Sciweavers

125 search results - page 15 / 25
» Non-Exposure Location Anonymity
Sort
View
VLDB
2007
ACM
295views Database» more  VLDB 2007»
14 years 4 months ago
From Data Privacy to Location Privacy: Models and Algorithms
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in ...
Ling Liu
SUTC
2008
IEEE
14 years 4 months ago
A Cloaking Algorithm Based on Spatial Networks for Location Privacy
Most of research efforts have elaborated on k-anonymity for location privacy. The general architecture for implementing k-anonymity is that there is one trusted server (referred t...
Po-Yi Li, Wen-Chih Peng, Tsung-Wei Wang, Wei-Shinn...
SDM
2009
SIAM
125views Data Mining» more  SDM 2009»
14 years 7 months ago
Identifying Unsafe Routes for Network-Based Trajectory Privacy.
In this paper, we propose a privacy model that offers trajectory privacy to the requesters of Location-Based Services (LBSs), by utilizing an underlying network of user movement. ...
Aris Gkoulalas-Divanis, Mohamed F. Mokbel, Vassili...
MDM
2007
Springer
14 years 4 months ago
A Comparison of Spatial Generalization Algorithms for LBS Privacy Preservation
Spatial generalization has been recently proposed as a technique for the anonymization of requests in location based services. This paper presents the results of an extensive expe...
Sergio Mascetti, Claudio Bettini
GIS
2009
ACM
14 years 11 months ago
PROS: A Peer-to-Peer System for Location Privacy Protection on Road Networks
The k-anonymity technique is widely used to provide location privacy protection for accessing location-based services (LBS), i.e., the exact location of a query initiator is cloak...
Jie Bao 0003, Haiquan Chen, Wei-Shinn Ku