000 | 02823nam a22004815i 4500 | ||
---|---|---|---|
001 | 978-3-031-02336-1 | ||
003 | DE-He213 | ||
005 | 20240730163906.0 | ||
007 | cr nn 008mamaa | ||
008 | 220601s2013 sz | s |||| 0|eng d | ||
020 |
_a9783031023361 _9978-3-031-02336-1 |
||
024 | 7 |
_a10.1007/978-3-031-02336-1 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
100 | 1 |
_aGhinita, Gabriel. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _981070 |
|
245 | 1 | 0 |
_aPrivacy for Location-based Services _h[electronic resource] / _cby Gabriel Ghinita. |
250 | _a1st ed. 2013. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2013. |
|
300 |
_aXI, 73 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSynthesis Lectures on Information Security, Privacy, and Trust, _x1945-9750 |
|
505 | 0 | _aIntroduction -- Privacy-Preserving Spatial Transformations -- Cryptographic Approaches -- Hybrid Approaches -- Private Matching of Spatial Datasets -- Trajectory Anonymization -- Differentially Private Publication of Spatial Datasets -- Conclusions. | |
520 | _aSharing of location data enables numerous exciting applications, such as location-based queries, location-based social recommendations, monitoring of traffic and air pollution levels, etc. Disclosing exact user locations raises serious privacy concerns, as locations may give away sensitive information about individuals' health status, alternative lifestyles, political and religious affiliations, etc. Preserving location privacy is an essential requirement towards the successful deployment of location-based applications. These lecture notes provide an overview of the state-of-the-art in location privacy protection. A diverse body of solutions is reviewed, including methods that use location generalization, cryptographic techniques or differential privacy. The most prominent results are discussed, and promising directions for future work are identified. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
710 | 2 |
_aSpringerLink (Online service) _981071 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031012082 |
776 | 0 | 8 |
_iPrinted edition: _z9783031034640 |
830 | 0 |
_aSynthesis Lectures on Information Security, Privacy, and Trust, _x1945-9750 _981072 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-02336-1 |
912 | _aZDB-2-SXSC | ||
942 | _cEBK | ||
999 |
_c85099 _d85099 |