[1]PELEKIS N, GKOULALASDIVANIS A, VODAS M, et al. Privacyaware querying over sensitive trajectory data[C]Proceedings of the 20th ACM International Conference on Information and Knowledge Management. ACM, 2011: 895904.[2]FERRAIOLO D F, SANDHU R, GAVRILA S, et al.Proposed NIST standard for rolebased access control[J]. ACM Transactions on Information and System Security (TISSEC), 2001, 4(3): 224274.[3]BERTINO E, BONATTI P A, FERRARI E. TRBAC: A temporal rolebased access control model[J]. ACM Transactions on Information and System Security (TISSEC), 2001, 4(3): 191233.[4]BERTINO E, CATANIA B, DAMIANI M L, et al. GEORBAC:A spatially aware RBAC [C]Proceedings of the 10th ACM Symposium on Access Control Models and Technologies. ACM, 2005: 2937.[5]CHANDRAN S M, JOSHI J B D. LoTRBAC: A location and timebased RBAC model[M]Web Information Systems Engineering. Berlin: Springer, 2005: 361375.[6]YOU T H, PENG W C, LEE W C. Protecting moving trajectories with dummies[C]Proceedings of the 2007 International Conference on Mobile Data Management. IEEE, 2007: 278282.[7]TERROVITIS M, MAMOULIS N. Privacy preservation in the publication of trajectories[C]Proceedings of the 9th International Conference on Mobile Data Management. IEEE, 2008: 6572.[8]ABUL O, BONCHI F, NANNI M. Never walk alone: Uncertainty for anonymity in moving objects databases[C]Proceedings of the IEEE 24th International Conference on Data Engineering. IEEE, 2008: 376385.[9]KROHN M, YIP A, BRODSKY M, et al. Information flow control for standard OS abstractions[J]. ACM SIGOPS Operating Systems Review, 2007, 41(6): 321334.[10]HUO Z, MENG X, HU H, et al. You can walk alone: Trajectory privacypreserving through significant stays protection[M]Database Systems for Advanced Applications. Berlin: Springer, 2012: 351366.[11]XIE K, DENG K, ZHOU X. From trajectories to activities: A spatiotemporal join approach[C]Proceedings of the 2009 International Workshop on LocationBased Social Networks. ACM, 2009: 2532. |