User menu

Privacy-aware location database service for granular queries

Bibliographic reference Kiyomoto, S. ; Martin, K.M. ; Fukushima, K.. Privacy-aware location database service for granular queries.Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks. Third IFIP WG11.2 International Workshop, WISTP 2009 (Brussels, Belgium, 1-4 September 2009). In: Markowitch, O.; Bilas, A.; Hoepman, J.-H.; Mitchell, C.J.; Quisquater, J.-J.;, Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks. Third IFIP WG11.2 International Workshop, WISTP 2009, Springer verlag2009, p. 28-37
Permanent URL
  1. Bamba Bhuvan, Liu Ling, Pesti Peter, Wang Ting, Supporting anonymous location queries in mobile environments with privacygrid, 10.1145/1367497.1367531
  2. Bellare Mihir, Boldyreva Alexandra, O’Neill Adam, Deterministic and Efficiently Searchable Encryption, Advances in Cryptology - CRYPTO 2007 ISBN:9783540741428 p.535-552, 10.1007/978-3-540-74143-5_30
  3. Beresford A.R., Stajano F., Location privacy in pervasive computing, 10.1109/mprv.2003.1186725
  4. Boneh Dan, Waters Brent, Conjunctive, Subset, and Range Queries on Encrypted Data, Theory of Cryptography ISBN:9783540709350 p.535-554, 10.1007/978-3-540-70936-7_29
  5. Gasarch, W.: A survey on private information retrieval. Bulletin of the EATCS 82, 72–107 (2004)
  6. Gedik, M., Liu, L.: A customizable k-anonymity model for protecting location privacy. In: Proc. of the 25th International Conference on Distributed Computing Systems (ICDCS 2005), pp. 620–629 (2005)
  7. Ghinita Gabriel, Kalnis Panos, Skiadopoulos Spiros, PRIVE : anonymous location-based queries in distributed mobile systems, 10.1145/1242572.1242623
  8. Gruteser Marco, Grunwald Dirk, Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking, 10.1145/1066116.1189037
  9. Hong Jason I., Landay James A., An architecture for privacy-sensitive ubiquitous computing, 10.1145/990064.990087
  10. Kido H., Yanagisawa Y., Satoh T., An anonymous communication technique using dummies for location-based services, 10.1109/perser.2005.1506394
  11. Lamport Leslie, Password authentication with insecure communication, 10.1145/358790.358797
  12. Mascetti Sergio, Bettini Claudio, A Comparison of Spatial Generalization Algorithms for LBS Privacy Preservation, 10.1109/mdm.2007.54
  13. Mokbel M.F., Towards Privacy-Aware Location-Based Database Servers, 10.1109/icdew.2006.152
  14. Mokbel, M.F., Chow, C.Y., Aref, W.G.: The new casper: Query processing for location services without compromising privacy. In: Proc. of the 32nd International Conference on Very Large Data Bases (VLDB 2006), pp. 763–774 (2006)
  15. Samarati Pierangela, Sweeney Latanya, Generalizing data to provide anonymity when disclosing information (abstract), 10.1145/275487.275508
  16. Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proc. of IEEE Symposium on Security and Privacy 2000, pp. 44–55 (2000)