- {1} Nissanka B. Priyantha, Anit Chakraborty, and Hari Balakrishnan. The cricket location-support system. In Proceedings of the sixth annual international conference on Mobile computing and networking, pages 32-43. ACM Press, 2000. Google ScholarDigital Library
- {2} I. Getting. The global positioning system. IEEE Spectrum , 30(12): 36-47, December 1993.Google ScholarDigital Library
- {3} Mike Spreitzer and Marvin Theimer. Providing location information in a ubiquitous computing environment (panel session). In Proceedings of the fourteenth ACM symposium on Operating systems principles, pages 270- 283. ACM Press, 1993. Google ScholarDigital Library
- {4} Andy Harter, Andy Hopper, Pete Steggles, Andy Ward, and Paul Webster. The anatomy of a context-aware application. In Mobile Computing and Networking, pages 59-68, 1999. Google ScholarDigital Library
- {5} Rui Jose and Nigel Davies. Scalable and flexible location-based services for ubiquitous information access. In Proceedings of First International Symposium on Hand-held and Ubiquitous Computing, HUC'99, pages 52-66. Springer Verlag, 1999.Google ScholarDigital Library
- {6} C. Bisdikian, J. Christensen, J. Davis II, M. Ebling, G. Hunt, W. Jerome, H. Lei, and S. Maes. Enabling location-based applications. In 1st Workshop on Mobile commerce, 2001. Google ScholarDigital Library
- {7} P. A. Karger and Y. Frankel. Security and privacy threats to ITS. In Proceedings of the Second World Congress on Intelligent Transport Systems, volume 5, Yokohama, Japan, Nov 1995.Google Scholar
- {8} Roy Want, Andy Hopper, Veronica Falco, and Jonathan Gibbons. The active badge location system. ACM Transactions on Information Systems (TOIS), 10(1): 91-102, 1992. Google ScholarDigital Library
- {9} Philip E. Agre. Transport informatics and the new landscape of privacy issues. Computer Professionals for Social Responsibility (CPSR) Newsletter, 13(3), 1995.Google Scholar
- {10} Marc Langheinrich. Privacy by design - principles of privacy-aware ubiquitous systems. In G.D. Abowd, B. Brumitt, and S. Shafer, editors, Ubicomp 2001 Proceedings , volume 2201 of Lecture Notes in Computer Science , pages 273-291. Springer, 2001. Google ScholarDigital Library
- {11} Andreas Pfitzmann and Marit Koehntopp. Anonymity, unobservability, and pseudonymity --a proposal for terminology. In Hannes Federrath, editor, Designing Privacy Enhancing Technologies -- Proceedings of the International Workshop on Design Issues in Anonymity and Unobservability, volume 2009 of LNCS. Springer, 2000.Google Scholar
- {12} Michael K. Reiter and Aviel D. Rubin. Crowds: anonymity for Web transactions. ACM Transactions on Information and System Security, 1(1): 66-92, 1998. Google ScholarDigital Library
- {13} D. Goldschlag, M. Reed, and P. Syverson. Onion routing for anonymous and private internet connections. Communications of the ACM (USA), 42(2): 39-41, 1999. Google ScholarDigital Library
- {14} NextBus Information Systems. Nextbus website. 1321 67th Street, Emeryville, CA 94608, USA, http://www.nextbus.com, Oct 2002.Google Scholar
- {15} J. Cuellar, J. Morris, and D. Mulligan. Internet engineering task force geopriv requirements. http://www.ietf.org/html.charters/geopriv-charter.html, Oct 2002. Google ScholarDigital Library
- {16} Sastry Duri, Marco Gruteser, Xuan Liu, Paul Moskowitz, Ronald Perez, Moninder Singh, and Jung-Mu Tang. Framework for security and privacy in automotive telematics. In Proceedings of the second international workshop on Mobile commerce, pages 25-32. ACM Press, 2002. Google ScholarDigital Library
- {17} Jalal Al-Muhtadi, Roy Campbell, Apu Kapadia, M. Dennis Mickunas, and Seung Yi. Routing through the mist: Privacy preserving communication in ubiquitous computing environments. In Proceedigns of IEEE International Conference of Distributed Computing Systems (ICDCS), pages 65-74, Vienna, Austria, Jul 2002. Google ScholarDigital Library
- {18} Asim Smailagic and David Kogan. Location sensing and privacy in a context-aware computing environment. IEEE Wireless Communications, 9(5): 10-17, Oct 2002. Google ScholarDigital Library
- {19} David L. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2): 84-90, 1981. Google ScholarDigital Library
- {20} A. Pfitzmann, B. Pfitzmann, and M. Waidner. Isdnmixes: Untraceable communication with very small bandwidth overhead. In Wolfgang Effelsberg, Hans Werner Meuer, and Günter Müller, editors, Proceedings of Kommunikation in Verteilten Systemen, Grundlagen, Anwendungen, Betrieb, GI/ITG-Fachtagung, volume 267 of Informatik-Fachberichte , Mannheim, Germany, Feb 1991. Springer. Google ScholarDigital Library
