Welcome to P K Kelkar Library, Online Public Access Catalogue (OPAC)

Privacy for location-based services (Record no. 561988)

000 -LEADER
fixed length control field 04601nam a2200709 i 4500
001 - CONTROL NUMBER
control field 6813298
003 - CONTROL NUMBER IDENTIFIER
control field IEEE
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200413152909.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m eo d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cn |||m|||a
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 130521s2013 caua foab 000 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781627051507 (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781627051491 (pbk.)
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.2200/S00485ED1V01Y201303SPT004
Source of number or code doi
035 ## - SYSTEM CONTROL NUMBER
System control number (CaBNVSL)swl00402437
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)844063346
040 ## - CATALOGING SOURCE
Original cataloging agency CaBNVSL
Transcribing agency CaBNVSL
Modifying agency CaBNVSL
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.65
Item number .G456 2013
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 910.285
Edition number 23
090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (RLIN)
Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR)
Local cutter number (OCLC) ; Book number/undivided call number, CALL (RLIN) MoCl
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Ghinita, Gabriel.
245 10 - TITLE STATEMENT
Title Privacy for location-based services
Medium [electronic resource] /
Statement of responsibility, etc. Gabriel Ghinita.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. San Rafael, Calif. (1537 Fourth Street, San Rafael, CA 94901 USA) :
Name of publisher, distributor, etc. Morgan & Claypool,
Date of publication, distribution, etc. c2013.
300 ## - PHYSICAL DESCRIPTION
Extent 1 electronic text (xi, 73 p.) :
Other physical details ill., digital file.
490 1# - SERIES STATEMENT
Series statement Synthesis lectures on information security, privacy, & trust,
International Standard Serial Number 1945-9750 ;
Volume/sequential designation # 4
538 ## - SYSTEM DETAILS NOTE
System details note Mode of access: World Wide Web.
538 ## - SYSTEM DETAILS NOTE
System details note System requirements: Adobe Acrobat Reader.
500 ## - GENERAL NOTE
General note Part of: Synthesis digital library of engineering and computer science.
500 ## - GENERAL NOTE
General note Series from website.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references (p. 67-71).
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note 1. Introduction --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 2. Privacy-preserving spatial transformations -- 2.1 Two-tier spatial transformations -- 2.2 Three-tier spatial transformations -- 2.3 Discussion --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 3. Cryptographic approaches -- 3.1 A primer on computational PIR -- 3.2 Spatial queries with PIR -- 3.3 Protocols for approximate and exact NN with PIR -- 3.4 Comparison with geometric transformations --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 4. Hybrid approaches -- 4.1 Privacy model -- 4.2 System overview -- 4.3 Private evaluation of point-rectangle enclosure -- 4.4 Private evaluation of point-convex-polygon enclosure --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 5. Private matching of spatial datasets -- 5.1 Problem formulation -- 5.2 Dataset mapping -- 5.3 Join processing -- 5.4 Enhancing privacy by use of Chebyshev distance --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 6. Trajectory anonymization -- 6.1 Publishing independent location samples -- 6.2 Publishing individual trajectories --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 7. Differentially private publication of spatial datasets -- 7.1 A primer on differential privacy -- 7.2 Publication of static datasets of locations -- 7.2.1 Data-independent decompositions: quad-trees -- 7.2.2 Data-dependent decompositions: kd-trees -- 7.3 Publication of trajectory datasets --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 8. Conclusions -- Bibliography -- Author's biography.
506 1# - RESTRICTIONS ON ACCESS NOTE
Terms governing access Abstract freely available; full-text restricted to subscribers or individual document purchasers.
510 0# - CITATION/REFERENCES NOTE
Name of source Compendex
510 0# - CITATION/REFERENCES NOTE
Name of source INSPEC
510 0# - CITATION/REFERENCES NOTE
Name of source Google scholar
510 0# - CITATION/REFERENCES NOTE
Name of source Google book search
520 3# - SUMMARY, ETC.
Summary, etc. Sharing of location data enables numerous exciting applications, such as location-based queries, location-based social recommendations, monitoring of traffic and air pollution levels, etc. Disclosing exact user locations raises serious privacy concerns, as locations may give away sensitive information about individuals' health status, alternative lifestyles, political and religious affiliations, etc. Preserving location privacy is an essential requirement towards the successful deployment of location-based applications. These lecture notes provide an overview of the state-of-the-art in location privacy protection. A diverse body of solutions is reviewed, including methods that use location generalization, cryptographic techniques or differential privacy. The most prominent results are discussed, and promising directions for future work are identified.
530 ## - ADDITIONAL PHYSICAL FORM AVAILABLE NOTE
Additional physical form available note Also available in print.
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Title from PDF t.p. (viewed on May 21, 2013).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Location-based services
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Mobile computing
General subdivision Access control.
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term privacy
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term anonymity
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term security
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term homomorphic cryptography
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term PIR
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term differential privacy
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term spatial databases
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term GIS
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
International Standard Book Number 9781627051491
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Synthesis digital library of engineering and computer science.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Synthesis lectures on information security, privacy, and trust ;
Volume/sequential designation # 4.
International Standard Serial Number 1945-9750
856 42 - ELECTRONIC LOCATION AND ACCESS
Materials specified Abstract with links to resource
Uniform Resource Identifier http://ieeexplore.ieee.org/servlet/opac?bknumber=6813298
856 40 - ELECTRONIC LOCATION AND ACCESS
Materials specified Abstract with links to full text
Uniform Resource Identifier http://dx.doi.org/10.2200/S00485ED1V01Y201303SPT004
Holdings
Withdrawn status Lost status Damaged status Not for loan Permanent Location Current Location Date acquired Barcode Date last seen Price effective from Koha item type
        PK Kelkar Library, IIT Kanpur PK Kelkar Library, IIT Kanpur 2020-04-13 EBKE488 2020-04-13 2020-04-13 E books

Powered by Koha