.1145\/1242572.1242623"},{"key":"192_CR19","doi-asserted-by":"crossref","unstructured":"Giannotti F, Nanni M, Pedreschi D, Pinelli F (2006) Mining sequences with temporal annotations. In: Proc. 21st ACM Symposium on Applied Computing (SAC). ACM Press, pp\u00a0593\u2013597","DOI":"10.1145\/1141277.1141413"},{"key":"192_CR20","doi-asserted-by":"crossref","unstructured":"Giannotti F, Nanni M, Pedreschi D, Pinelli F, Axiak M (2007) Trajectory pattern mining. In: Proc. 13th ACM SIGKDD international conference on Knowledge Discovery and Data Mining (KDD). ACM Press, pp\u00a0330\u2013339","DOI":"10.1145\/1281192.1281230"},{"key":"192_CR21","doi-asserted-by":"crossref","first-page":"779","DOI":"10.1038\/nature06958","volume":"453","author":"MC Gonz\u00e1lez","year":"2008","unstructured":"Gonz\u00e1lez MC, Hidalgo CA, Barab\u00e1si AL (2008)Understanding individual human mobility patterns. Nature 453:779\u2013782","journal-title":"Nature"},{"key":"192_CR22","doi-asserted-by":"crossref","unstructured":"Gruteser M, Grunwald D (2003) Anonymous usage of location-based services through spatial and temporal cloaking. In: Proc. 1st international conference on Mobile Systems, applications, and services (MobiSys). USENIX Association","DOI":"10.1145\/1066116.1189037"},{"key":"192_CR23","unstructured":"Han J, Kamber M (2000) Data mining: concepts and techniques. Morgan Kaufmann"},{"key":"192_CR24","doi-asserted-by":"crossref","unstructured":"Hoh B, Gruteser M, Xiong H, Alrabady A (2007) Preserving privacy in GPS traces via uncertainty-aware path cloaking. In: Proc. 14th ACM conference on Computer and Communications Security (CCS). ACM Press, pp\u00a0161\u2013171","DOI":"10.1145\/1315245.1315266"},{"issue":"4","key":"192_CR25","doi-asserted-by":"crossref","first-page":"620","DOI":"10.1103\/PhysRev.106.620","volume":"106","author":"ET Jaynes","year":"1957","unstructured":"Jaynes ET (1957) Information theory and statistical mechanics. Phys Rev 106(4):620\u2013630","journal-title":"Phys Rev"},{"issue":"2","key":"192_CR26","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1103\/PhysRev.108.171","volume":"108","author":"ET Jaynes","year":"1957","unstructured":"Jaynes ET (1957) Information theory and statistical mechanics II. Phys Rev 108(2):171\u2013190","journal-title":"Phys Rev"},{"issue":"12","key":"192_CR27","doi-asserted-by":"crossref","first-page":"1719","DOI":"10.1109\/TKDE.2007.190662","volume":"19","author":"P Kalnis","year":"2007","unstructured":"Kalnis P, Ghinita G, Mouratidis K, Papadias D (2007) Preventing location-based identity inference in anonymous spatial queries. IEEE Trans Knowl Data Eng 19(12):1719\u20131733","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"192_CR28","doi-asserted-by":"crossref","unstructured":"Kido H, Yanagisawa Y, Satoh T (2005) Protection of location privacy using dummies for location-based services. In: Proc. 21st International Conference on Data Engineering (ICDE). IEEE Computer Society, pp\u00a012\u201348","DOI":"10.1109\/ICDE.2005.269"},{"key":"192_CR29","doi-asserted-by":"crossref","unstructured":"Li N, Li T, Venkatasubramanian S (2007) t-closeness: privacy beyond k-anonymity and l-diversity. In: Proc. 23rd International Conference on Data Engineering (ICDE). IEEE Computer Society, pp\u00a0106\u2013115","DOI":"10.1109\/ICDE.2007.367856"},{"key":"192_CR30","doi-asserted-by":"crossref","unstructured":"Machanavajjhala A, Kifer D, Gehrke J, Venkitasubramaniam M (2007) \u2113-diversity: Privacy beyond k-anonymity. ACM Trans Knowl Discov Data 