Computer Science ›› 2013, Vol. 40 ›› Issue (8): 115-118.
Previous Articles Next Articles
HOU Shi-jiang,ZHANG Yu-jiang and LIU Guo-hua
[1] Agrawal D,Aggarwal C C.On the design and quantification of privacy preserving data mining algorithms [C]∥Proceedings of the Twentieth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems.2001:247-255 [2] Ahmadi H,Pham N,Ganti R,et al.Privacy-aware regression modeling of participatory sensing data [C]∥Procee-dings of the 8th ACM Conference on Embedded Networked Sensor Systems.2010:99-112 [3] Sweeney L.K-anonymity:a model for protecting privacy [J].International Journal of Uncertainty,Fuzziness and Knowledge-Based Systems,2002,10(5):557-570 [4] Mokbel M F,Chow C Y,Aref W G.The new casper:query processing for location services without compromising privacy[C]∥Proceedings of the 32nd International Conference on Very Large Data Bases.2006:763-774 [5] Gruteser M,Grunwald D.Anonymous usage of location- basedservices through spatial and temporal cloaking [C]∥Procee-dings of the 1st International Conference on Mobile Systems,Applications and Services.2003:31-42 [6] Kalnis P,Ghinita G,Mouratidis K,et al.Preventing location-based identity inference in anonymous spatial queries [J].IEEE Transactions on Knowledge and Data Engineering,2007,19(12):1719-1733 [7] Butz A R.Alternative algorithm for hilbert’s space- filling curve [J].IEEE Transactions on Computers,1971,C-2(4):424-426 [8] Gedik B,Liu L.Location privacy in mobile systems:a persona-lized anonymization model [C]∥Proceedings of 25th IEEE International Conference on Distributed Computing Systems.2005:620-629 [9] Cheng R,Zhang Y,Bertino E,et al.Preserving user location privacy in mobile data management infrastructures [J].Privacy Enhancing Technologies,2006,4258:393-412 [10] Khoshgozaran A,Shahabi C.Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy [J].Advances in Spatial and Temporal Databases,2007,4605:239-257 [11] Hoh B,Gruteser M.Protecting location privacy through pathconfusion [C]∥First International Conference on Security and Privacy for Emerging Areas in Communications Networks.2005:194-205 [12] Ghinita G,Kalnis P,Khoshgozaran A,et al.Private queries inlocation based services:anonymizers are not necessary [C]∥SIGMOD.2008:121-132 [13] Khoshgozaran A,Shahabi C,Shirani-Mehr H.Location privacy:going beyond k-anonymity,cloaking and anonymizers [J].Knowledge and Information Systems,2011,26(3):435-465 [14] Ghinita G,Kalnis P,Kantarcioglu M,et al.Approximate andexacthybrid algorithms for private nearest-neighbor queries with database protection [J].GeoInformatica,2011,15(4):699-726 [15] Mouratidis K,Yiu M L.Anonymous query processing in roadnetworks [J].IEEE Transaction on Knowledge and Data Engineering,2010,22(1):2-15 [16] Chow C Y,Mokbel M F,Liu X.Query-aware location anony-mization for road networks [J].GeoInformatica,2011,15(3):571-607 [17] Datar M,Indyk P.Locality-sensitive hashing scheme based on p-stable distributions [C]∥Proceedings of the Twentieth Annual Symposium on Computational Geometry.2004:253-262 |
No related articles found! |
|