Nothing Special   »   [go: up one dir, main page]

Ardagna et al., 2009 - Google Patents

Landscape-aware location-privacy protection in location-based services

Ardagna et al., 2009

View PDF
Document ID
13391475400123069998
Author
Ardagna C
Cremonini M
Gianini G
Publication year
Publication venue
Journal of Systems Architecture

External Links

Snippet

Mobile network providers have developed a variety of location-based services (LBSs), such as friend-finder, point of interest services, emergency rescue and many other safety and security services. The protection of location-privacy has consequently become a key aspect …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W4/00Mobile application services or facilities specially adapted for wireless communication networks
    • H04W4/02Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/08Access security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • G06Q30/02Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination

Similar Documents

Publication Publication Date Title
Liu et al. Location privacy and its applications: A systematic study
Shokri et al. Privacy games along location traces: A game-theoretic framework for optimizing location privacy
Sun et al. User-defined privacy location-sharing system in mobile online social networks
Fei et al. A k-anonymity based schema for location privacy preservation
Sun et al. ASA: Against statistical attacks for privacy-aware users in Location Based Service
Wernke et al. A classification of location privacy attacks and approaches
Shokri et al. Unraveling an old cloak: k-anonymity for location privacy
Shokri et al. Protecting location privacy: optimal strategy against localization attacks
Ardagna et al. Landscape-aware location-privacy protection in location-based services
Ullah et al. ESOT: A new privacy model for preserving location privacy in Internet of Things
Jin et al. ULPT: A user-centric location privacy trading framework for mobile crowd sensing
Tyagi et al. Future challenging issues in location based services
Ashraf et al. State-of-the-art Challenges: Privacy Provisioning in TPP Location Based Services Systems
Hashem et al. Protecting privacy for group nearest neighbor queries with crowdsourced data and computing
Xu et al. Multiple mix-zones deployment for continuous location privacy protection
Ardagna et al. Privacy-enhanced location-based access control
Hossain et al. Privacy-aware cloaking technique in location-based services
Sadeh et al. Understanding and capturing people’s privacy policies in a people finder application
Aloui et al. An efficient approach for privacy-preserving of the client’s location and query in m-business supplying lbs services
Zhao et al. EPLA: efficient personal location anonymity
Kim et al. Quality of Private Information (QoPI) model for effective representation and prediction of privacy controls in mobile computing
Riaz et al. Location privacy and utility in geo-social networks: survey and research challenges
Sahnoune et al. Deloc: a delegation-based privacy-preserving mechanism for location-based services
Shin et al. Anonymization models for directional location based service environments
Zhang et al. A caching-based privacy-preserving scheme for continuous location-based services