Supporting anonymous location queries in mobile environments with privacygrid
This paper presents PrivacyGrid-a framework for supporting anonymous location-based
queries in mobile information delivery systems. The PrivacyGrid framework offers three …
queries in mobile information delivery systems. The PrivacyGrid framework offers three …
Location privacy-an overview
M Decker - 2008 7th International Conference on Mobile …, 2008 - ieeexplore.ieee.org
Location-based services (LBS) are mobile services which evaluate knowledge about a
user's location. In most cases this is done to provide the user with personalized information …
user's location. In most cases this is done to provide the user with personalized information …
[PDF][PDF] From Data Privacy to Location Privacy: Models and Algorithms.
L Liu - VLDB, 2007 - vldb.org
This tutorial presents the definition, the models and the techniques of location privacy from
the data privacy perspective. By reviewing and revising the state of art research in data …
the data privacy perspective. By reviewing and revising the state of art research in data …
Mobile cloud computing based privacy protection in location‐based information survey applications
Nowadays, location‐based service (LBS) has become pervasive. Given its high utility value,
LBS, however, presents serious privacy concerns for cautious users. In this paper, we …
LBS, however, presents serious privacy concerns for cautious users. In this paper, we …
A new cloaking method supporting both k-anonymity and l-diversity for privacy protection in location-based service
JH Um, MY Jang, KJ Jo… - 2009 IEEE International …, 2009 - ieeexplore.ieee.org
In Location-Based Services (LBSs), users send location-based queries to LBS servers along
with their exact locations, but the location information of the users can be misused by …
with their exact locations, but the location information of the users can be misused by …
A new K-NN query processing algorithm enhancing privacy protection in location-based services
MY Jang, SJ Jang, JW Chang - 2012 ieee first international …, 2012 - ieeexplore.ieee.org
Location-Based Services (LBSs) are becoming popular due to the advances in mobile
networks and positioning capabilities. When a user sends a query with his exact location to …
networks and positioning capabilities. When a user sends a query with his exact location to …
[LIVRE][B] Privatheit und Datenschutz in der intelligenten Überwachung: Ein datenschutzgewährendes System, entworfen nach dem" Privacy by Design" Prinzip
HH Vagts - 2014 - books.google.com
Überwachungssysteme haben sich in den letzten Jahren zu intelligenten Anlagen
entwickelt. Sie erzeugen eine große Menge von sensiblen Informationen. Die rechtlichen …
entwickelt. Sie erzeugen eine große Menge von sensiblen Informationen. Die rechtlichen …
Methods and systems for determining protected location information based on temporal correlations
The systems and methods can provide location privacy protection by incorporating temporal
correlations of a user's locations. The method may include obtaining a first location of a user …
correlations of a user's locations. The method may include obtaining a first location of a user …
Cloaking method supporting K-anonymity and L-diversity for privacy protection in location-based services
JH Kim, AR Lee, YK Kim, JH Um… - Journal of Korea Spatial …, 2008 - koreascience.kr
In wireless internet, the location information of the user is one of the important resources for
many applications. One of these applications is Location-Based Services (LBSs) which are …
many applications. One of these applications is Location-Based Services (LBSs) which are …
A design of cloaking region using dummy for privacy information protection on location-based services
JY Kim, EH Jeong, BK Lee - The Journal of Korean Institute of …, 2011 - koreascience.kr
The setting algorithm of cloaking region using dummy which is proposed in this paper solves
the problem which counts the building with duplication that exists in several cells of Privacy …
the problem which counts the building with duplication that exists in several cells of Privacy …