Ardagna et al., 2009 - Google Patents
Landscape-aware location-privacy protection in location-based servicesArdagna et al., 2009
View PDF- Document ID
- 13391475400123069998
- Author
- Ardagna C
- Cremonini M
- Gianini G
- Publication year
- Publication venue
- Journal of Systems Architecture
External Links
Snippet
Mobile network providers have developed a variety of location-based services (LBSs), such as friend-finder, point of interest services, emergency rescue and many other safety and security services. The protection of location-privacy has consequently become a key aspect …
- 238000000034 method 0 abstract description 35
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
- H04W4/02—Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/02—Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Liu et al. | Location privacy and its applications: A systematic study | |
Shokri et al. | Privacy games along location traces: A game-theoretic framework for optimizing location privacy | |
Sun et al. | User-defined privacy location-sharing system in mobile online social networks | |
Fei et al. | A k-anonymity based schema for location privacy preservation | |
Sun et al. | ASA: Against statistical attacks for privacy-aware users in Location Based Service | |
Wernke et al. | A classification of location privacy attacks and approaches | |
Shokri et al. | Unraveling an old cloak: k-anonymity for location privacy | |
Shokri et al. | Protecting location privacy: optimal strategy against localization attacks | |
Ardagna et al. | Landscape-aware location-privacy protection in location-based services | |
Ullah et al. | ESOT: A new privacy model for preserving location privacy in Internet of Things | |
Jin et al. | ULPT: A user-centric location privacy trading framework for mobile crowd sensing | |
Tyagi et al. | Future challenging issues in location based services | |
Ashraf et al. | State-of-the-art Challenges: Privacy Provisioning in TPP Location Based Services Systems | |
Hashem et al. | Protecting privacy for group nearest neighbor queries with crowdsourced data and computing | |
Xu et al. | Multiple mix-zones deployment for continuous location privacy protection | |
Ardagna et al. | Privacy-enhanced location-based access control | |
Hossain et al. | Privacy-aware cloaking technique in location-based services | |
Sadeh et al. | Understanding and capturing people’s privacy policies in a people finder application | |
Aloui et al. | An efficient approach for privacy-preserving of the client’s location and query in m-business supplying lbs services | |
Zhao et al. | EPLA: efficient personal location anonymity | |
Kim et al. | Quality of Private Information (QoPI) model for effective representation and prediction of privacy controls in mobile computing | |
Riaz et al. | Location privacy and utility in geo-social networks: survey and research challenges | |
Sahnoune et al. | Deloc: a delegation-based privacy-preserving mechanism for location-based services | |
Shin et al. | Anonymization models for directional location based service environments | |
Zhang et al. | A caching-based privacy-preserving scheme for continuous location-based services |