[1]〖ZK(#〗ILARRI S, MENA E, ILLARRAMENDI A. Locationdependent query processing: Where we are and where we are heading[J]. ACM Computing Surveys (CSUR), 2010, 42(3):12.[2]PERUSCO L, MICHAEL K. Control, trust, privacy, and security: Evaluating locationbased services[J]. IEEE Technology and Society Magazine, 2007, 26(1): 416.[3]SCHILLER J H, VOISARD A. LocationBased Services[M]. San Francisco: Morgan Kaufmann, 2004.[4]VEIJALAINEN J, WESKE M. Modeling static aspects of mobile electronic commerce environments[M]//Advances in Mobile Commerce Technologies. \[s.l.\]: IGI Publishing, 2003: 137170.[5]BARNES R, LEPINSKI M, COOPER A, et al. An architecture for location and location privacy in internet applications[R]. BCP 160, RFC 6280, 2011.[6]KALNIS P, GHINITA G, MOURATIDIS K, et al. Preventing locationbased identity inference in anonymous spatial queries[J]. IEEE Transactions on Knowledge and Data Engineering, 2007, 19(12): 17191733.[7]XIONG X, MOKBEL M F, AREF W G. Seacnn: Scalable processing of continuous knearest neighbor queries in spatiotemporal databases[C]//Proceedings of the 21st International Conference on Data Engineering. IEEE, 2005: 643654.[8]DAMIANI M L, BERTINO E, SILVESTRI C. The PROBE framework for the personalized cloaking of private locations[J]. Transactions on Data Privacy, 2010, 3(2): 123148.[9]GHINITA G, KALNIS P, SKIADOPOULOS S. Prive: Anonymous locationbased queries in distributed mobile systems[C]//Proceedings of the 16th International Conference on World Wide Web. ACM, 2007: 371380.[10]CHE Y, CHIEW K, HONG X, et al. SALS: semanticsaware location sharing based on cloaking zone in mobile social networks[C]//Proceedings of the 1st ACM SIGSPATIAL International Workshop on Mobile Geographic Information Systems. ACM, 2012: 4956.[11]NERGIZ M E, ATZORI M, SAYGIN Y, et al. Towards trajectory anonymization:A generalizationbased approach[J]. IEEE Transactions on Data Privacy, 2009, 2(1):4775.[12]CHENG R, ZHANG Y, BERTINO E, et al. Preserving user location privacy in mobile data management infrastructures[M]//Privacy Enhancing Technologies. Berlin: Springer, 2006: 393412.[13]GRUTESER M, GRUNWALD D. Anonymous usage of locationbased services through spatial and temporal cloaking[C]//Proceedings of the 1st International Conference on Mobile Systems, Applications and Services. ACM, 2003: 3142.[14]XIAO Z, MENG X, XU J. Quality aware privacy protection for locationbased services[M]//Advances in Databases: Concepts, Systems and Applications. Berlin: Springer, 2007: 434446.[15]HONG J I, LANDAY J A. An architecture for privacysensitive ubiquitous computing[C]//Processing of the 2nd International Conference on Mobile Systems, Applications, and Services. ACM, 2004, 177189.[16]CHAUM D. Untraceable electronic mail, return addresses, and digital pseudonyms[J]. Communications of the ACM, 1981: 24(2):8490.[17]BERESFORD A R, STAJANO F. Location privacy in pervasive computing[J]. IEEE Pervasive computing, 2003, 2(1): 4655.[18]HEECHANG SHIN, ATLURI V, VAIDYA J. A profile anonymization model for privacy in a personalized locationbased service environment[C]// Proceedings of the 9th International Conference on Mobile Data Management. IEEE, 2008: 7380.[19]SHIN K G, JU X, CHEN Z, et al. Privacy protection for users of locationbased services[J]. IEEE Wireless Communications, 2012, 19(1): 3039.[20]DUCKHAM M, KULIK L. A formal model of obfuscation and negotiation for location privacy[M]//Pervasive Computing. Berlin: Springer, 2005: 152170.[21]CHOW C Y, MOKBEL M F, LIU X. A peertopeer spatial cloaking algorithm for anonymous locationbased service[C]//Proceedings of the 14th Annual ACM International Symposium on Advances in Geographic Information Systems. ACM, 2006: 171178.[22]BAMBA B, LIU L, PESTI P, et al. Supporting anonymous location queries in mobile environments with privacygrid[C]//Proceedings of the 17th International Conference on World Wide Web. ACM, 2008: 237246.