Filters








88,585 Hits in 7.8 sec

Towards trajectory anonymization

Mehmet Ercan Nergiz, Maurizio Atzori, Yucel Saygin
2008 Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS - SPRINGL '08  
We propose a novel generalization-based approach that applies to trajectories and sequences in general.  ...  We also suggest the use of a simple random reconstruction of the original dataset from the anonymization, to overcome possible drawbacks of generalization approaches.  ...  A novel generalization-based approach, which exploits previous results on string alignment, has been successfully applied to trajectory data for the first time.  ... 
doi:10.1145/1503402.1503413 dblp:conf/gis/NergizAS08 fatcat:7zcpieahunfw5nygpyso3jlthm

k^τ,ϵ-anonymity: Towards Privacy-Preserving Publishing of Spatiotemporal Trajectory Data [article]

Marco Gramaglia, Marco Fiore, Alberto Tarable, Albert Banchs
2017 arXiv   pre-print
We propose an algorithm that generalizes the data so that they satisfy k^τ,ϵ-anonymity, an original privacy criterion that thwarts attacks on trajectories.  ...  Our work is a step forward in the direction of open, privacy-preserving datasets of spatiotemporal trajectories.  ...  Thus, we adopt a computationally efficient approach, by clustering user sub-trajectories based on their pairwise merging cost.  ... 
arXiv:1701.02243v1 fatcat:hlw5cgjizfesncltde2djem7fm

Towards Practical Attribute-Based Identity Management: The IRMA Trajectory [chapter]

Gergely Alpár, Bart Jacobs
2013 IFIP Advances in Information and Communication Technology  
This hands-on approach forces us to elaborate many unexplored issues, leading to a better understanding of attributes and their possibilities and challenges.  ...  IRMA is an abbreviation for "I Reveal My Attributes", and at the same time it is the name of a project run by the Digital Security group of the University of Nijmegen and its partners to get attributebased  ...  Second, the IRMA project uses a smart card implementation [9] based on the Idemix technology [7] .  ... 
doi:10.1007/978-3-642-37282-7_1 fatcat:2k3rvhyq35ca5l2pxel6o4dhmq

Towards a multi-scalar perspective on transition trajectories

Johan Miörner, Christian Binz
2021 Environmental Innovation and Societal Transitions  
A B S T R A C T This paper contributes to the geography of transitions literature by conceptualizing transition trajectories from a multi-scalar perspective.  ...  different transition trajectories.  ...  The authors would also like to thank two anonymous reviewers as well as the handling editor of EIST for their highly valuable inputs.  ... 
doi:10.1016/j.eist.2021.06.004 fatcat:f32xnhglibaxplgl63o2esnp7e

Assessing Participation: Toward Long-Term Experiences, Trajectories and Maturity

Clémentine Schelings, Catherine Elsen
2022 Architecture  
We argue that evaluating participation in the long term and in a transversal way, focusing on agencies' and participants' trajectories rather than uniquely on on-the-spot experiences, provides additional  ...  On the basis of these empirical data, we developed a contextual, analytical tool to review participation in a longitudinal way.  ...  Very high Insider 4 participations (W1-W2-W3) 1 Each participant is anonymously identified by a code composed by the first letter of the considered city and a number.  ... 
doi:10.3390/architecture2030029 fatcat:z7aihmhmzfbxnn7xxgziiwzzk4

Narcotics Anonymous

Natti Ronel
1998 Journal of Offender Rehabilitation  
Narcotics Anonymous (NA) is considered as a sub-culture of recovery bridging the drug sub-culture and the prevailing culture.  ...  Based on a phenomenological study of NA in Israel, certain components of the recovery sub-culture are describcd: sobriety as an innovation; recovery as a basis for value systems and behavioral norms; the  ...  The criminal codc is such an approach and is considered to result from the addiction disease (Narcotics Anonymous, 1988) .  ... 
doi:10.1300/j076v27n01_13 fatcat:45wdz476vzcwpgpln2yjjsbzgi

Exploring city digital twins as policy tools: A task-based approach to generating synthetic data on urban mobility

