Concepts for personal location privacy policies
Proceedings of the 3rd ACM conference on Electronic Commerce
Unpacking "privacy" for a networked world
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Location disclosure to social relations: why, when, & what people want to share
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Location Privacy in Mobile Systems: A Personalized Anonymization Model
ICDCS '05 Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
The new Casper: query processing for location services without compromising privacy
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
A peer-to-peer spatial cloaking algorithm for anonymous location-based service
GIS '06 Proceedings of the 14th annual ACM international symposium on Advances in geographic information systems
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
Social disclosure of place: from location technology to communication practices
PERVASIVE'05 Proceedings of the Third international conference on Pervasive Computing
Towards Achieving Personalized Privacy for Location-Based Services
Transactions on Data Privacy
Hi-index | 0.00 |
With the growth of wireless and mobile technologies, we are witnessing an increase in location-based services (LBS). Although LBS provide enhanced functionalities, they open up new vulnerabilities that can be exploited to cause security and privacy breaches. Specifically, location data of individuals that are used by such services must be protected from security and privacy breaches. Such services will require new models for expressing privacy preferences for location data and mechanisms for enforcing them. We identify the factors on which location privacy depends and propose a scalable model for expressing privacy that can be used for LBS and other applications where the privacy of location information must be protected.