{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T17:03:37Z","timestamp":1773075817102,"version":"3.50.1"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2015,11,28]],"date-time":"2015-11-28T00:00:00Z","timestamp":1448668800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Geoinformatica"],"published-print":{"date-parts":[[2016,7]]},"DOI":"10.1007\/s10707-015-0241-y","type":"journal-article","created":{"date-parts":[[2015,11,28]],"date-time":"2015-11-28T05:51:42Z","timestamp":1448689902000},"page":"415-451","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Location K-anonymity in indoor spaces"],"prefix":"10.1007","volume":"20","author":[{"given":"Joon-Seok","family":"Kim","sequence":"first","affiliation":[]},{"given":"Ki-Joune","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,28]]},"reference":[{"issue":"1","key":"241_CR1","first-page":"85","volume":"4","author":"I Afyouni","year":"2012","unstructured":"Afyouni I, Ray C, Claramunt C (2012) Spatial models for context-aware indoor navigation systems: A survey. J Spat Inf Sci 4(1):85\u2013123","journal-title":"J Spat Inf Sci"},{"key":"241_CR2","doi-asserted-by":"crossref","unstructured":"Gedik B, Liu L (2005) Location privacy in mobile systems: a personalized anonymization model. In: ICDCS, pp 620\u2013629","DOI":"10.1109\/ICDCS.2005.48"},{"key":"241_CR3","doi-asserted-by":"crossref","unstructured":"Ghinita G, Kalnis P, Khoshgozaran A, Shahabi C, Tan KL (2008) Private queries in location based services: anonymizers are not necessary. In: SIGMOD Conference, pp 121\u2013132. doi: 10.1145\/1376616.1376631","DOI":"10.1145\/1376616.1376631"},{"issue":"3","key":"241_CR4","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1016\/j.is.2009.10.001","volume":"35","author":"G Ghinita","year":"2010","unstructured":"Ghinita G, Zhao K, Papadias D, Kalnis P (2010) A reciprocal framework for spatial k-anonymity. Inf Syst 35(3):299\u2013314. doi: 10.1016\/j.is.2009.10.001","journal-title":"Inf Syst"},{"issue":"1","key":"241_CR5","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/1882471.1882473","volume":"12","author":"A Gkoulalas-Divanis","year":"2010","unstructured":"Gkoulalas-Divanis A, Kalnis P, Verykios VS (2010) Providing k-anonymity in location based services. SIGKDD Explor 12(1):3\u201310","journal-title":"SIGKDD Explor"},{"key":"241_CR6","doi-asserted-by":"crossref","unstructured":"Gruteser M, Grunwald D (2003) Anonymous usage of location-based services through spatial and temporal cloaking. In: MOBISYS, pp 31\u201342","DOI":"10.1145\/1066116.1189037"},{"key":"241_CR7","doi-asserted-by":"crossref","unstructured":"Hagedorn B, Trapp M, Glander T, Dollner J (2009) Towards an indoor level-of-detail model for route visualization. In: MDM, pp 692\u2013697","DOI":"10.1109\/MDM.2009.118"},{"issue":"12","key":"241_CR8","doi-asserted-by":"crossref","first-page":"1719","DOI":"10.1109\/TKDE.2007.190662","volume":"19","author":"P Kalnis","year":"2007","unstructured":"Kalnis P, Ghinita G, Mouratidis K, Papadias D (2007) Preventing location-based identity inference in anonymous spatial queries. IEEE Trans Knowl Data Eng 19(12):1719\u20131733","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"241_CR9","doi-asserted-by":"crossref","unstructured":"Khoshgozaran A, Shahabi C (2007) Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy. In: SSTD, pp 239\u2013257","DOI":"10.1007\/978-3-540-73540-3_14"},{"issue":"2","key":"241_CR10","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1504\/IJCSE.2010.036819","volume":"5","author":"A Khoshgozaran","year":"2010","unstructured":"Khoshgozaran A, Shahabi C (2010) A taxonomy of approaches to preserve location privacy in location-based services. Int J Comput Sci Eng 5 (2):86\u201396. doi: 10.1504\/IJCSE.2010.036819","journal-title":"Int J Comput Sci Eng"},{"issue":"3","key":"241_CR11","doi-asserted-by":"crossref","first-page":"435","DOI":"10.1007\/s10115-010-0286-z","volume":"26","author":"A Khoshgozaran","year":"2011","unstructured":"Khoshgozaran A, Shahabi C, Shirani-Mehr H (2011) Location privacy: going beyond k-anonymity, cloaking and anonymizers. Knowl Inf Syst 26(3):435\u2013465. doi: 10.1007\/s10115-010-0286-z","journal-title":"Knowl Inf Syst"},{"key":"241_CR12","doi-asserted-by":"crossref","unstructured":"Kim JS, Han Y, Li KJ (2012) K-anonymity in indoor spaces through hierarchical graphs. In: Proceedings of the fourth ACM SIGSPATIAL international workshop on indoor spatial awareness, pp 21\u201328. doi: 10.1145\/2442616.2442622","DOI":"10.1145\/2442616.2442622"},{"issue":"1","key":"241_CR13","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1002\/cpe.2844","volume":"25","author":"YK Kim","year":"2013","unstructured":"Kim YK, Hossain A, Hossain AA, Chang JW (2013) Hilbert-order based spatial cloaking algorithm in road network. Concurrency Comput Prac Exp 25 (1):143\u2013158. doi: 10.1002\/cpe.2844","journal-title":"Concurrency Comput Prac Exp"},{"key":"241_CR14","unstructured":"Lee J, Li KJ, Zlatanova S, Kolbe TH, Nagel C, Becker T (2014) Ogc indoorgml v.1.0, accessed: 