{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:14:36Z","timestamp":1750306476561,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,11,3]],"date-time":"2015-11-03T00:00:00Z","timestamp":1446508800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,11,3]]},"DOI":"10.1145\/2830834.2830835","type":"proceedings-article","created":{"date-parts":[[2016,7,5]],"date-time":"2016-07-05T12:23:45Z","timestamp":1467721425000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["A Distributed Approach for Privacy Preservation in the Publication of Trajectory Data"],"prefix":"10.1145","author":[{"given":"Felipe T.","family":"Brito","sequence":"first","affiliation":[{"name":"Federal University of Cear\u00e1"}]},{"given":"Ant\u00f4nio C. Ara\u00fajo","family":"Neto","sequence":"additional","affiliation":[{"name":"Federal University of Cear\u00e1"}]},{"given":"Camila F.","family":"Costa","sequence":"additional","affiliation":[{"name":"Federal University of Cear\u00e1"}]},{"given":"Andr\u00e9 L. C.","family":"Mendon\u00e7a","sequence":"additional","affiliation":[{"name":"Federal University of Cear\u00e1"}]},{"given":"Javam C.","family":"Machado","sequence":"additional","affiliation":[{"name":"Federal University of Cear\u00e1"}]}],"member":"320","published-online":{"date-parts":[[2015,11,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497446"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2031331.2031336"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2505515.2505553"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1015231126594"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382263"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339564"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.07.035"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDEW.2013.6547433"},{"key":"e_1_3_2_1_9_1","first-page":"137","volume-title":"6th Symposium on Operating System Design and Implementation","author":"Dean J.","year":"2004","unstructured":"J. Dean and S. Ghemawat . Mapreduce: Simplified data processing on large clusters . In 6th Symposium on Operating System Design and Implementation , pages 137 -- 150 . USENIX Association , 2004 . J. Dean and S. Ghemawat. Mapreduce: Simplified data processing on large clusters. In 6th Symposium on Operating System Design and Implementation, pages 137--150. USENIX Association, 2004."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","DOI":"10.1201\/9781420091502","volume-title":"Introduction to Privacy-Preserving Data Publishing: Concepts and Techniques","author":"Fung B. C.","year":"2010","unstructured":"B. C. Fung , K. Wang , A. W.-C. Fu , and P. S. Yu . Introduction to Privacy-Preserving Data Publishing: Concepts and Techniques . 1 st edition, 2010 . B. C. Fung, K. Wang, A. W.-C. Fu, and P. S. Yu. Introduction to Privacy-Preserving Data Publishing: Concepts and Techniques. 1st edition, 2010.","edition":"1"},{"key":"e_1_3_2_1_12_1","volume-title":"Computers and Intractability: A Guide to the Theory of NP-Completeness","author":"Garey M. R.","year":"1979","unstructured":"M. R. Garey and D. S. Johnson . Computers and Intractability: A Guide to the Theory of NP-Completeness . W. H. Freeman , 1979 . M. R. Garey and D. S. Johnson. Computers and Intractability: A Guide to the Theory of NP-Completeness. W. H. Freeman, 1979."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2013.6544932"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2007.07.001"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367856"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1055558.1055591"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1645953.1646140"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/1556406.1556410"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2013.66"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2013.136"},{"issue":"2","key":"e_1_3_2_1_22_1","first-page":"165","article-title":"Apriori-based algorithms for km-anonymizing trajectory data","volume":"7","author":"Poulis G.","year":"2014","unstructured":"G. Poulis , S. Skiadopoulos , G. Loukides , and A. Gkoulalas-Divanis . Apriori-based algorithms for km-anonymizing trajectory data . Transactions on Data Privacy , 7 ( 2 ): 165 -- 194 , 2014 . G. Poulis, S. Skiadopoulos, G. Loukides, and A. Gkoulalas-Divanis. Apriori-based algorithms for km-anonymizing trajectory data. Transactions on Data Privacy, 7(2):165--194, 2014.","journal-title":"Transactions on Data Privacy"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/645337.650382"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2008.29"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-010-0192-8"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2012.12.003"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1516360.1516370"}],"event":{"name":"SIGSPATIAL'15: 23rd SIGSPATIAL International Conference on Advances in Geographic Information Systems","sponsor":["SIGSPATIAL ACM Special Interest Group on Spatial Information","SIGGRAPH ACM Special Interest Group on Computer Graphics and Interactive Techniques"],"location":"Bellevue WA USA","acronym":"SIGSPATIAL'15"},"container-title":["Proceedings of the 2nd Workshop on Privacy in Geographic Information Collection and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2830834.2830835","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2830834.2830835","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:12Z","timestamp":1750225692000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2830834.2830835"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11,3]]},"references-count":28,"alternative-id":["10.1145\/2830834.2830835","10.1145\/2830834"],"URL":"https:\/\/doi.org\/10.1145\/2830834.2830835","relation":{},"subject":[],"published":{"date-parts":[[2015,11,3]]},"assertion":[{"value":"2015-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}