![]() Chen, Xihui ![]() ![]() ![]() in Proc. 7th International Conference on Availability, Reliability and Security (2012) Detailed reference viewed: 173 (2 UL)![]() Chen, Xihui ![]() ![]() in Proc. 2nd ACM Conference on Data and Application Security and Privacy (2012) The popularity of location-based services leads to serious concerns on user privacy. A common mechanism to protect users’ location and query privacy is spatial generalisation. As more user information ... [more ▼] The popularity of location-based services leads to serious concerns on user privacy. A common mechanism to protect users’ location and query privacy is spatial generalisation. As more user information becomes available with the fast growth of Internet applications, e.g., social networks, attackers have the ability to construct users’ personal profiles. This gives rise to new challenges and reconsideration of the existing privacy metrics, such as k-anonymity. In this paper, we propose new metrics to measure users’ query privacy taking into account user profiles. Furthermore, we design spatial generalisation algorithms to compute regions satisfying users’ privacy requirements expressed in these metrics. By experimental results, our metrics and algorithms are shown to be effective and efficient for practical usage. [less ▲] Detailed reference viewed: 119 (3 UL)![]() Zhang, Chenyi ![]() ![]() in Proc. 38th International Conference on Current Trends in Theory and Practice of Computer Science (2012) Detailed reference viewed: 109 (5 UL)![]() Dong, Naipeng ![]() ![]() ![]() in Proc. 17th European Symposium on Research in Computer Security (2012) Detailed reference viewed: 112 (6 UL)![]() Li, Qian ![]() ![]() ![]() in Proc. 6th International Symposium on Theoretical Aspects of Software Engineering (2012) Detailed reference viewed: 152 (3 UL)![]() Pang, Jun ![]() in Proc. 27th Symposium on Applied Computing (2012) Detailed reference viewed: 57 (3 UL)![]() Yuan, Qixia ![]() ![]() ![]() in Transactions on Computational Systems Biology (2012), XIV Detailed reference viewed: 180 (16 UL)![]() Jonker, Hugo ![]() ![]() ![]() in Digital Enlightenment Yearbook 2012 (2012) Detailed reference viewed: 99 (5 UL)![]() Sun, Yanjie ![]() ![]() ![]() in Journal of Computer Security (2012), 20(4), 437-459 Detailed reference viewed: 122 (6 UL)![]() Chen, Xihui ![]() ![]() in Proc. 6th ESA Workshop on Satellite Navigation Technologies (2012) Existing Global Navigation Satellite Systems offer no authentication to the open service signals and so stand-alone receivers are vulnerable to meaconing and spoofing attacks. These attacks interfere with ... [more ▼] Existing Global Navigation Satellite Systems offer no authentication to the open service signals and so stand-alone receivers are vulnerable to meaconing and spoofing attacks. These attacks interfere with the integrity and authenticity of satellite signals: they can delay signals, or re-broadcast signals. Positioning is thus compromised and location-based services are at risk.This paper describes a solution to mitigate this risk. It is a trusted third-party Localisation Assurance service that informs location-based services providers up to which level a location claimed by client can be trusted. It runs several tests over the localisation data of client receivers and certifies the level of assurance of locations. An assurance level expresses the amount of trust the third-party has that a receiver's location is calculated from integral and authentic satellite signals. [less ▲] Detailed reference viewed: 229 (6 UL)![]() Dong, Naipeng ![]() ![]() ![]() in Proc. 1st Symposium on Foundations of Health Information Engineering and Systems (2012) Detailed reference viewed: 121 (2 UL)![]() ; Pang, Jun ![]() in Proc. 6th International Conference on Availability, Reliability and Security (2011) Detailed reference viewed: 116 (1 UL)![]() Lenzini, Gabriele ![]() ![]() ![]() in Proc. 19th International Workshop on Security Protocols (2011) Detailed reference viewed: 184 (7 UL)![]() Dong, Naipeng ![]() ![]() ![]() in Proc. 7th Workshop on Formal Aspects in Security and Trust (2011) Detailed reference viewed: 78 (3 UL)![]() ; Pang, Jun ![]() in Proc. 3rd Workshop on Harnessing Theories for Tool Support in Software (2011) Detailed reference viewed: 61 (2 UL)![]() Yuan, Qixia ![]() ![]() ![]() in Proceedings of the 3rd Workshop on Computational Models for Cell Processes (2011), EPTCS 67 Detailed reference viewed: 174 (13 UL)![]() Jonker, Hugo ![]() ![]() in Proc. 6th International Conference on Availability, Reliability and Security (2011) Detailed reference viewed: 142 (1 UL)![]() ; ; Pang, Jun ![]() in Proc. 17th International Symposium on Formal Methods (2011) Detailed reference viewed: 123 (2 UL)![]() Sun, Yanjie ![]() ![]() ![]() in Proc. 6th International Workshop on Security and Trust Management (2011) Detailed reference viewed: 142 (1 UL)![]() Liu, Zhiyuan ![]() ![]() ![]() in Proceedings of the 3rd Workshop on Harnessing Theories for Tool Support in Software (2011), ENTCS 274 Detailed reference viewed: 116 (4 UL) |
||