{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:48:30Z","timestamp":1771699710605,"version":"3.50.1"},"reference-count":32,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2009,7,1]],"date-time":"2009-07-01T00:00:00Z","timestamp":1246406400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGSPATIAL Special"],"published-print":{"date-parts":[[2009,7]]},"abstract":"<jats:p>Location-based services (LBS, for short) are information and entertainment services that are conveniently accessible by mobile users through GPS-enabled portable devices and mobile networks (e.g., 2G\/3G cellular telephone and Wi-Fi networks). Examples of LBS include resource finding (e.g., where is my nearest gas station), route finding (e.g., what is the shortest route from my current location to a shopping mall, social networking (e.g., where are my friends), and location-based gaming (e.g., GPS online game). LBS rely mainly on an implicit assumption that mobile users are willing to reveal their private locations. With untrustworthy LBS providers, the revealed private location information could be abused by adversaries. For example, an adversary may infer a user's medical record by knowing that she regularly visits a specialized clinic. There are already several life scenarios that took place where personal GPS locations are abused, e.g., see [8, 27, 28].<\/jats:p>","DOI":"10.1145\/1567253.1567258","type":"journal-article","created":{"date-parts":[[2009,11,30]],"date-time":"2009-11-30T14:56:36Z","timestamp":1259592996000},"page":"23-27","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":38,"title":["Privacy in location-based services"],"prefix":"10.1145","volume":"1","author":[{"given":"Chi-Yin","family":"Chow","sequence":"first","affiliation":[{"name":"University of Minnesota"}]},{"given":"Mohamed F.","family":"Mokbel","sequence":"additional","affiliation":[{"name":"University of Minnesota"}]}],"member":"320","published-online":{"date-parts":[[2009,7]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1367497.1367531"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73540-3_15"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376762"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2009.19"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1183471.1183500"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02982-0_19"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/11428572_10"},{"key":"e_1_2_1_8_1","unstructured":"]]Foxs News. Man accused of stalking ex-girlfriend with GPS http:\/\/www.foxnews.com\/story\/0 2933 131487 00.html. September 4 2004.  ]]Foxs News. Man accused of stalking ex-girlfriend with GPS http:\/\/www.foxnews.com\/story\/0 2933 131487 00.html. September 4 2004."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2007.1062"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376631"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242623"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/1784462.1784475"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066116.1189037"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2004.1281242"},{"key":"e_1_2_1_15_1","volume-title":"HOTOS","author":"Gruteser M.","year":"2003","unstructured":"]] M. Gruteser , G. Schelle , A. Jain , R. Han , and D. Grunwald . Privacy-aware location sensor networks . In HOTOS , 2003 . ]]M. Gruteser, G. Schelle, A. Jain, R. Han, and D. Grunwald. Privacy-aware location sensor networks. In HOTOS, 2003."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1378600.1378604"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/990064.990087"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2006.15"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.190662"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367926"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/1784462.1784476"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.269"},{"key":"e_1_2_1_23_1","volume-title":"VLDB","author":"Mokbel M. F.","year":"2006","unstructured":"]] M. F. Mokbel , C.-Y. Chow , and W. G. Aref . The new casper: Query procesing for location services without compromising privacy . In VLDB , 2006 . ]]M. F. Mokbel, C.-Y. Chow, and W. G. Aref. The new casper: Query procesing for location services without compromising privacy. In VLDB, 2006."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDEW.2006.152"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/69.971193"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_2_1_27_1","volume-title":"December 30, 2002.","author":"Today USA","unstructured":"]] USA Today . Authorities : GPS system used to stalk woman, http:\/\/www.usatoday.com\/tech\/news\/2002-12-30-gps-stalker$\\_$x.htm . December 30, 2002. ]]USA Today. Authorities: GPS system used to stalk woman, http:\/\/www.usatoday.com\/tech\/news\/2002-12-30-gps-stalker$\\_$x.htm. December 30, 2002."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2006.1652998"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1341012.1341062"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.103"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497445"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.87"}],"container-title":["SIGSPATIAL Special"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1567253.1567258","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1567253.1567258","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:22:31Z","timestamp":1750278151000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1567253.1567258"}},"subtitle":["a system architecture perspective"],"short-title":[],"issued":{"date-parts":[[2009,7]]},"references-count":32,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2009,7]]}},"alternative-id":["10.1145\/1567253.1567258"],"URL":"https:\/\/doi.org\/10.1145\/1567253.1567258","relation":{},"ISSN":["1946-7729"],"issn-type":[{"value":"1946-7729","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,7]]},"assertion":[{"value":"2009-07-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}