A Survey of Computational Location Privacy. Krumm, J. Personal Ubiquitous Comput., 13(6):391-399, Springer-Verlag, 8, 2009.
Website abstract bibtex This is a literature survey of computational location privacy, meaning computation-based privacy mechanisms that treat location data as geometric information. This definition includes privacy-preserving algorithms like anonymity and obfuscation as well as privacy-breaking algorithms that exploit the geometric nature of the data. The survey omits non-computational techniques like manually inspecting geotagged photos, and it omits techniques like encryption or access control that treat location data as general symbols. The paper reviews studies of peoples' attitudes about location privacy, computational threats on leaked location data, and computational countermeasures for mitigating these threats.
@article{
title = {A Survey of Computational Location Privacy},
type = {article},
year = {2009},
identifiers = {[object Object]},
keywords = {location-privacy},
pages = {391-399},
volume = {13},
websites = {http://dx.doi.org/10.1007/s00779-008-0212-5},
month = {8},
publisher = {Springer-Verlag},
city = {London, UK, UK},
id = {25304f29-4cb5-38ac-b8c6-6c4c65055740},
created = {2018-07-12T21:31:55.304Z},
file_attached = {false},
profile_id = {f954d000-ce94-3da6-bd26-b983145a920f},
group_id = {b0b145a3-980e-3ad7-a16f-c93918c606ed},
last_modified = {2018-07-12T21:31:55.304Z},
read = {false},
starred = {false},
authored = {false},
confirmed = {true},
hidden = {false},
citation_key = {krumm:survey},
source_type = {article},
private_publication = {false},
abstract = {This is a literature survey of computational location privacy, meaning computation-based privacy mechanisms that treat location data as geometric information. This definition includes privacy-preserving algorithms like anonymity and obfuscation as well as privacy-breaking algorithms that exploit the geometric nature of the data. The survey omits non-computational techniques like manually inspecting geotagged photos, and it omits techniques like encryption or access control that treat location data as general symbols. The paper reviews studies of peoples' attitudes about location privacy, computational threats on leaked location data, and computational countermeasures for mitigating these threats.},
bibtype = {article},
author = {Krumm, John},
journal = {Personal Ubiquitous Comput.},
number = {6}
}
Downloads: 0
{"_id":"CmqNM7ZnJ4wmNnMgZ","bibbaseid":"krumm-asurveyofcomputationallocationprivacy-2009","downloads":0,"creationDate":"2017-04-24T18:33:15.046Z","title":"A Survey of Computational Location Privacy","author_short":["Krumm, J."],"year":2009,"bibtype":"article","biburl":null,"bibdata":{"title":"A Survey of Computational Location Privacy","type":"article","year":"2009","identifiers":"[object Object]","keywords":"location-privacy","pages":"391-399","volume":"13","websites":"http://dx.doi.org/10.1007/s00779-008-0212-5","month":"8","publisher":"Springer-Verlag","city":"London, UK, UK","id":"25304f29-4cb5-38ac-b8c6-6c4c65055740","created":"2018-07-12T21:31:55.304Z","file_attached":false,"profile_id":"f954d000-ce94-3da6-bd26-b983145a920f","group_id":"b0b145a3-980e-3ad7-a16f-c93918c606ed","last_modified":"2018-07-12T21:31:55.304Z","read":false,"starred":false,"authored":false,"confirmed":"true","hidden":false,"citation_key":"krumm:survey","source_type":"article","private_publication":false,"abstract":"This is a literature survey of computational location privacy, meaning computation-based privacy mechanisms that treat location data as geometric information. This definition includes privacy-preserving algorithms like anonymity and obfuscation as well as privacy-breaking algorithms that exploit the geometric nature of the data. The survey omits non-computational techniques like manually inspecting geotagged photos, and it omits techniques like encryption or access control that treat location data as general symbols. The paper reviews studies of peoples' attitudes about location privacy, computational threats on leaked location data, and computational countermeasures for mitigating these threats.","bibtype":"article","author":"Krumm, John","journal":"Personal Ubiquitous Comput.","number":"6","bibtex":"@article{\n title = {A Survey of Computational Location Privacy},\n type = {article},\n year = {2009},\n identifiers = {[object Object]},\n keywords = {location-privacy},\n pages = {391-399},\n volume = {13},\n websites = {http://dx.doi.org/10.1007/s00779-008-0212-5},\n month = {8},\n publisher = {Springer-Verlag},\n city = {London, UK, UK},\n id = {25304f29-4cb5-38ac-b8c6-6c4c65055740},\n created = {2018-07-12T21:31:55.304Z},\n file_attached = {false},\n profile_id = {f954d000-ce94-3da6-bd26-b983145a920f},\n group_id = {b0b145a3-980e-3ad7-a16f-c93918c606ed},\n last_modified = {2018-07-12T21:31:55.304Z},\n read = {false},\n starred = {false},\n authored = {false},\n confirmed = {true},\n hidden = {false},\n citation_key = {krumm:survey},\n source_type = {article},\n private_publication = {false},\n abstract = {This is a literature survey of computational location privacy, meaning computation-based privacy mechanisms that treat location data as geometric information. This definition includes privacy-preserving algorithms like anonymity and obfuscation as well as privacy-breaking algorithms that exploit the geometric nature of the data. The survey omits non-computational techniques like manually inspecting geotagged photos, and it omits techniques like encryption or access control that treat location data as general symbols. The paper reviews studies of peoples' attitudes about location privacy, computational threats on leaked location data, and computational countermeasures for mitigating these threats.},\n bibtype = {article},\n author = {Krumm, John},\n journal = {Personal Ubiquitous Comput.},\n number = {6}\n}","author_short":["Krumm, J."],"urls":{"Website":"http://dx.doi.org/10.1007/s00779-008-0212-5"},"bibbaseid":"krumm-asurveyofcomputationallocationprivacy-2009","role":"author","keyword":["location-privacy"],"downloads":0},"search_terms":["survey","computational","location","privacy","krumm"],"keywords":["algorithms","computational location privacy to","context","largely geometric-based","location á privacy á","protection schemes","thus","we do not include","location-privacy"],"authorIDs":[]}