[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2675682acmconferencesBook PagePublication PagesgisConference Proceedingsconference-collections
GeoPrivacy '14: Proceedings of the 1st ACM SIGSPATIAL International Workshop on Privacy in Geographic Information Collection and Analysis
ACM2014 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
SIGSPATIAL '14: 22nd SIGSPATIAL International Conference on Advances in Geographic Information Systems Dallas/Fort Worth Texas November 4 - 7, 2014
ISBN:
978-1-4503-3134-0
Published:
04 November 2014
Sponsors:
In-Cooperation:

Reflects downloads up to 13 Dec 2024Bibliometrics
Abstract

No abstract available.

Proceeding Downloads

Skip Table Of Content Section
research-article
Venue attacks in location-based social networks
Article No.: 1, Pages 1–8https://doi.org/10.1145/2675682.2676395

Location-Based Social Networks (LBSNs), such as Foursquare, Yelp and Facebook Place, have attracted many people, including business owners who use LBSNs to promote their businesses. A physical location is called a venue or a place of interest in an ...

research-article
A grid-based location privacy-preserving method for LBS users
Article No.: 2, Pages 1–4https://doi.org/10.1145/2675682.2676398

With the availability and rapid development of GPS-enabled mobile devices and the positioning technology, the Location-Based Services (LBS), aiming at providing customized services according to users' spatio-temporal location information, become ...

research-article
A spatial entropy-based approach to improve mobile risk-based authentication
Article No.: 3, Pages 1–9https://doi.org/10.1145/2675682.2676400

The research presented in this paper develops a novel approach for a risk-based authentication system that takes into account mobile user movement patterns. Inspired by the concept of Shannon's information theory, we introduce a variant version of ...

research-article
SUDO: a secure database outsourcing solution for location-based systems
Article No.: 4, Pages 1–4https://doi.org/10.1145/2675682.2676397

Location-based systems (LBS) represent an emerging genre of applications that exploit positioning technologies and facilitate a wide range of location-based services. Unlike conventional information systems, LBS data management is challenging because ...

research-article
A civilized cyberspace for geoprivacy
Article No.: 5, Pages 1–8https://doi.org/10.1145/2675682.2676396

We argue that current technical and legal attempts aimed at protecting Geoprivacy are insufficient. We propose a novel 2-dimensional model of privacy, which we term "civilized cyberspace". On one dimension there are engineering, social and legal tools ...

research-article
Protecting patient geo-privacy via a triangular displacement geo-masking method
Article No.: 6, Pages 1–9https://doi.org/10.1145/2675682.2676399

Protecting patient geo-privacy while allowing for valid geographic analyses of the data is a major challenge [1]. As a consequence, a variety of methods have been introduced to mask patients' locational information, also called geo-masking methods [2]. ...

research-article
Quantity based aggregation for cadastral databases
Article No.: 7, Pages 1–8https://doi.org/10.1145/2675682.2676394

Quantity Based Aggregation (QBA) is a subject that is closely related to inference in databases. The goal is to enforce k out of N disclosure control. In this paper we work on QBA problems in the context of cadastral databases, and we focus on one ...

Contributors
  • Hunter College
  • University of Maryland, College Park
  • School of Computing and Information Systems
Please enable JavaScript to view thecomments powered by Disqus.

Recommendations

Acceptance Rates

GeoPrivacy '14 Paper Acceptance Rate 5 of 8 submissions, 63%;
Overall Acceptance Rate 5 of 8 submissions, 63%
YearSubmittedAcceptedRate
GeoPrivacy '148563%
Overall8563%