2011
DOI: 10.1109/mprv.2011.18
|View full text |Cite
|
Sign up to set email alerts
|

Fine-Grained Cloaking of Sensitive Positions in Location-Sharing Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
34
0

Year Published

2012
2012
2016
2016

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 47 publications
(34 citation statements)
references
References 9 publications
0
34
0
Order By: Relevance
“…A first step towards an effective protection of sensitive stops is offered by the semantic location cloaking paradigm [Damiani et al 2011]. This paradigm is grounded on the idea that positions may exhibit a different degree of sensitivity depending on the context, in particular the POI (or place) in which the moving person is located.…”
Section: The Protection Of Sensitive Stops In Streaming Applicationsmentioning
confidence: 99%
“…A first step towards an effective protection of sensitive stops is offered by the semantic location cloaking paradigm [Damiani et al 2011]. This paradigm is grounded on the idea that positions may exhibit a different degree of sensitivity depending on the context, in particular the POI (or place) in which the moving person is located.…”
Section: The Protection Of Sensitive Stops In Streaming Applicationsmentioning
confidence: 99%
“…Instead, semantic-based approaches are needed, as mentioned in Damiani, Silvestri, and Bertino (2011) and Parent et al (2013). Semantic location cloaking (Damiani et al, 2010(Damiani et al, , 2011) is based on the idea that locations can be more or less sensitive depending on the context, mainly the place where the person is located, and therefore the location granularity disclosed can be adjusted accordingly.…”
Section: Semantic-based Privacy Protectionmentioning
confidence: 99%
“…Simple transformations return a fake position or a coarse regions at predefined granularity. Non trivial obfuscation techniques might include, for example, semantic location cloaking [2]. Below some examples of privacy rules:…”
Section: Privacy Policy Handlermentioning
confidence: 99%
“…• Everywhere, [08:00, 19:00] → SemanticCloaking() specifies that any position in the time interval is mapped onto the map generated by semantic location cloaking [2]. This map contains pre-computed cloaked regions enclosing sensitive places, e.g.…”
Section: Privacy Policy Handlermentioning
confidence: 99%
See 1 more Smart Citation