[1] |
ILIA p , POLAKIS I , ATHANASOPOULOS E . Face/Off: preventing privacy leakage from photos in social networks[C]// The 22nd ACM SIGSAC Conference on Computer and Communications Security. 2015:781-792.
|
[2] |
NAINI F M , UNNIKRISHNAN J , THIRAN P . Where you are is who you are: user identification by matching statistics[J]. IEEE Transactions on Information Forensics and Security, 2016,11(2):358-372.
|
[3] |
DATELINE NBC . Tracing a stalker[EB/OL]. , 2013.
|
[4] |
VOELCKER J . Stalked by satellite: an alarming rise in gps-enabled harassment[J]. IEEE Spectrum, 2006,47(7):15-16.
|
[5] |
WEBROOT SOFTWARE . Webroot survey finds geolocation apps prevalent amongst mobile device users, but 55\% concerned about loss of privacy[EB/OL]. , 2010.
|
[6] |
Half of social networkers online concerned about privacy[EB/OL]. , 2010.
|
[7] |
CHOW C Y , MOKBEL M F , LIU X , et al. A peer-to-peer spatial cloaking algorithm for anonymous location-based service[C]// The 14th Annual ACM International Symposium on Advances in Geographic Information Systems. 2006:171-178.
|
[8] |
GRUTESER M , GRUNWALD D . Anonymous usage of location-based services through spatial and temporal cloaking[C]// The 1st International Conference on Mobile Systems, Applications and Services. New York, USA: ACM, 2003:31-42.
|
[9] |
KALNIS P , GHINITA G , MOURATIDIS K . Preventing location-based identity inference in anonymous spatial queries[J]. IEEE Transactions on Knowledge and Data Engineering, IEEE, 2007,19(12):1719-1733.
|
[10] |
GEDIK B , LIU L . Protecting location privacy with personalized k-anonymity: architecture and algorithms[J]. IEEE Transactions on Mobile Computing, IEEE, 2008,7(1):1-18.
|
[11] |
HU H , XU J , ON S T . Privacy-aware location data publishing[J]. ACM Transactions on Database Systems (TODS), ACM, 2010,35(3):1-40.
|
[12] |
李凤华, 李晖, 贾焰 . 隐私计算研究范畴及发展趋势[J]. 通信学报, 2016,37(4):1-11. LI F H , LI H , JIA Y . Privacy computing: concept, connotation and its research trend[J]. Journal on Communications, 2016,37(4):1-11.
|
[13] |
KRUMM J . A survey of computational location privacy[J]. Personal and Ubiquitous Computing, London, UK, UK: Springer-Verlag, 2009,13(6):391-399.
|
[14] |
BETTINI C , WANG X , JAJODIA S . Protecting privacy against location-based personal identification[J]. Secure Data Management, 2005,3674:185-199.
|
[15] |
CHOW C Y , MOKBEL M F . Trajectory privacy in location-based services and data publication[C]// SIGKDD 2011,19-29.
|
[16] |
DUCKHAM M , KULIK L . A formal model of obfuscation and negotiation for location privacy[J]. Pervasive Computing, 2005,3468:152-170.
|
[17] |
DAMIANI M L . Privacy enhancing techniques for the protection of mobility patterns in LBS: research issues and trends[C]// European Data Protection: Coming of Age. Springer, 2013:223-239.
|
[18] |
DAMIANI M , BERTINO E , SILVESTRI C . Protecting location privacy through semantics-aware obfuscation techniques[C]// IFIPTM, 2008:231-245.
|
[19] |
KLEMPERER P , LIANG Y , MAZUREK M . Tag, you can see it!:using tags for access control in photo sharing[C]// The SIGCHI Conference on Human Factors in Computing Systems. 2012:377-386.
|
[20] |
XU K , GUO Y , GUO L . My privacy my decision: control of photo sharing on online social networks[J]. IEEE Transactions on Dependable and Secure Computing, 2015,(99):1.
|
[21] |
WISHART R , CORAPI D , MARINOVIC S . Collaborative privacy policy authoring in a social networking context[C]// Policies for Distributed Systems and Networks. 2010 IEEE International Symposium. 2010:1-8.
|
[22] |
WANG Y , ZHAI E , LUA E K . ISAC: Intimacy based access control for social network sites[C]// Ubiquitous Intelligence & Computing and 9th International Conference on Autonomic & Trusted Computing (UIC/ATC). 2012:517-524.
|
[23] |
FONG P W L . Relationship-based access control: protection model and policy language[C]// The First ACM Conference on Data and Application Security and Privacy. 2011:191-202.
|
[24] |
CARMINATI B , FERRARI E , PEREGO A . Enforcing access control in web-based social networks[J]. ACM Transactions on Information and System Security (TISSEC), 2009,13(1):6.
|
[25] |
GATES C . Access control requirements for web 2.0 security and privacy[J]. IEEE Web, 2007,2.
|
[26] |
HOUGHTON D J , JOINSON A N . Privacy, social network sites, and social relations[J]. Journal of Technology in Human Services, Taylor& Francis, 2010,28(1-2):74-94.
|
[27] |
JOSHI J B , BERTINO E , LATIF U . A generalized temporal role-based access control model[J]. IEEE Transactions on Knowledge and Data Engineering, 2005,17(1):4-23.
|
[28] |
GREENE K , DERLEGA V J , MATHEWS A . Self-disclosure in personal relationships[M]. The Cambridge Handbook of Personal Relationships, 2006:409-427.
|
[29] |
WIESE J , KELLEY P G , CRANOR L F . Are you close with me? are you nearby?: investigating social groups, closeness, and willingness to share[C]// The 13th international conference on Ubiquitous computing. 2011:197-206.
|
[30] |
SUCH J M , ROVATSOS M . Privacy policy negotiation in social media[J]. ACM Trans Auton Adapt Syst, New York, NY, USA: ACM, 2016,11(1):4:1-4:29.
|
[31] |
SWEENEY L . k-anonymity: a model for protecting privacy[J]. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002,10(7):557-570.
|
[32] |
LIU Y , WEI W , SUN A . Exploiting geographical neighborhood characteristics for location recommendation[C]// The 23rd ACM International Conference on Conference on Information and Knowledge Management - CIKM '14. 2014:739-748.
|
[33] |
Real datasets for spatial databaes: road networks and points of Internet[EB/OL]. .
|