1(1)","DOI":"10.1145\/1217299.1217302"},{"key":"192_CR31","unstructured":"MacQueen JB (1967) Some methods for classification and analysis of multivariate observations. In: Proc. 5th Berkeley symposium on mathematical statistics and probability, vol\u00a01. University of California Press, pp\u00a0281\u2013297"},{"key":"192_CR32","unstructured":"Manning C, Schu\u00fctze H (1999) Foundations of statistical natural language processing. Cambridge"},{"issue":"3","key":"192_CR33","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1080\/17489720801941789","volume":"1","author":"S Mascetti","year":"2007","unstructured":"Mascetti S, Bettini C, Freni D, Wang XS (2007) Spatial generalization algorithms for LBS privacy preservation. J Location Based Services 1(3):179\u2013207","journal-title":"J Location Based Services"},{"key":"192_CR34","doi-asserted-by":"crossref","unstructured":"Mokbel MF, Chow CY, Aref WG (2007) The new casper: a privacy-aware location-based database server. In: Proc. 23rd International Conference on Data Engineering (ICDE). IEEE Computer Society, pp\u00a01499\u20131500","DOI":"10.1109\/ICDE.2007.369052"},{"issue":"2","key":"192_CR35","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/s10207-012-0182-5","volume":"12","author":"D Rebollo-Monedero","year":"2013","unstructured":"Rebollo-Monedero D, Parra-Arnau J, D\u00edaz C, Forn\u00e9 J (2013) On the measurement of privacy as an attacker\u2019s estimation error. Int J Inf Secur 12(2):129\u2013149","journal-title":"Int J Inf Secur"},{"issue":"1","key":"192_CR36","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1145\/290163.290168","volume":"1","author":"MK Reiter","year":"1998","unstructured":"Reiter MK, Rubin AD (1998) Crowds: anonymity for web transactions. ACM Trans Inf Syst Secur 1(1):66\u201392","journal-title":"ACM Trans Inf Syst Secur"},{"key":"192_CR37","doi-asserted-by":"crossref","unstructured":"Riboni D, Pareschi L, Bettini C (2008) Privacy in georeferenced context-aware services: a survey. In: Proc. 1st international workshop on Privacy in Location-Based Applications (PiLBA). CEUR Workshop Proceedings, vol\u00a0397. CEUR","DOI":"10.1007\/978-3-642-03511-1_7"},{"key":"192_CR38","doi-asserted-by":"crossref","unstructured":"Riboni D, Pareschi L, Bettini C, Jajodia S (2009) Preserving anonymity of recurrent location-based queries. In: Proc. 16th international symposium on temporal representation and reasoning (TIME). IEEE Computer Society, pp\u00a062\u201369","DOI":"10.1109\/TIME.2009.8"},{"issue":"6","key":"192_CR39","doi-asserted-by":"crossref","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P Samarati","year":"2001","unstructured":"Samarati P (2001) Protecting respondents\u2019 identities in microdata release. IEEE Trans Knowl Data Eng 13(6):1010\u20131027","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"192_CR40","doi-asserted-by":"crossref","unstructured":"Santos F, Humbert M, Shokri R, Hubaux JP (2011) Collaborative location privacy with rational users. In: Proc. 2nd international conference on decision and game theory for security (GameSec). Lecture Notes in Computer Science, vol\u00a07037. Springer, pp\u00a0163\u2013181","DOI":"10.1007\/978-3-642-25280-8_14"},{"key":"192_CR41","doi-asserted-by":"crossref","unstructured":"Serjantov A, Danezis G (2003) Towards an information theoretic metric for anonymity. In: Proc. 2nd international workshop on Privacy Enhancing Technologies (PET). Lecture Notes in Computer