Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Concepts for personal location privacy policies
Proceedings of the 3rd ACM conference on Electronic Commerce
Identity management and its support of multilateral security
Computer Networks: The International Journal of Computer and Telecommunications Networking
Location Privacy in Pervasive Computing
IEEE Pervasive Computing
ESORICS '98 Proceedings of the 5th European Symposium on Research in Computer Security
Location Aggregation from Multiple Sources
MDM '02 Proceedings of the Third International Conference on Mobile Data Management
Usability meets security - the Identity-Manager as your personal security assistant for the Internet
ACSAC '00 Proceedings of the 16th Annual Computer Security Applications Conference
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
A privacy enhancing mechanism based on pseudonyms for identity protection in location-based services
ACSW '07 Proceedings of the fifth Australasian symposium on ACSW frontiers - Volume 68
Journal of Theoretical and Applied Electronic Commerce Research
Location privacy based on trusted computing and secure logging
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Towards inclusive identity management
Identity in the Information Society
Re-identifying anonymous nodes
LoCA'06 Proceedings of the Second international conference on Location- and Context-Awareness
Hi-index | 0.00 |
Location based services (LBS) are distributed multi-party infrastructures with the opportunity to generate profitable m-business applications. Also, LBS pose a great risk for their users' privacy, as they have access to private information about a person's whereabouts in a particular context. As location data is the essential input for LBS, protection of privacy in LBS is not a problem of providing anonymity by supressing data release, but a problem of identity management and control over information handling. In this paper we show a solution that ensures a LBS user's control over location information with managed identities. At the same time, our solution enables profitable business models, e.g. for mobile telephony operators. Additionally, we provide fine-grained consent management for the LBS user.