Techniques for addressing fundamental privacy and disruption tradeoffs in awareness support systems
CSCW '96 Proceedings of the 1996 ACM conference on Computer supported cooperative work
Privacy in e-commerce: examining user scenarios and privacy preferences
Proceedings of the 1st ACM conference on Electronic commerce
Anonymity, unobservability, and pseudeonymity — a proposal for terminology
International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability
Concepts for personal location privacy policies
Proceedings of the 3rd ACM conference on Electronic Commerce
Framework for security and privacy in automotive telematics
WMC '02 Proceedings of the 2nd international workshop on Mobile commerce
Location Privacy in Pervasive Computing
IEEE Pervasive Computing
Preserving Privacy in Environments with Location-Based Applications
IEEE Pervasive Computing
Location-Aware Information Delivery with ComMotion
HUC '00 Proceedings of the 2nd international symposium on Handheld and Ubiquitous Computing
GeoNotes: Social and Navigational Aspects of Location-Based Information Systems
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
A Privacy Awareness System for Ubiquitous Computing Environments
UbiComp '02 Proceedings of the 4th international conference on Ubiquitous Computing
Geoinformatica
User needs for location-aware mobile services
Personal and Ubiquitous Computing
Algorithms in Java, Part 5: Graph Algorithms
Algorithms in Java, Part 5: Graph Algorithms
Wireless Location Privacy Protection
Computer
An architecture for privacy-sensitive ubiquitous computing
Proceedings of the 2nd international conference on Mobile systems, applications, and services
GIS: A Computing Perspective, 2nd Edition
GIS: A Computing Perspective, 2nd Edition
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Human-Computer Interaction
A formal privacy system and its application to location based services
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
Keeping ubiquitous computing to yourself: a practical model for user control of privacy
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
The new Casper: query processing for location services without compromising privacy
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
Reasoning about obfuscated private information: who have lied and how to lie
Proceedings of the 5th ACM workshop on Privacy in electronic society
A peer-to-peer spatial cloaking algorithm for anonymous location-based service
GIS '06 Proceedings of the 14th annual ACM international symposium on Advances in geographic information systems
End-user privacy in human-computer interaction
Foundations and Trends in Human-Computer Interaction
Supporting anonymous location queries in mobile environments with privacygrid
Proceedings of the 17th international conference on World Wide Web
Measuring self-disclosure online: Blurring and non-response to sensitive items in web-based surveys
Computers in Human Behavior
Proceedings of the 10th international conference on Human computer interaction with mobile devices and services
Special issue on privacy aware and location-based mobile services
Journal of Location Based Services - Privacy Aware and Location-Based Mobile Services
Towards trajectory anonymization: a generalization-based approach
SPRINGL '08 Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS
Landscape-aware location-privacy protection in location-based services
Journal of Systems Architecture: the EUROMICRO Journal
Towards a landmark influence framework to protect location privacy
Proceedings of the 2009 ACM symposium on Applied Computing
Information Security and Cryptology --- ICISC 2008
AnonySense: Opportunistic and Privacy-Preserving Context Collection
Pervasive '08 Proceedings of the 6th International Conference on Pervasive Computing
Towards Trajectory Anonymization: a Generalization-Based Approach
Transactions on Data Privacy
Realistic Driving Trips For Location Privacy
Pervasive '09 Proceedings of the 7th International Conference on Pervasive Computing
Towards Ontology-Based Formal Verification Methods for Context Aware Systems
Pervasive '09 Proceedings of the 7th International Conference on Pervasive Computing
On the Anonymity of Home/Work Location Pairs
Pervasive '09 Proceedings of the 7th International Conference on Pervasive Computing
Privacy for real-time location-based services
SIGSPATIAL Special
Privacy and location anonymization in location-based services
SIGSPATIAL Special
A survey of computational location privacy
Personal and Ubiquitous Computing
Spatial Cloaking Revisited: Distinguishing Information Leakage from Anonymity
SSTD '09 Proceedings of the 11th International Symposium on Advances in Spatial and Temporal Databases
Privately querying location-based services with SybilQuery
Proceedings of the 11th international conference on Ubiquitous computing
Casper*: Query processing for location services without compromising privacy
ACM Transactions on Database Systems (TODS)
PAD: privacy-area aware, dummy-based location privacy in mobile services
Proceedings of the Seventh ACM International Workshop on Data Engineering for Wireless and Mobile Access
Navigational path privacy protection: navigational path privacy protection
Proceedings of the 18th ACM conference on Information and knowledge management
A distortion-based metric for location privacy
Proceedings of the 8th ACM workshop on Privacy in the electronic society
Protecting location privacy against spatial inferences: the PROBE approach
Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS
Private location-based information retrieval through user collaboration
Computer Communications
Location privacy protection through obfuscation-based techniques
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
Safeguarding location privacy in wireless ad-hoc networks
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Processing location-dependent queries with location granules
OTM'07 Proceedings of the 2007 OTM Confederated international conference on On the move to meaningful internet systems - Volume Part II
Enabling private continuous queries for revealed user locations
SSTD'07 Proceedings of the 10th international conference on Advances in spatial and temporal databases
Providing location privacy in pervasive computing through a hybrid mechanism
International Journal of Internet Technology and Secured Transactions
Spatio-temporal database research at the University of Melbourne
ACM SIGMOD Record
The PROBE Framework for the Personalized Cloaking of Private Locations
Transactions on Data Privacy
Moving forward: location privacy and location awareness
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
A pervasive P3P-based negotiation mechanism for privacy-aware pervasive e-commerce
Decision Support Systems
A taxonomy of approaches to preserve location privacy in location-based services
International Journal of Computational Science and Engineering
Nearest neighbor search with strong location privacy
Proceedings of the VLDB Endowment