[23]MOKBEL M F, CHOW C Y, AREF W G. The new casper: Query processing for location services without compromising privacy[C]//Proceedings of the 32nd International Conference on Very Large Data Bases. ACM, 2006: 763774.[24]CHOW C Y, MOKBEL M F, LIU X. Spatial cloaking for anonymous locationbased services in mobile peertopeer environments[J]. GeoInformatica, 2011, 15(2): 351380.[25]霍峥, 孟小峰. 轨迹隐私保护技术研究[J]. 计算机学报, 2011(10):18201830.[26]XU T, CAI Y. Exploring historical location data for anonymity preservation in locationbased services[C]//Proceedings of the 27th Conference on Computer Communications. IEEE, 2008: 547555.[27]TERROVITIS M, MAMOULIS N. Privacy preserving in the publication of trajectories[C]//Proceedings of the 9th International Conference on Mobile Data Management. IEEE, 2008:6572.[28]LU R, LIN X, LIANG X, et al. A dynamic privacypreserving key management scheme for locationbased services in vanets[J]. IEEE Transactions on Intelligent Transportation Systems, 2012, 13(1): 127139.[29]FREUDIGER J, SHOKRI R, HUBAUX J P. Evaluating the privacy risk of locationbased services[M]//Financial Cryptography and Data Security. Berlin: Springer, 2012: 3146.[30]朱辉, 李晖, 高丽娟, 等. 面向基于位置服务的用户隐私保护系统及方法: 中国,CN104219245A\[P\]. 20141217.[31]PINGLEY A, YU W, ZHANG N, et al. Cap: A contextaware privacy protection system for locationbased services[C]//Proceedings of the 29th IEEE International Conference on Distributed Computing Systems. IEEE, 2009: 4957.[32]魏琼, 卢炎生. 位置隐私保护技术研究进展[J]. 计算机科学, 2008(09):2125.[33]EL DEFRAWY K, TSUDIK G. Privacypreserving locationbased ondemand routing in MANETs[J]. IEEE Journal on Selected Areas in Communications, 2011, 29(10): 19261934.[34]HU H, LEE D L. Range nearestneighbor query[J]. IEEE Transactions on Knowledge and Data Engineering, 2006, 18(1): 7891.[35]余荣芳. 位置服务隐私保护技术的研究与应用[D].南京:南京理工大学, 2013.[36]王璐, 孟小峰. 位置大数据隐私保护研究综述[J]. 软件学报, 2014(04)693712.[37]潘晓, 肖珍, 孟小峰. 位置隐私研究综述[J]. 计算机科学与探索, 2007(03)268281.[38]郭艳华. 位置服务中轨迹隐私保护方法的研究[D].武汉:华中师范大学, 2011.[39]谈嵘. 位置隐私保护及其在基于位置的社交网络服务中的应用研究[D].上海:华东师范大学, 2013.[40]车延辙. 基于位置服务中用户位置隐私保护关键技术研究[D].杭州:浙江大学, 2013.[41]屈浩. 基于轨迹隐私的匿名方法研究[D].成都:电子科技大学, 2013.[42]张浩. 基于位置服务的信息隐私保护技术研究[D].合肥:中国科学技术大学, 2014.[43]娄绿林. 基于位置服务(LBS)的隐私保护方案研究[D].昆明:昆明理工大学, 2013.[44]郭晓丽. 基于位置服务的移动对象隐私保护技术研究[D].哈尔滨:哈尔滨工程大学, 2013.[45]GHINITA G, KALNIS P, KHOSHGOZARAN A, et al. Private queries in locationbased services: Anonymizers are not necessary[C]//Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data. ACM, 2008: 121132.[46]CHENG R, ZHANG Y, BERTINO E, et al. Preserving user location privacy in mobile data management infrastructures[M]//Privacy Enhancing Technologies. Berlin: Springer, 2006: 393412.[47]GEDIK B, LIU L. Location privacy in mobile systems: A personalized anonymization model[C]//Proceedings of the 25th IEEE International Conference on Distributed Computing Systems. IEEE, 2005: 620629.[48]KIDO H, YANAGISAWA Y, SATOH T. An anonymous communication technique using dummies for locationbased services[C]//Proceedings of the International Conference on Pervasive Services. IEEE, 2005: 8897.[49]KANG H E, MENG W U. Protecting location privacy with personalized Kanonymity[J]. Journal of Nanjing University of Posts and Telecommunications (Natural Science), 2012(6): 014.[50]贾金营, 张凤荔. 位置隐私保护技术综述[J]. 计算机应用研究, 2013(03):641646.[51]王家波. 基于位置服务的轨迹隐私保护技术研究[D].杭州:杭州电子科技大学, 2014.[52]侯士江. 基于空间K匿名的位置隐私保护技术研究[D].秦皇岛:燕山大学, 2014.[53]薛姣, 刘向宇, 杨晓春, 等. 一种面向公路网络的位置隐私保护方法[J]. 计算机学报, 2011(05): 865878.[54]LUPER D, CAMERON D, MILLER J A, et al. Spatial and temporal target association through semantic analysis and GPS data mining[C]//Proceedings of the 2007 International Conference on Information and Knowledge Engineering. IKE, 2007:251257.[55]许隽. 基于位置服务中个性化位置隐私保护模型与算法的研究[D].广州:华南理工大学, 2013. |