|
[1]B. Gedik and L. Liu. Location Privacy in Mobile Systems: A Personalized Anonymization Model. In Proceeding of the International Conference on Distributed Computing Systems (ICDCS), pp. 620-629, 2005. [2]C. Chow, M. F. Mokbel. Enabling Private Continuous Queries for Revealed User Locations. In International Symposium on Spatial and Temporal Databases (SSTD), pages 258-275, 2007. [3]C. Chow, M. F. Mokbel, and X. Liu. A Peer-to-peer Spatial Cloaking Algorithm for Anonymous Location-based Service. In International Symposium on Geographic Information Systems (ACM-GIS), pages 171-178, 2006. [4]D. Papadias, J. Zhang, N. Mamoulis, and Y. Tao. Query processing in spatial network databases. In Proceedings of the International Conference on Very Large Data Bases (VLDB), Vol. 29, pp. 802-813, 2003. [5]D. Kifer and J. Gehrke. l-diversity: Privacy beyond k-anonymity. In International Conference on Data Engineering (ICDE), 2006. [6]Fox-News: Man Charged With Stalking Woman Via Phone's GPS. http://www.foxnews.com/us/2010/03/02/man-charged-stalking-woman-phones-gps/ [7]H. Kido, Y. Yanagisawa, and T. Satoh. An Anonymous Communication Technique using Dummies for Location-based Services. In IEEE International Conference on Pervasive Services (ICPS), pp. 1248, 2005. [8]IEEE Spectrum: Stalked by Satellite: An alarming rise in GPS-enabled harassment. http://spectrum.ieee.org/aerospace/satellites/stalked-by-satellite [9]J. I. Hong and J. A. Landay. An architecture for privacy-sensitive ubiquitous computing. In Proceedings of the second international conference on mobile systems, applications, and services (MOBISYS), pp. 177–189, 2004. [10]J. Bao, H. Chen, and W.-S. Ku. Pros: a peer-to-peer system for location privacy protection on road networks. In GIS, pp. 552–553, 2009. [11]K. Mouratidis, M. Yiu. Anonymous Query Processing in Road Networks. IEEE Transactions on Knowledge and Data Engineering (TKDE), 22(1), 2-15, 2010. [12]L. Sweene. k-Anonymity: A Model for Protecting Privacy. In International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems (IJUFKS), 10(5):557-570, 2002. [13]L. Liu. From data privacy to location privacy: Models & Algorithms. Tutorial. In Proceedings of the International Conference on Very Large Data Bases (VLDB), pp. 1429-1430, 2007. [14]M. F. Mokbel, C. Chow, and W. G. Aref. The New Casper: Query Processing for Location Services without Compromising Privacy. In Proceedings of the International Conference on Very Large Data Bases (VLDB), pages 763-774, 2006. [15]M. Gruteser, D. Grunwald. Anonymous Usage of Location-Based Services through Spatial and Temporal Cloaking. In Proceedings of the International Conference on Mobile Systems, Applications, and Services. (MobiSys), pp. 31-42, 2003. [16]M. Duckham and L. Kulik. A Formal Model of Obfuscation and Negotiation for Location Privacy. In Pervasive, pp. 152-170, 2005. [17]M. L. Yiu, C. Jensen, X. Huang, and H. Lu. Spacetwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services. In International Conference on Data Engineering (ICDE), 2008. [18]P.-Y. Li, W.-C. Peng, T.-W. Wang, W.-S. Ku, and J. Xu, A Cloaking Algorithm Based on Spatial Networks for Location Privacy, In Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC), 2008. [19]T. Brinkhoff®. A Framework for Generating Network-Based Moving Objects. GeoInformatica, 6(2):153-180, 2002. [20]T. Wang and L. Liu. Privacy-aware mobile services over road networks. In Proceedings of the International Conference on Very Large Data Bases (VLDB), 2009. [21]W.-S. Ku, R. Zimmermann, W.-C. Peng and S. Shroff. Privacy protected query processing on spatial networks. In IEEE International Conference on Data Engineering (ICDE), pp. 215–220, 2007. [22]李柏逸,「以道路網路狀的遮蓋機制來保護位置隱私權」,碩士論文,國立交通大學資訊科學與工程研究所,新竹 (2007)。
|