2011 44th Hawaii International Conference on System Sciences 2011
DOI: 10.1109/hicss.2011.262
|View full text |Cite
|
Sign up to set email alerts
|

Issues in the Development of Location Privacy Theory

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2012
2012
2015
2015

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(5 citation statements)
references
References 39 publications
0
5
0
Order By: Relevance
“…The six phases extend early work from more than 45 years ago identifying three phases of input, storage and output [49]. They also extend five phases discussed in [40] by explicitly adding the "processing" phase to acknowledge the important of inferencing capabilities and data analytical techniques that may deduce location from other available evidence.…”
Section: Location Privacymentioning
confidence: 99%
See 2 more Smart Citations
“…The six phases extend early work from more than 45 years ago identifying three phases of input, storage and output [49]. They also extend five phases discussed in [40] by explicitly adding the "processing" phase to acknowledge the important of inferencing capabilities and data analytical techniques that may deduce location from other available evidence.…”
Section: Location Privacymentioning
confidence: 99%
“…It follows and borrows from prior work investigating issues in the development of location privacy theory in general [40], and extends it to the particular environment of the IoT. At this early stage we can hardly purport to fully explain and predict the eventual evolution of the recently-emerged IoT, let alone control it-however we can begin to organize and categorize important "things" such as components and concepts.…”
Section: Theory and Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…In [20], Minch points out that location privacy can be defined in terms of: Intrusiveness, Seclusion, Boundaries, Control, and Limitation. In our work, users are willing to share their location to third parties and so we focus on control and limitation in the disclosure of location privacy.…”
Section: Related Workmentioning
confidence: 99%
“…Then, Definition 3 is used to calculate the tag of the rule (lines 20-24) out of the tag of the decide-expression, which are both trivially equal to tag = ce.accuracy != "Medium". Finally, the tag of the policy is calculated applying Definition 5 to every rule disjunction resulting from the expansion of the EXIST quantifiers (lines [12][13][14][15][16][17][18][19][20][21][22][23][24][25]. Assuming that the quantifiers groups have 2 and 5 elements, that is, two groups of friends and a condition for each working day, the tag of the policy is the disjunction of 10 equal tags, resulting in the deny reason of ce.accuracy != "Medium", i.e., the expression is denied because the accuracy required is not equal to the "Medium".…”
Section: Definitionmentioning
confidence: 99%