2015-02-25. http:\/\/docs.opengeospatial.org\/is\/14-005r3\/14-005r3.html"},{"key":"241_CR15","unstructured":"Li KJ (2008) A new notion of space. In: W2GIS, pp 1\u20133"},{"key":"241_CR16","doi-asserted-by":"crossref","unstructured":"Li PY, Peng WC, Wang TW, Ku WS, Xu J, Hamilton JA Jr (2008) A cloaking algorithm based on spatial networks for location privacy. In: SUTC, pp 90\u201397. doi: 10.1109\/SUTC.2008.56","DOI":"10.1109\/SUTC.2008.56"},{"issue":"10","key":"241_CR17","doi-asserted-by":"crossref","first-page":"560","DOI":"10.1145\/359156.359164","volume":"22","author":"T Lozano-P\u00e9rez","year":"1979","unstructured":"Lozano-P\u00e9rez T, Wesley MA (1979) An algorithm for planning collision-free paths among polyhedral obstacles. Commun ACM 22(10):560\u2013570. doi: 10.1145\/359156.359164","journal-title":"Commun ACM"},{"key":"241_CR18","doi-asserted-by":"crossref","unstructured":"Lu H, Cao X, Jensen CS (2012) A foundation for efficient indoor distance-aware query processing. In: ICDE, pp 438\u2013449. doi: 10.1109\/ICDE.2012.44","DOI":"10.1109\/ICDE.2012.44"},{"key":"241_CR19","unstructured":"Mokbel MF, Chow CY, Aref WG (2006) The new casper: Query processing for location services without compromising privacy. In: VLDB, pp 763\u2013774"},{"issue":"1","key":"241_CR20","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/TKDE.2009.48","volume":"22","author":"K Mouratidis","year":"2010","unstructured":"Mouratidis K, Yiu ML (2010) Anonymous query processing in road networks. IEEE Trans Knowl Data Eng 22(1):2\u201315. doi: 10.1109\/TKDE.2009.48","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"1\u20132","key":"241_CR21","doi-asserted-by":"crossref","first-page":"619","DOI":"10.14778\/1920841.1920920","volume":"3","author":"S Papadopoulos","year":"2010","unstructured":"Papadopoulos S, Bakiras S, Papadias D (2010) Nearest neighbor search with strong location privacy. Proc VLDB Endow 3(1\u20132):619\u2013629. doi: 10.14778\/1920841.1920920","journal-title":"Proc VLDB Endow"},{"key":"241_CR22","doi-asserted-by":"crossref","unstructured":"Richter K, Winter S, Ruetschi U (2009) Constructing hierarchical representations of indoor spaces. In: MDM, pp 686\u2013691","DOI":"10.1109\/MDM.2009.117"},{"key":"241_CR23","doi-asserted-by":"crossref","unstructured":"Stoel E, Schoder K, Ohlbach HJ (2008) Applying hierarchical graphs to pedestrian indoor navigation. In: ACM SIGSpatial GIS, pp 54:1\u201354:4","DOI":"10.1145\/1463434.1463499"},{"issue":"1","key":"241_CR24","doi-asserted-by":"crossref","first-page":"1042","DOI":"10.14778\/1687627.1687745","volume":"2","author":"T Wang","year":"2009","unstructured":"Wang T, Liu L (2009) Privacy-aware mobile services over road networks. Proc VLDB Endow 2(1): 1042\u20131053","journal-title":"Proc VLDB Endow"},{"key":"241_CR25","doi-asserted-by":"crossref","unstructured":"Xie X, Lu H, Pedersen TB (2013) Efficient distance-aware query evaluation on indoor moving objects. In: ICDE, pp 434\u2013445","DOI":"10.1109\/ICDE.2013.6544845"},{"key":"241_CR26","doi-asserted-by":"crossref","unstructured":"Xue J, Liu X, Yang X, Wang B (2010) Protecting location privacy using cloaking subgraphs on road network. In: WISA, pp 65\u201368","DOI":"10.1109\/WISA.2010.38"},{"key":"241_CR27","doi-asserted-by":"crossref","unstructured":"Xue M, Kalnis P, Pung H (2009) Location diversity: enhanced privacy protection in location based services. In: LoCA, pp 70\u201387","DOI":"10.1007\/978-3-642-01721-6_5"},{"key":"241_CR28","doi-asserted-by":"crossref","unstructured":"Yang B, Lu H, Jensen CS (2010) Probabilistic threshold k nearest neighbor queries over moving objects in symbolic indoor space. In: EDBT, pp 335\u2013346. doi: 10.1145\/1739041.1739083","DOI":"10.1145\/1739041.1739083"},{"key":"241_CR29","doi-asserted-by":"crossref","unstructured":"Yiu ML, Jensen CS, Huang X, Lu H (2008) Spacetwist: managing the trade-offs among location privacy, query performance, and query accuracy in mobile services. In: ICDE, pp 366\u2013375. doi: 10.1109\/ICDE.2008.4497445","DOI":"10.1109\/ICDE.2008.4497445"},{"key":"241_CR30","doi-asserted-by":"crossref","unstructured":"Yuan W, Schneider M (2010) Supporting continuous range queries in indoor space. In: MDM , pp 209\u2013214","DOI":"10.1109\/MDM.2010.21"}],"container-title":["GeoInformatica"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10707-015-0241-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10707-015-0241-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10707-015-0241-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,27]],"date-time":"2022-05-27T15:32:24Z","timestamp":1653665544000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10707-015-0241-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11,28]]},"references-count":30,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016,7]]}},"alternative-id":["241"],"URL":"https:\/\/doi.org\/10.1007\/s10707-015-0241-y","relation":{},"ISSN":["1384-6175","1573-7624"],"issn-type":[{"value":"1384-6175","type":"print"},{"value":"1573-7624","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,11,28]]}}}