References
- J. Hightower and G. Borriello, "Location Systems for Ubiquitous Computing," Computer, vol.34, no.8, pp.57-66, IEEE Computer Society Press, Aug. 2001. https://doi.org/10.1109/2.940014
- J. S. Lee and S. K. Kim, "Technology Trends and World-wide Industry Market Analysis of Location- Based Services(LBS)," IITA, vol.5, no.2, 2003.
- Q. Jones et al., "Putting Systems into Place: A Qualitative Study of Design Requirements for Location-Aware Community Systems," Proc. ACM Conf. Computer Supported Cooperative Work (CSCW 04), ACM Press, pp.202-211, 2004.
- S. H. Lee, K. W. Min, J. C. Kim, J. W. Kim, and J. H. Park, "LBS Technology Trends," Electronics and Communication Trends Analysis, vol.20, no.3, pp.33-42, 2005.
- SERI, Rasing LBS, CEO Information, vol.615, 2007.
- J. Warrior, E. McHenry, and K. McGee, "They Know Where You Are," IEEE Spectrum, vol.40 no.7, pp.20-25, 2003.
- J. Kwak, K. W. Lee, S. J. Kim, and D. H. Won, "RFID System based Missing Child Location Tracking System with Fairness," 5th RFID/USN Research Paper Awards, 2005.
- D. Anthony, D. Kotz, and T. Henderson, "Privacy in Location-Aware Computing Environment," Pervacive Computing, pp.64-72, October 2007.
- N. H. Lee, J. H. Park, and B. I. Ahn, "LBS Standard Reference System supporting Locationbased Application Services," Proceedings of Korea Spatial Information System Society Conference, pp.33-38, 2004.
- Open Mobile Alliance, Mobile Location Service V1.1 : Privacy Checking Protocol, Open Mobile Alliance Enabler Standard, 2006.
- IETF Georaphic Location/Privacy Charter, Geopriv Requirements, IETF RFC Document 3693, 2004.
- H. Tschofenig, H. Schulzrinne, A. Newton, and J. Peterson, "The IETF Geopriv and Presence Architecture Focusing on Location Privacy," W3C Workshop on Languages for Privacy Policy Negotiation and Sematics-Driven Enforcement, October 2006.
- K. Tang, J. Fogarty, P. Keyani, and J. Hong, "An Anonymous and Privacy-Sensitive Approach to Collecting Sensed Data in Location-Based Applications," Proc. SIGCHI Conf. Human Factors in Computing Systems(CHI 06), ACM Press, pp.93-102, 2006.
- M. Gruteser and D. Grunwald, "Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking," MobiSys, pp.31-42, 2003.
- T. Xu and Y. Cai, "Location Anonymity in Continuous Location-based Services," ACMGIS, pp.221- 238, 2007.
- R. Cheng, Y. Zhang, E. Bertino, and S. Prabhakar, "Preserving User Location Privacy in Mobile Data Management Infrastructures," Privacy Enhancing Technology Workshop, vol.4258, pp.393-412, 2006.
- J. H. Kim, A. R. Lee, Y. K. Kim, J. H. Um, and J. W. Chang, "Cloaking Method supporting Kanonymity and L-diversity for Privacy Protection in Location-Based Services," Journal of Korea Spatial Information Society, vol.10, no.4, pp.1-10, 2008.
- B. Gedik and L. Liu, "Location Privacy in Mobile Systems: A Personalized Anonymization Model," ICDCS, pp.620-629, 2005.
- M. Gruteser and X. Liu, "Protecting Privacy in Continuous Location-Tracking Applications," IEEE Security and Privacy, vol.2, no.2, 2004. https://doi.org/10.1109/MSP.2004.49
- M.F. Mokbel, C.Y. Chow, and W.G. Aref, "The New Casper: Query Processing for Location Services without Compromising Privacy," VLDB, pp.763-774, 2006.
- Z. Xiao, X. Meng, and J. Xu, "Quality Aware Privacy Protection for Location-based Services," Database Systems for Advanced Applications, vol.4443, pp.434-446, 2007.
- S. Patil and J. Lai, "Who Gets to Know What When: Configuring Privacy Permissions in an Awareness Application," Proc. SIGCHI Conf. Human Factors in Computing Systems (CHI 05), ACM Press, pp.101-110, 2005.
- D.V. Oheimb and J. Cuellar, "Designing and Verifying Core Protocols for Location Privacy," Proc. 9th Information Security Conf., pp.502-516, 2006.
- A. Gupta, M. Saini, and A. Mathuria, "Security Analysis of The Louis Protocol for Location Privacy," Proc. 1st Int. Conf. on COMmunicaiton Systems and NETworks, pp.200-207, 2009.
- Q. He, D. Wu, and P. Khosla, "A Mechanism for Personal Control over Mobile Location Privacy," BroadWISE2004, 2004.
- L. Kang, "Protecting Location Privacy in Large- Scale Wireless Sensor Networks," Proc. IEEE Int. Conf. on Communications(ICC2009), pp.1-6, 2009.