{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:32:54Z","timestamp":1750307574533,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,11,3]],"date-time":"2009-11-03T00:00:00Z","timestamp":1257206400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,11,3]]},"DOI":"10.1145\/1667502.1667510","type":"proceedings-article","created":{"date-parts":[[2009,12,15]],"date-time":"2009-12-15T12:55:59Z","timestamp":1260881759000},"page":"27-31","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["Movement data anonymity through generalization"],"prefix":"10.1145","author":[{"given":"Gennady","family":"Andrienko","sequence":"first","affiliation":[{"name":"Fraunhofer IAIS Sankt, Augustin, Germany"}]},{"given":"Natalia","family":"Andrienko","sequence":"additional","affiliation":[{"name":"Fraunhofer IAIS Sankt, Augustin, Germany"}]},{"given":"Fosca","family":"Giannotti","sequence":"additional","affiliation":[{"name":"KddLab ISTI-CNR, Pisa, Italy"}]},{"given":"Anna","family":"Monreale","sequence":"additional","affiliation":[{"name":"University of Pisa"}]},{"given":"Dino","family":"Pedreschi","sequence":"additional","affiliation":[{"name":"University of Pisa"}]}],"member":"320","published-online":{"date-parts":[[2009,11,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497446"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335438"},{"key":"e_1_3_2_1_3_1","volume-title":"VAST in press","author":"Andrienko G.","year":"2009","unstructured":"G. Andrienko , N. Andrienko , S. Rinzivillo , M. Nanni , D. Pedreschi , and F. Giannotti . Interactive visual clustering of large collections of trajectories . In VAST in press , 2009 . G. Andrienko, N. Andrienko, S. Rinzivillo, M. Nanni, D. Pedreschi, and F. Giannotti. Interactive visual clustering of large collections of trajectories. In VAST in press, 2009."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/304181.304187"},{"key":"e_1_3_2_1_5_1","first-page":"10","volume-title":"SPC","author":"Gruteser M.","year":"2003","unstructured":"M. Gruteser and D. Grunwald . A methodological assessment of location privacy risks in wireless hotspot networks . In SPC , pages 10 -- 24 , 2003 . M. Gruteser and D. Grunwald. A methodological assessment of location privacy risks in wireless hotspot networks. In SPC, pages 10--24, 2003."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.42"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.101"},{"key":"e_1_3_2_1_8_1","first-page":"763","volume-title":"VLDB","author":"Mokbel M. F.","year":"2006","unstructured":"M. F. Mokbel , C. Chow , and W. G. Aref . The new casper: Query processing for location services without compromising privacy . In VLDB , pages 763 -- 774 , 2006 . M. F. Mokbel, C. Chow, and W. G. Aref. The new casper: Query processing for location services without compromising privacy. In VLDB, pages 763--774, 2006."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDEW.2006.152"},{"key":"e_1_3_2_1_11_1","volume-title":"PiLBA","author":"Pensa R. G.","year":"2008","unstructured":"R. G. Pensa , A. Monreale , F. Pinelli , and D. Pedreschi . Pattern-preserving k-anonymization of sequences and its application to mobility data mining . In PiLBA , 2008 . R. G. Pensa, A. Monreale, F. Pinelli, and D. Pedreschi. Pattern-preserving k-anonymization of sequences and its application to mobility data mining. In PiLBA, 2008."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ivs.9500183"},{"key":"e_1_3_2_1_13_1","volume-title":"SRI International","author":"Samarati P.","year":"1998","unstructured":"P. Samarati and L. Sweeney . Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical report , SRI International , 1998 . P. Samarati and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical report, SRI International, 1998."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2008.29"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1516360.1516370"}],"event":{"name":"GIS '09: 17th SIGSPATIAL International Conference on Advances in Geographic Information Systems","sponsor":["SIGSPATIAL ACM Special Interest Group on Spatial Information"],"location":"Seattle Washington","acronym":"GIS '09"},"container-title":["Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1667502.1667510","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1667502.1667510","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:41:07Z","timestamp":1750250467000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1667502.1667510"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,11,3]]},"references-count":14,"alternative-id":["10.1145\/1667502.1667510","10.1145\/1667502"],"URL":"https:\/\/doi.org\/10.1145\/1667502.1667510","relation":{},"subject":[],"published":{"date-parts":[[2009,11,3]]},"assertion":[{"value":"2009-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}