Science, vol\u00a02482. Springer, pp\u00a041\u201353","DOI":"10.1007\/3-540-36467-6_4"},{"key":"192_CR42","doi-asserted-by":"crossref","unstructured":"Shin H, Atluri V, Vaidya J (2008) A profile anonymization model for privacy in a personalized location based service environment. In: Proc. 9th international conference on Mobile Data Management (MDM). IEEE Computer Society, pp\u00a073\u201380","DOI":"10.1109\/MDM.2008.33"},{"issue":"5","key":"192_CR43","doi-asserted-by":"crossref","first-page":"795","DOI":"10.3233\/JCS-2010-0416","volume":"19","author":"H Shin","year":"2011","unstructured":"Shin H, Atluri V, Vaidya J (2011) A profile anonymization model for location-based services. J Comput Secur 19(5):795\u2013833","journal-title":"J Comput Secur"},{"key":"192_CR44","doi-asserted-by":"crossref","unstructured":"Shokri R, Theodorakopoulos G, Boudec JYL, Hubaux JP (2011) Quantifying location privacy. In: Proc. 32nd IEEE symposium on Security and Privacy (S&P). IEEE Computer Society","DOI":"10.1109\/SP.2011.18"},{"key":"192_CR45","doi-asserted-by":"crossref","unstructured":"Shokri R, Troncoso C, D\u00edaz C, Freudiger J, Hubaux JP (2010) Unraveling an old cloak: k-anonymity for location privacy. In: Proc. 2010 ACM Workshop on Privacy in the Electronic Society (WPES). ACM Press, pp\u00a0115\u2013118","DOI":"10.1145\/1866919.1866936"},{"key":"192_CR46","doi-asserted-by":"crossref","unstructured":"Tan KW, Lin Y, Mouratidis K (2009) Spatial cloaking revisited: distinguishing information leakage from anonymity. In: Proc. 11th international Symposium on Spatial and Temporal Databases (SSTD). Lecture Notes in Computer Science, vol\u00a05644. Springer, pp\u00a0117\u2013134","DOI":"10.1007\/978-3-642-02982-0_10"},{"key":"192_CR47","doi-asserted-by":"crossref","unstructured":"Xu T, Cai Y (2009) Feeling-based location privacy protection for location-based services. In: Proc. 16th ACM conference on Computer and Communications Security (CCS). ACM Press, pp\u00a0348\u2013357","DOI":"10.1145\/1653662.1653704"},{"key":"192_CR48","doi-asserted-by":"crossref","unstructured":"Xue M, Kalnis P, Pung HK (2009) Location diversity: enhanced privacy protection in location based services. In: Proc. 4th international symposium on Location and Context Awareness (LoCA). Lecture Notes in Computer Science, vol\u00a05561. Springer, pp\u00a070\u201387","DOI":"10.1007\/978-3-642-01721-6_5"},{"key":"192_CR49","doi-asserted-by":"crossref","unstructured":"Yiu ML, Jensen CS, Huang X, Lu H (2008) Spacetwist: managing the trade-offs among location privacy, query performance, and query accuracy in mobile services. In: Proc. 24th International Conference on Data Engineering (ICDE). IEEE Computer Society, pp\u00a0366\u2013375","DOI":"10.1109\/ICDE.2008.4497445"}],"container-title":["GeoInformatica"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10707-013-0192-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10707-013-0192-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10707-013-0192-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,30]],"date-time":"2019-07-30T18:45:05Z","timestamp":1564512305000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10707-013-0192-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10,18]]},"references-count":49,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,1]]}},"alternative-id":["192"],"URL":"https:\/\/doi.org\/10.1007\/s10707-013-0192-0","relation":{},"ISSN":["1384-6175","1573-7624"],"issn-type":[{"value":"1384-6175","type":"print"},{"value":"1573-7624","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,10,18]]}}}