- {21} David Goldschlag, Michael Reed, and Paul Syverson. Onion routing. Communications of the ACM, 42(2): 39- 41, 1999. Google ScholarDigital Library
- {22} Anonymizer. Anonymizer website. 5694 Mission Center Road #426, San Diego, CA 92108-4380, http://www.anonymizer.com, 2000.Google Scholar
- {23} Clay Shields and Brian Neil Levine. A protocol for anonymous communication over the internet. In Proceedings of the 7th ACM conference on Computer and communications security, pages 33-42. ACM Press, 2000. Google ScholarDigital Library
- {24} Yong Guan, Xinwen Fu, Riccardo Bettati, and Wei Zhao. A quantitative analysis of anonymous communications. IEEE Transactions on Reliability, (to appear).Google Scholar
- {25} Nabil R. Adam and John C. Worthmann. Security-control methods for statistical databases: a comparative study. ACM Computing Surveys (CSUR), 21(4): 515-556, 1989. Google ScholarDigital Library
- {26} Rakesh Agrawal and Ramakrishnan Srikant. Privacy-preserving data mining. In Proceedings of the ACM SIGMOD Conference on Management of Data, pages 439- 450. ACM Press, May 2000. Google ScholarDigital Library
- {27} Dakshi Agrawal and Charu C. Aggarwal. On the design and quantification of privacy preserving data mining algorithms. In Proceedings of the twentieth ACM SIGMODSIGACT-SIGART symposium on Principles of database systems, pages 247-255. ACM Press, May 2001. Google ScholarDigital Library
- {28} P. Samarati and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical Report SRI-CSL-98-04, Computer Science Laboratory, SRI International, 1998.Google Scholar
- {29} J. Reed, K. Krizman, B. Woerner, and T. Rappaport. An overview of the challenges and progress in meeting the e-911 requirement for location service. IEEE Personal Communications Magazine, 5(3): 30-37, April 1998. Google ScholarDigital Library
- {30} Tele Atlas North America, Inc. Geocode web-site. 1605 Adams Drive, Menlo Park, CA 94025, http://www.geocode.com/, Oct 2002.Google Scholar
- {31} J. A. Simpson and E. S. C. Weiner, editors. Oxford English Dictionary, Second Edition. Clarendon Press, 1989.Google Scholar
- {32} Hanan Samet. The Design and Analysis of Spatial Data Structures. Addison-Wesley, Reading, MA, 1990. Google ScholarDigital Library
- {33} U.S. Geological Survey (USGS). Spatial data transfer standard. 12201 Sunrise Valley Drive, Reston, VA 20192, USA, http://mcmcweb.er.usgs.gov/sdts/, 1995.Google Scholar
- {34} U.S. Geological Survey (USGS). Digital line graph data. 12201 Sunrise Valley Drive, Reston, VA 20192, USA, http://edc.usgs.gov/geodata/, Oct 2002.Google Scholar
- {35} DCROG. Denver regional council of governments: Denver regional travel behavior inventory, 2001. 2480 W. 26th Avenue, Suite 200B, Denver, CO 80211-5580.Google Scholar
- {36} Colorado Department of Transportation. Traffic statistics & data. Public Relations Office, 4201 E Arkansas Ave, Denver, CO 80222, http://www.dot.state.co.us/, Oct 2002.Google Scholar
- Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Recommendations
A peer-to-peer spatial cloaking algorithm for anonymous location-based service
GIS '06: Proceedings of the 14th annual ACM international symposium on Advances in geographic information systemsThis paper tackles a major privacy threat in current location-based services where users have to report their exact locations to the database server in order to obtain their desired services. For example, a mobile user asking about her nearest ...
Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments
This paper tackles a privacy breach in current location-based services (LBS) where mobile users have to report their exact location information to an LBS provider in order to obtain their desired services. For example, a user who wants to issue a query ...
A privacy-aware location cloaking technique reducing bandwidth consumption in location-based services
QUeST '12: Proceedings of the Third ACM SIGSPATIAL International Workshop on Querying and Mining Uncertain Spatio-Temporal DataThe explosive growth of location-detection devices, such as GPS (Global Positioning System), continuously increases users' privacy threat in location-based services (LBSs). However, in order to enjoy such services, the user must precisely disclose his/...
Comments