{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T08:41:18Z","timestamp":1773304878005,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,8,16]],"date-time":"2013-08-16T00:00:00Z","timestamp":1376611200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,8,16]]},"DOI":"10.1145\/2491266.2491272","type":"proceedings-article","created":{"date-parts":[[2013,8,20]],"date-time":"2013-08-20T14:07:21Z","timestamp":1377007641000},"page":"27-32","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["Enabling secure location-based services in mobile cloud computing"],"prefix":"10.1145","author":[{"given":"Yan","family":"Zhu","sequence":"first","affiliation":[{"name":"University of Science and Technology Beijing, Beijing, China"}]},{"given":"Di","family":"Ma","sequence":"additional","affiliation":[{"name":"University of Michigan-Dearborn, Dearborn, MI, USA"}]},{"given":"Dijiang","family":"Huang","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]},{"given":"Changjun","family":"Hu","sequence":"additional","affiliation":[{"name":"University of Science and Technology Beijing, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2013,8,16]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Pyramid Research","author":"Sythoff Jan Ten","year":"2010","unstructured":"Jan Ten Sythoff . Location-based services, market forecast, 2011-2015. Technical report , Pyramid Research , 2010 . Jan Ten Sythoff. Location-based services, market forecast, 2011-2015. Technical report, Pyramid Research, 2010."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03007-9_11"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/1824401.1824404"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.18"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1071246.1071270"},{"key":"e_1_3_2_1_6_1","volume-title":"Committee on Intersections Between Geospatial Information and Information Technology","author":"Muntz","year":"2003","unstructured":"Muntz et al. It roadmap to a geospatial future. Technical report , Committee on Intersections Between Geospatial Information and Information Technology , National Research Council , 2003 . Muntz et al. It roadmap to a geospatial future. Technical report, Committee on Intersections Between Geospatial Information and Information Technology, National Research Council, 2003."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.60"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_27"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICITIS.2010.5688758"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020602"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"John\n      Krumm\n    .\n  Inference attacks on location tracks\n  . In Anthony LaMarca Marc Langheinrich and Khai N. Truong editors 5th International Conference of Pervasive Computing PERVASIVE volume \n  4480\n   of \n  Lecture Notes in Computer Science pages \n  127\n  --\n  143\n  . \n  Springer 2007\n  .   John Krumm. Inference attacks on location tracks. In Anthony LaMarca Marc Langheinrich and Khai N. Truong editors 5th International Conference of Pervasive Computing PERVASIVE volume 4480 of Lecture Notes in Computer Science pages 127--143. Springer 2007.","DOI":"10.1007\/978-3-540-72037-9_8"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/1402660.1402664"},{"key":"e_1_3_2_1_15_1","first-page":"123","volume-title":"VLDB","author":"Capitani di Vimercati Sabrina De","year":"2007","unstructured":"Sabrina De Capitani di Vimercati , Sara Foresti , Sushil Jajodia , Stefano Paraboschi , and Pierangela Samarati . Over-encryption : Management of access control evolution on outsourced data . In VLDB , pages 123 -- 134 , 2007 . Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, and Pierangela Samarati. Over-encryption: Management of access control evolution on outsourced data. In VLDB, pages 123--134, 2007."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1833515.1833621"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133601.2133614"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/11428572_10"}],"event":{"name":"SIGCOMM'13: ACM SIGCOMM 2013 Conference","location":"Hong Kong China","acronym":"SIGCOMM'13","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the second ACM SIGCOMM workshop on Mobile cloud computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2491266.2491272","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2491266.2491272","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:39:38Z","timestamp":1750235978000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2491266.2491272"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8,16]]},"references-count":18,"alternative-id":["10.1145\/2491266.2491272","10.1145\/2491266"],"URL":"https:\/\/doi.org\/10.1145\/2491266.2491272","relation":{},"subject":[],"published":{"date-parts":[[2013,8,16]]},"assertion":[{"value":"2013-08-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}