No abstract available.
Proceeding Downloads
Venue attacks in location-based social networks
Location-Based Social Networks (LBSNs), such as Foursquare, Yelp and Facebook Place, have attracted many people, including business owners who use LBSNs to promote their businesses. A physical location is called a venue or a place of interest in an ...
A grid-based location privacy-preserving method for LBS users
With the availability and rapid development of GPS-enabled mobile devices and the positioning technology, the Location-Based Services (LBS), aiming at providing customized services according to users' spatio-temporal location information, become ...
A spatial entropy-based approach to improve mobile risk-based authentication
The research presented in this paper develops a novel approach for a risk-based authentication system that takes into account mobile user movement patterns. Inspired by the concept of Shannon's information theory, we introduce a variant version of ...
SUDO: a secure database outsourcing solution for location-based systems
Location-based systems (LBS) represent an emerging genre of applications that exploit positioning technologies and facilitate a wide range of location-based services. Unlike conventional information systems, LBS data management is challenging because ...
A civilized cyberspace for geoprivacy
We argue that current technical and legal attempts aimed at protecting Geoprivacy are insufficient. We propose a novel 2-dimensional model of privacy, which we term "civilized cyberspace". On one dimension there are engineering, social and legal tools ...
Protecting patient geo-privacy via a triangular displacement geo-masking method
Protecting patient geo-privacy while allowing for valid geographic analyses of the data is a major challenge [1]. As a consequence, a variety of methods have been introduced to mask patients' locational information, also called geo-masking methods [2]. ...
Quantity based aggregation for cadastral databases
Quantity Based Aggregation (QBA) is a subject that is closely related to inference in databases. The goal is to enforce k out of N disclosure control. In this paper we work on QBA problems in the context of cadastral databases, and we focus on one ...
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
GeoPrivacy '14 | 8 | 5 | 63% |
Overall | 8 | 5 | 63% |