|
|
|
|
LEADER |
04389nam a22006135i 4500 |
001 |
978-3-642-03511-1 |
003 |
DE-He213 |
005 |
20170121114554.0 |
007 |
cr nn 008mamaa |
008 |
100301s2009 gw | s |||| 0|eng d |
020 |
|
|
|a 9783642035111
|9 978-3-642-03511-1
|
024 |
7 |
|
|a 10.1007/978-3-642-03511-1
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.76.A65
|
072 |
|
7 |
|a UNH
|2 bicssc
|
072 |
|
7 |
|a UDBD
|2 bicssc
|
072 |
|
7 |
|a COM032000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.7
|2 23
|
245 |
1 |
0 |
|a Privacy in Location-Based Applications
|h [electronic resource] :
|b Research Issues and Emerging Trends /
|c edited by Claudio Bettini, Sushil Jajodia, Pierangela Samarati, X. Sean Wang.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2009.
|
300 |
|
|
|a VII, 217 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 5599
|
505 |
0 |
|
|a Anonymity and Historical-Anonymity in Location-Based Services -- Location Privacy Techniques in Client-Server Architectures -- Private Information Retrieval Techniques for Enabling Location Privacy in Location-Based Services -- Privacy Preservation over Untrusted Mobile Networks -- Access Control in Location-Based Services -- Location Privacy in RFID Applications -- Privacy in Georeferenced Context-Aware Services: A Survey -- Safety and Privacy in Vehicular Communications -- Privacy Preserving Publication of Moving Object Data.
|
520 |
|
|
|a Location-based applications refer to those that use location data in a prominent manner. Location data can be very effective for service provisioning, enabling the birth of a new generation of information services. Although data security and privacy issues have been extensively investigated in several domains, current techniques are not readily applicable to location-based applications. Conciliating the effectiveness of these applications with privacy concerns constitutes a unique challenge, mostly due to the semantic richness of location and time information. Research in this field involves aspects of spatio-temporal reasoning, query processing, system security, statistical inference, and more importantly, anonymization techniques. Several research groups have been working in recent years to identify privacy attacks and defense techniques in this domain. This state-of-the-art survey provides a solid ground for researchers approaching this topic to understand current achievements through a common categorization of privacy threats and defense techniques. This objective is particularly challenging considering the specific (and often implicit) assumptions that characterize the recent literature on privacy in location-based services. The book also illustrates the many facets that make the study of this topic a particularly interesting research subject, including topics that go beyond privacy preserving transformations of service requests, and include access control, privacy preserving publishing of moving object data, privacy in the use of specific positioning technology, and privacy in vehicular network applications.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Information storage and retrieval.
|
650 |
|
0 |
|a Application software.
|
650 |
|
0 |
|a Computers.
|
650 |
|
0 |
|a Law and legislation.
|
650 |
|
0 |
|a Management information systems.
|
650 |
|
0 |
|a Personal computers.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Information Systems Applications (incl. Internet).
|
650 |
2 |
4 |
|a Personal Computing.
|
650 |
2 |
4 |
|a Information Storage and Retrieval.
|
650 |
2 |
4 |
|a Computer Applications.
|
650 |
2 |
4 |
|a Management of Computing and Information Systems.
|
650 |
2 |
4 |
|a Legal Aspects of Computing.
|
700 |
1 |
|
|a Bettini, Claudio.
|e editor.
|
700 |
1 |
|
|a Jajodia, Sushil.
|e editor.
|
700 |
1 |
|
|a Samarati, Pierangela.
|e editor.
|
700 |
1 |
|
|a Wang, X. Sean.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642035104
|
830 |
|
0 |
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 5599
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-03511-1
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|