"Don't trust anyone": Privacy protection for location-based services
Pervasive and Mobile Computing
Design and analysis of a ranking approach to private location-based services
ACM Transactions on Database Systems (TODS)
Privacy-aware collection of aggregate spatial data
Data & Knowledge Engineering
Journal of Systems and Software
Query-aware location anonymization for road networks
Geoinformatica
Location Privacy: Privacy, Efficiency and Recourse through a Prohibitive Contract
Transactions on Data Privacy
Third party geolocation services in LBS: privacy requirements and research issues
Transactions on Data Privacy
On the limitations of query obfuscation techniques for location privacy
Proceedings of the 13th international conference on Ubiquitous computing
Privacy preservation in the dissemination of location data
ACM SIGKDD Explorations Newsletter
Trajectory privacy in location-based services and data publication
ACM SIGKDD Explorations Newsletter
Trajectory anonymity in publishing personal mobility data
ACM SIGKDD Explorations Newsletter
Quantifying location privacy: the case of sporadic location exposure
PETS'11 Proceedings of the 11th international conference on Privacy enhancing technologies
Cover locations: availing location-based services without revealing the location
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society
A moving-object index for efficient query processing with peer-wise location privacy
Proceedings of the VLDB Endowment
Assessing location privacy in mobile communication networks
ISC'11 Proceedings of the 14th international conference on Information security
Anonymous user tracking for location-based community services
LoCA'06 Proceedings of the Second international conference on Location- and Context-Awareness
Towards TTP-free lightweight solution for location privacy using location-based anonymity prediction
Proceedings of the 2011 ACM Symposium on Research in Applied Computation
A user-centric privacy framework for pervasive environments
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part II
Simulation of obfuscation and negotiation for location privacy
COSIT'05 Proceedings of the 2005 international conference on Spatial Information Theory
Temporal context lie detection and generation
SDM'06 Proceedings of the Third VLDB international conference on Secure Data Management
A spatiotemporal model of strategies and counter strategies for location privacy protection
GIScience'06 Proceedings of the 4th international conference on Geographic Information Science
A spatial cloaking framework based on range search for nearest neighbor search
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
An open design privacy-enhancing platform supporting location-based applications
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication
ACM SIGAPP Applied Computing Review
Using middleware as a certifying authority in LBS applications
DNIS'11 Proceedings of the 7th international conference on Databases in Networked Information Systems
Shortest path computation with no information leakage
Proceedings of the VLDB Endowment
A context-aware scheme for privacy-preserving location-based services
Computer Networks: The International Journal of Computer and Telecommunications Networking
Uniform obfuscation for location privacy
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
Journal of Systems Architecture: the EUROMICRO Journal
A privacy-by-design approach to location sharing
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
On location privacy and quality of information in participatory sensing
Proceedings of the 8h ACM symposium on QoS and security for wireless and mobile networks
Hilbert-order based spatial cloaking algorithm in road network
Concurrency and Computation: Practice & Experience
A dummy-based anonymization method based on user trajectory with pauses
Proceedings of the 20th International Conference on Advances in Geographic Information Systems
Countering overlapping rectangle privacy attack for moving kNN queries
Information Systems
Anonymous spatial query on non-uniform data
Proceedings of the 14th International Conference on Information Integration and Web-based Applications & Services
Semantic Bob-tree: a new obfuscation technique for location privacy protection
Proceedings of the 10th International Conference on Advances in Mobile Computing & Multimedia
Differential private trajectory protection of moving objects
Proceedings of the Third ACM SIGSPATIAL International Workshop on GeoStreaming
Streaming driving behavior data
Proceedings of the Third ACM SIGSPATIAL International Workshop on GeoStreaming
ICT-EurAsia'13 Proceedings of the 2013 international conference on Information and Communication Technology
Semantic-Aware obfuscation for location privacy at database level
ICT-EurAsia'13 Proceedings of the 2013 international conference on Information and Communication Technology
PShare: Ensuring location privacy in non-trusted systems through multi-secret sharing
Pervasive and Mobile Computing
Enabling secure location-based services in mobile cloud computing
Proceedings of the second ACM SIGCOMM workshop on Mobile cloud computing
Semantic trajectories modeling and analysis
ACM Computing Surveys (CSUR)
Geo-indistinguishability: differential privacy for location-based systems
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Modeling and Respecting Privacy Specification when Composing DaaS Services*
International Journal of Web Services Research
Location anonymization using real car trace data for location based services
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication
Crowdsourcing privacy preferences in context-aware applications
Personal and Ubiquitous Computing
A classification of location privacy attacks and approaches
Personal and Ubiquitous Computing
A profile anonymization model for location-based services
Journal of Computer Security
Hi-index | 0.00 |
Obfuscation concerns the practice of deliberately degrading the quality of information in some way, so as to protect the privacy of the individual to whom that information refers. In this paper, we argue that obfuscation is an important technique for protecting an individual's location privacy within a pervasive computing environment. The paper sets out a formal framework within which obfuscated location-based services are defined. This framework provides a computationally efficient mechanism for balancing an individual's need for high-quality information services against that individual's need for location privacy. Negotiation is used to ensure that a location-based service provider receives only the information it needs to know in order to provide a service of satisfactory quality. The results of this work have implications for numerous applications of mobile and location-aware systems, as they provide a new theoretical foundation for addressing the privacy concerns that are acknowledged to be retarding the widespread acceptance and use of location-based services.