[1]Mokbel M F, Chow C Y, Aref W G. The new Casper:Query processing for location services without compromising privacy[C]∥Proc of the 32nd International Conference on Very Large Data Bases, 2006:763774.
[2]Gruteser M,Grunwald D.Anonymous usage of locationbased services through spatial and temporal cloaking[C]∥Proc of the 1st International Conference on Mobile Systems, Applications and Services, 2003:3142.
[3]Gedik B, Liu L. A customizable kanonymity model for protecting location privacy[C]∥Proc of ICDC’04, 2004:620629.
[4]Pan Xiao, Hao Xing, Meng Xiaofeng. Privacy preserving towards continuous query in locationbased services[J]. Journal of Computer Research and Development, 2010, 47(1):121129.(in Chinese)
[5]Lin Xin,Li Shanping,Yang Zhaohui.Attacking algorithms against continuous queries in LBS and anonymity measurement[J]. Journal of Software, 2009, 20(4):10581068.(in Chinese)
[6]Xu J,Tang X,Hu H,et al.Privacyconscious locationbased queries in mobile environments[J]. IEEE Transactions on Parallel and Distributed Systems, 2010, 21(3):313326.
[7]Pan X, Xu J, Meng X. Protecting location privacy against locationdependent attacks in mobile services[J]. IEEE Transactions on Knowledge and Data Engineering, 2012, 24(8):15061519.
[8]Kido H, Yanagisawa Y, Satoh T. An anonymous communication technique using dummies for locationbased services[C]∥Proc of International Conference on Pervasive Services, 2005:8897.
[9]Yiu M L, Jensen C S, Huang X, et al. Spacetwist:Managing the tradeoffs among location privacy, query performance, and query accuracy in mobile services[C]∥Proc of IEEE 24th International Conference on Data Engineering, 2008:366375.
[10]Liu L. From data privacy to location privacy:Models and algorithms[C]∥Proc of the 33rd International Conference on Very Large Data Bases, 2007:14291430.
[11]Chow C Y, Mokbel M F. Enabling private continuous queries for revealed user locations[C]∥Proc of the 10th International Symposium on Advances in Spatial and Temporal Databases, 2007:258275.
附中文参考文献:
[4]潘晓, 郝兴, 孟小峰. 基于位置服务中的连续查询隐私保护研究[J].计算机研究与发展,2010, 47(1):121129.
[5]林欣,李善平,杨朝晖.LBS中连续查询攻击算法及匿名性度量[J].软件学报, 2009, 20(4):10581068. |