Revision en privacidad en servicios basados en localizacion

Unknown English OPEN
Zurbaran*, Mayra ; Gonzalez, Liliana ; Wightman Rojas, Pedro ; Labrador, M. (2014)
  • Publisher: Fundación Universidad del Norte
  • Subject: busqueda de puntos de interes | points of interest search | rastreo de localizacion | intercambio privado de informacion | location privacy | private information retrieval | privacidad de localizacion | location obfuscation | location tracking | ofuscacion de localizacion

Location services have become popular over the last years due to the global adoption of smartphones and the worldwide availability of the Global Positioning System (GPS) and other positioning methods. Location-based services (LBSs) offer relevant information to users ba... View more
  • References (51)
    51 references, page 1 of 6

    [1] C. L. Bowen III and T. L. Martin, “A survey of location privacy and an approach for solitary users”, in System Sciences, 2007. HICSS 2007. 40th Annual Hawaii International Conference on, 2007, p. 163c-163c.

    [2] C. Ardagna, M. Cremonini, S. De Capitani di Vimercati, and P. Samarati, “An Obfuscation-Based Approach for Protecting Location Privacy”, IEEE Transactions on Dependable and Secure Computing, vol. 8, n° 1, pp. 13-27, Jan. 2011.

    [3] P. Bellavista, A. Kupper, and S. Helal, “Location-Based Services: Back to the Future,” IEEE Pervasive Computing, vol. 7, n° 2, pp. 85-89, Apr. 2008.

    [4] A. R. Beresford and F. Stajano, “Mix zones: User privacy in location-aware services”, in Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second IEEE Annual Conference on, 2004, pp. 127-131.

    [5] J. Appelbaum, M. Ray, K. Koscher, and I. Finder, “vpwns: Virtual pwned networks”, in 2nd Workshop on Free and Open Communications on the Internet, 2012.

    [6] California Location Privacy Act, 2012.

    [7] Y. Che, Q. Yang, and X. Hong, “A dual-active spatial cloaking algorithm for location privacy preserving in mobile peer-to-peer networks”, in Wireless Communications and Networking Conference (WCNC), 2012 IEEE, 2012, pp. 209-2102.

    [8] M. Duckham and L. Kulik, “A formal model of obfuscation and negotiation for location privacy,” in Pervasive Computing. Springer, 2005, pp. 152-170.

    [9] C.-Y. Chow, M. F. Mokbel, and W. G. Aref, “Casper*: Query processing for location services without compromising privacy”, ACM Transactions on Database Systems, vol. 34, n° 4, pp. 1- 48, Dec. 2009.

    [10] B. Chor and N. Gilboa, “Computationally private information retrieval”, 1997, pp. 304-313.

  • Metrics
    No metrics available
Share - Bookmark