{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T13:07:30Z","timestamp":1648645650410},"reference-count":11,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2009,5,15]],"date-time":"2009-05-15T00:00:00Z","timestamp":1242345600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Oper Res Int J"],"published-print":{"date-parts":[[2011,8]]},"DOI":"10.1007\/s12351-009-0050-x","type":"journal-article","created":{"date-parts":[[2009,5,14]],"date-time":"2009-05-14T04:16:04Z","timestamp":1242274564000},"page":"201-214","source":"Crossref","is-referenced-by-count":2,"title":["Concealing the position of individuals in location-based services"],"prefix":"10.1007","volume":"11","author":[{"given":"Aris","family":"Gkoulalas-Divanis","sequence":"first","affiliation":[]},{"given":"Vassilios S.","family":"Verykios","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,5,15]]},"reference":[{"key":"50_CR1","doi-asserted-by":"crossref","unstructured":"Beresford A, Stajano F (2004) Mix zones: user privacy in location-aware services. In: Proceedings of the IEEE workshop on pervasive computing and communication security (PerSec), pp\u00a0127\u2013131","DOI":"10.1109\/PERCOMW.2004.1276918"},{"key":"50_CR2","doi-asserted-by":"crossref","unstructured":"Bettini C, Jajodia S, Wang XS (2000), Time granularities in databases. Data mining and temporal reasoning, LNCS series. Springer, Berlin","DOI":"10.1007\/978-3-662-04228-1"},{"key":"50_CR3","doi-asserted-by":"crossref","unstructured":"Bettini C, Wang XS, Jajodia S (2005), Protecting privacy against location-based personal identification. In: Proceedings of the 2nd VLDB workshop on secure data management (SDM), pp\u00a0185\u2013199","DOI":"10.1007\/11552338_13"},{"issue":"2","key":"50_CR4","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1023\/A:1015231126594","volume":"6","author":"T Brinkhoff","year":"2002","unstructured":"Brinkhoff T (2002) A framework for generating network-based moving objects. Geoinformatica 6(2):153\u2013180","journal-title":"Geoinformatica"},{"key":"50_CR5","unstructured":"Gedik B, Liu L (2004) A customizable K-anonymity model for protecting location privacy. Technical report, Computer Science Department, Georgia Institute of Technology, USA"},{"key":"50_CR6","doi-asserted-by":"crossref","unstructured":"Gruteser M, Grunwald D (2003), Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the 1st international conference on mobile systems, applications and services (MobiSys), pp\u00a031\u201342","DOI":"10.1145\/1066116.1189037"},{"key":"50_CR7","doi-asserted-by":"crossref","unstructured":"Gruteser M, Hoh B (2005) On the anonymity of periodic location samples. In: Proceedings of the 2nd international conference on security in pervasive computing, LNCS series. Springer, Berlin, pp\u00a0179\u2013192","DOI":"10.1007\/978-3-540-32004-3_19"},{"issue":"12","key":"50_CR8","doi-asserted-by":"crossref","first-page":"1719","DOI":"10.1109\/TKDE.2007.190662","volume":"19","author":"P Kalnis","year":"2007","unstructured":"Kalnis P, Ghinita G, Mouratidis K, Papadias D (2007) Preventing location based identity inference in anonymous spatial queries. IEEE Trans Knowl Data Eng (TKDE) 19(12):1719\u20131733","journal-title":"IEEE Trans Knowl Data Eng (TKDE)"},{"key":"50_CR9","unstructured":"Mokbel MF, Chow C-Y, Aref WG (2006) The new casper: query processing for location services without compromising privacy. In: Proceedings of the 32nd international conference on very large data bases (VLDB), pp\u00a0763\u2013774"},{"key":"50_CR10","unstructured":"Sweeney L, Samarati P (1998) Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression. In: Proceedings of the IEEE symposium on research in security and privacy, pp\u00a01\u201319"},{"key":"50_CR11","unstructured":"Zacharouli P, Gkoulalas-Divanis A, Verykios VS (2007) A K-anonymity model for spatiotemporal data. In: Proceedings of the ICDE workshop on spatiotemporal data mining (STDM), pp\u00a0555\u2013564"}],"container-title":["Operational Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12351-009-0050-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12351-009-0050-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12351-009-0050-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T08:04:33Z","timestamp":1559462673000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12351-009-0050-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,5,15]]},"references-count":11,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2011,8]]}},"alternative-id":["50"],"URL":"https:\/\/doi.org\/10.1007\/s12351-009-0050-x","relation":{},"ISSN":["1109-2858","1866-1505"],"issn-type":[{"value":"1109-2858","type":"print"},{"value":"1866-1505","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,5,15]]}}}