J. Krumm. Personal and Ubiquitous Computing, (2009)10.1007/s00779-008-0212-5.
Аннотация
This is a literature survey of computational location privacy, meaning computation-based privacy mechanisms that treat location data as geometric information. This definition includes privacy-preserving algorithms like anonymity and obfuscation as well as privacy-breaking algorithms that exploit the geometric nature of the data. The survey omits non-computational techniques like manually inspecting geotagged photos, and it omits techniques like encryption or access control that treat location data as general symbols. The paper reviews studies of peoples’ attitudes about location privacy, computational threats on leaked location data, and computational countermeasures for mitigating these threats.
%0 Journal Article
%1 springerlink:10.1007/s00779-008-0212-5
%A Krumm, John
%D 2009
%I Springer London
%J Personal and Ubiquitous Computing
%K lbs mobilecomputing privacy ubiquitouscomputing
%P 391-399
%T A survey of computational location privacy
%U http://dx.doi.org/10.1007/s00779-008-0212-5
%V 13
%X This is a literature survey of computational location privacy, meaning computation-based privacy mechanisms that treat location data as geometric information. This definition includes privacy-preserving algorithms like anonymity and obfuscation as well as privacy-breaking algorithms that exploit the geometric nature of the data. The survey omits non-computational techniques like manually inspecting geotagged photos, and it omits techniques like encryption or access control that treat location data as general symbols. The paper reviews studies of peoples’ attitudes about location privacy, computational threats on leaked location data, and computational countermeasures for mitigating these threats.
@article{springerlink:10.1007/s00779-008-0212-5,
abstract = {This is a literature survey of computational location privacy, meaning computation-based privacy mechanisms that treat location data as geometric information. This definition includes privacy-preserving algorithms like anonymity and obfuscation as well as privacy-breaking algorithms that exploit the geometric nature of the data. The survey omits non-computational techniques like manually inspecting geotagged photos, and it omits techniques like encryption or access control that treat location data as general symbols. The paper reviews studies of peoples’ attitudes about location privacy, computational threats on leaked location data, and computational countermeasures for mitigating these threats.},
added-at = {2010-10-13T12:07:38.000+0200},
affiliation = {Microsoft Research Redmond WA USA},
author = {Krumm, John},
biburl = {https://www.bibsonomy.org/bibtex/2bf51907741ca53ff55ef4178b4e12662/kw},
interhash = {2135ec995cc2a5aea4b5663e40b4f608},
intrahash = {bf51907741ca53ff55ef4178b4e12662},
issn = {1617-4909},
issue = {6},
journal = {Personal and Ubiquitous Computing},
keyword = {Computer Science},
keywords = {lbs mobilecomputing privacy ubiquitouscomputing},
note = {10.1007/s00779-008-0212-5},
pages = {391-399},
publisher = {Springer London},
timestamp = {2010-10-13T12:07:38.000+0200},
title = {A survey of computational location privacy},
url = {http://dx.doi.org/10.1007/s00779-008-0212-5},
volume = 13,
year = 2009
}