[1] 刘经南,郭迟,彭瑞卿.移动互联网时代的位置服务[J].中国计算机学会通讯,2011,7(12):40-50. Jingnan Liu,Chi Guo,Ruiqing Peng.LBS in mobile internet[J].Communication of the CCF,2011,7(12):40-50.(in Chinese) [2] Bonchi F,Lakshmanan L V S,Wang H (Wendy).Trajectory anonymity in publishing personal mobility data[J].ACM Sigkdd Explorations Newsletter,2011,13(1):30-42. [3] Freudiger J,Shokri R,Hubaux J P.Evaluating the privacy risk of location-based services[A].Financial Cryptography and Data Security[C].Berlin:Springer,2012.31-46. [4] Gruteser M,Grunwald D.Anonymous usage of location-based services through spatial and temporal cloaking[A].1st International Conference on Mobile Systems,Applications and Services[C].New York:ACM,2003.31-42. [5] Damiani M L,Bertino E,Silvestri C.Protecting location privacy against spatial inferences[A].2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS SPRINGL 09[C].New York:ACM,2009.32-41. [6] Kalnis P,Ghinita G,Mouratidis K,et al.Preventing location-based identity inference in anonymous spatial queries[J].IEEE Transactions on Knowledge and Data Engineering,2007,19(12):1719-1733. [7] Jianguo H,Yiqi D.Achieving controllable privacy protection in position service for VANETs[J].Chinese Journal of Electronics,2011,20(3):395-400. [8] Machanavajjhala A,Kifer D,Gehrke J,et al.L-diversity:Privacy beyond k-anonymity[J].ACM Transactions on Knowledge Discovery from Data,2007,1(1):3-55. [9] 杨高明,杨静,张健沛.聚类的(α,k)-匿名数据发布[J].电子学报,2011,39(8):1941-1946. Yang Gaomin,Yang Jing,Zhang Jianpei.Achieveing (α,k)-anonymity via clustering in data publishing[J].Acta Electronica Sinica,2011,39(8):1941-1946.(in Chinese) [10] Yarovoy R,Bonchi F,Lakshmanan L V S,et al.Anonymizing moving objects:how to hide a MOB in a crowd?[A].The 12th International Conference on Extending Database Technology:Advances in Database Technology[C].Saint-Petersburg:ACM,2009.72-83. [11] Gidófalvi G,Huang X,Pedersen T B.Privacy-preserving data mining on moving object trajectories[A].2007 International Conference on Mobile Data Management[C].Washington:ACM,2007.60-68. [12] Nergiz M E,Atzori M,Saygin Y.Towards trajectory anonymization:A generalization-based approach[J].ACM Transactions on Data Privacy,2009,2(1):47-75. [13] Gidófalvi G,Huang X,Pedersen T B.Privacy - Preserving trajectory collection[A].The 16th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems[C].New York:ACM,2008.1-4. [14] De B M,Cheong O,Van K M.Computational Geometry:Algorithms and Applications[M].CA,USA:Springer,2008. [15] Gedik B,Liu L.Location privacy in mobile systems:A personalized anonymization model[A].the 25th IEEE International Conference on Distributed Computing Systems[C].Columbus,OH,USA:IEEE,2005.620-629. [16] Ghinita G,Kalnis P,Khoshgozaran A,et al.Private queries in location based services:anonymizers are not necessary[A].The 2008 ACM SIGMOD International Conference on Management of Data[C].New York,NY,USA:ACM,2008.121-132. |