{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T04:10:09Z","timestamp":1746159009360,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642545672"},{"type":"electronic","value":"9783642545689"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54568-9_4","type":"book-chapter","created":{"date-parts":[[2014,3,20]],"date-time":"2014-03-20T14:31:35Z","timestamp":1395325895000},"page":"51-65","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Collaborative and Privacy-Aware Sensing for Observing Urban Movement Patterns"],"prefix":"10.1007","author":[{"given":"Nelson","family":"Gon\u00e7alves","sequence":"first","affiliation":[]},{"given":"Rui","family":"Jos\u00e9","sequence":"additional","affiliation":[]},{"given":"Carlos","family":"Baquero","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,3,21]]},"reference":[{"key":"4_CR1","series-title":"LNCS","first-page":"47","volume-title":"Data and Applications Security 2007","author":"CA Ardagna","year":"2007","unstructured":"Ardagna, C.A., Cremonini, M., Damiani, E., De Capitani di Vimercati, S., Samarati, P.: Location privacy protection through obfuscation-based techniques. In: Barker, S., Ahn, G.-J. (eds.) Data and Applications Security 2007. LNCS, vol. 4602, pp. 47\u201360. Springer, Heidelberg (2007)"},{"key":"4_CR2","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1007\/978-0-387-72367-9_27","volume-title":"New Approaches for Security, Privacy and Trust in Complex Environments","author":"CA Ardagna","year":"2007","unstructured":"Ardagna, C.A., Cremonini, M., De Capitani di Vimercati, S., Samarati, P.: A middleware architecture for integrating privacy preferences and location accuracy. In: Venter, H., Eloff, M., Labuschagne, L., Eloff, J., von Solms, R. (eds.) New Approaches for Security, Privacy and Trust in Complex Environments, pp. 313\u2013324. Springer, Boston (2007)"},{"issue":"1","key":"4_CR3","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1109\/TDSC.2009.25","volume":"8","author":"CA Ardagna","year":"2011","unstructured":"Ardagna, C.A., Cremonini, M., De Capitani di Vimercati, S., Samarati, P.: An obfuscation-based approach for protecting location privacy. IEEE Trans. Dependable Secure Comput. 8(1), 13\u201327 (2011)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"1","key":"4_CR4","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MPRV.2003.1186725","volume":"2","author":"A Beresford","year":"2003","unstructured":"Beresford, A., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Comput. 2(1), 46\u201355 (2003)","journal-title":"IEEE Pervasive Comput."},{"issue":"7","key":"4_CR5","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1145\/362686.362692","volume":"13","author":"BH Bloom","year":"1970","unstructured":"Bloom, B.H.: Space\/time trade-offs in hash coding with allowable errors. Commun. ACM 13(7), 422\u2013426 (1970)","journal-title":"Commun. ACM"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Chang, F., Chang, F., chang Feng, W.: Approximate caches for packet classification. In: In IEEE INFOCOM, pp. 2196\u20132207 (2004)","DOI":"10.1109\/INFCOM.2004.1354643"},{"key":"4_CR7","series-title":"LNCS","first-page":"152","volume-title":"PERVASIVE 2005","author":"M Duckham","year":"2005","unstructured":"Duckham, M., Kulik, L.: A formal model of obfuscation and negotiation for location privacy. In: Gellersen, H.-W., Want, R., Schmidt, A. (eds.) PERVASIVE 2005. LNCS, vol. 3468, pp. 152\u2013170. Springer, Heidelberg (2005)"},{"issue":"1","key":"4_CR8","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/S0198-9715(00)00040-5","volume":"25","author":"M Duckham","year":"2001","unstructured":"Duckham, M., Mason, K., Stell, J., Worboys, M.: A formal approach to imperfection in geographic information. Comput. Environ. Urban Syst. 25(1), 89\u2013103 (2001)","journal-title":"Comput. Environ. Urban Syst."},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Fan, L., Cao, P., Almeida, J., Broder, A.Z.: Summary cache: a scalable wide-area web cache sharing protocol. In: IEEE\/ACM Transactions on Networking, pp. 254\u2013265 (1998)","DOI":"10.1145\/285243.285287"},{"key":"4_CR10","doi-asserted-by":"crossref","first-page":"390","DOI":"10.1007\/978-3-642-01516-8_26","volume":"5538","author":"P Golle","year":"2009","unstructured":"Golle, P., Partridge, K.: On the anonymity of home\/work location pairs. Pervasive Comput. 5538, 390\u2013397 (2009)","journal-title":"Pervasive Comput."},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, pp. 31\u201342. ACM (2003)","DOI":"10.1145\/1066116.1189037"},{"issue":"1","key":"4_CR12","first-page":"56","volume":"10","author":"CJ Fidge","year":"1988","unstructured":"Fidge, C.J.: Timestamps in message-passing systems that preserve the partial ordering. Aust. Comput. Sci. Commun. 10(1), 56\u201366 (1988)","journal-title":"Aust. Comput. Sci. Commun."},{"key":"4_CR13","series-title":"LNCS","first-page":"127","volume-title":"Pervasive 2007","author":"J Krumm","year":"2007","unstructured":"Krumm, J.: Inference attacks on location tracks. In: LaMarca, A., Langheinrich, M., Truong, K.N. (eds.) Pervasive 2007. LNCS, vol. 4480, pp. 127\u2013143. Springer, Heidelberg (2007)"},{"key":"4_CR14","doi-asserted-by":"publisher","first-page":"558","DOI":"10.1145\/359545.359563","volume":"21","author":"L Lamport","year":"1978","unstructured":"Lamport, L.: Time, clocks, and the ordering of events in a distributed system. Commun. ACM 21, 558\u2013565 (1978). doi:10.1145\/359545.359563","journal-title":"Commun. ACM"},{"key":"4_CR15","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/3-540-45427-6_23","volume-title":"Ubicomp 2001","author":"M Langheinrich","year":"2001","unstructured":"Langheinrich, M.: Privacy by design principles of privacy-aware ubiquitous systems. In: Abowd, G.D., Brumitt, B., Shafer, S.A.N. (eds.) Ubicomp 2001. LNCS, vol. 2201, pp. 273\u2013291. Springer, Heidelberg (2001)"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Leguay, J., Lindgren, A., Scott, J., Friedman, T., Crowcroft, J.: Opportunistic content distribution in an urban setting. In: Proceedings of the 2006 SIGCOMM Workshop on Challenged Networks, pp. 205\u2013212. ACM (2006)","DOI":"10.1145\/1162654.1162657"},{"key":"4_CR17","unstructured":"Mattern, F.: Virtual time and global states of distributed systems. In: Workshop on Parallel and Distributed Algorithms (1988)"},{"key":"4_CR18","unstructured":"Mokbel, M., Chow, C., Aref, W.: The new casper: query processing for location services without compromising privacy. In: Proceedings of the 32nd International Conference on Very Large Data Bases, pp. 763\u2013774. VLDB Endowment (2006)"},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"Tang, K.P., Keyani, P., Fogarty, J., Hong, J.I.: Putting people in their place: an\u00a0anonymous and privacy-sensitive approach to collecting sensed data in location based\u00a0applications. In: SIGCHI Conference on Human Factors in Computing Systems,\u00a0vol. 8, pp. 93\u2013102. ACM (2006)","DOI":"10.1145\/1124772.1124788"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management and Autonomous Spontaneous Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54568-9_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T03:30:30Z","timestamp":1746156630000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-54568-9_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642545672","9783642545689"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54568-9_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"21 March 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}