Gleb Papyshev, Masaru Yarime
2021 Data & Policy  
A task-based approach to urban mobility data generation is proposed in the last section of the article.  ...  This approach can help in addressing the challenges associated with the availability of data without raising privacy concerns, as the data generated through this approach will not represent any real individual  ...  A Task-Based Approach to Urban Mobility Data Generation In order to tackle this issue, a new approach for data generation is proposed.  ... 
doi:10.1017/dap.2021.17 fatcat:vpf3lnlgincwhc22k6qsyscaee

Anonymous Stochastic Routing [article]

Mine Su Erturk, Kuang Xu
2020 arXiv   pre-print
We propose and analyze a recipient-anonymous stochastic routing model to study a fundamental trade-off between anonymity and routing delay.  ...  An agent wants to quickly reach a goal vertex in a network through a sequence of routing actions, while an overseeing adversary observes the agent's entire trajectory and tries to identify her goal among  ...  from a Goal-Attempt purely based on the resulting trajectory.  ... 
arXiv:1911.08875v4 fatcat:2mfg6zzzmbh3xbvuam4o777e4y

Exchanging registered users' submitting reviews towards trajectory privacy preservation for review services in Location-Based Social Networks

Yunfeng Wang, Mingzhen Li, Yang Xin, Guangcan Yang, Qifeng Tang, Hongliang Zhu, Yixian Yang, Yuling Chen, Hua Wang
2021 PLoS ONE  
In our approach, we introduce two attacks, namely review-based location correlation attack (RLCA) and semantic-based long-term statistical attack (SLSA).  ...  To resist RLCA, we design a method named User Selection to Resist RLCA (USR-RLCA) to exchange reviews. We propose a metric to measure the correlation between a user and a trajectory.  ...  The k-anonymity is one of the most widely used methods of generalization, which includes two primary approaches of Dummy Trajectory and Historical Trajectory.  ... 
doi:10.1371/journal.pone.0256892 pmid:34529699 pmcid:PMC8445480 fatcat:bmplb25p7fdyfe6js72dhwgzxa

Towards automated extraction of EMC-aware trajectory-based macromodels for analog circuits

Georges Gielen, Dimitri De Jonghe, Johan Loeckx
2009 2009 European Conference on Circuit Theory and Design  
In addition, trajectory-based models are used for efficient modeling of nonlinear dynamical systems.  ...  Trajectory methods sample the state space trajectory of a circuit while exciting the circuit with a representative training input.  ...  CONCLUSION In this paper we have presented a general approach towards the trajectory-based modeling methodology that allows a flexible implementation of abstraction levels.  ... 
doi:10.1109/ecctd.2009.5275095 dblp:conf/ecctd/GielenJL09 fatcat:uwd2xg5tkzbmxjfajjjbvtlfii

The trajectory towards basin closure of a European river: Guadalquivir

J. Berbel, V. Pedraza, G. Giannoccaro
2013 International Journal of River Basin Management  
The authors would like to thank the English editing of Sebastiaan Hess and the suggestions of anonymous referees that have improved the final version.  ...  Key elements in Guadalquivir evolution towards closure (first loop) According to Molle (2003) , basins generally pass through four phases in their evolution towards closure: (1) open-traditional, (2)  ...  Conclusions In this paper, we developed a model of the Guadalquivir River Basin's evolution towards closure. The basin trajectory shares all the typical characteristics of other closed basins.  ... 
doi:10.1080/15715124.2013.768625 fatcat:mxf27dudpjflhk4lxasacftu6e

On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS [chapter]

Rinku Dewri, Indrakshi Ray, Indrajit Ray, Darrell Whitley
2010 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
Privacy preservation in location based services (LBS) has received extensive attention in recent years.  ...  The historical k-anonymity property is therefore enforced to ensure that all cloaking regions include at least k objects in common.  ...  In general, the more divergent the trajectories are, the worse is the effect.  ... 
doi:10.1007/978-3-642-16161-2_5 fatcat:ewshyx47ebd77eu2t25ryl5mzu

Sailing towards digitalization when it doesn't make cents? Analysing the Faroe Islands' new digital governance trajectory

Keegan McBride
2019 Island Studies Journal  
Talgildu Føroyar is a project-based temporary organization, funded from 2015 through 2020, tasked with spearheading the Faroe Islands' digital governance movement.  ...  bureaucracy, a more efficient government, and empowered citizens.  ...  In order to better understand this process, this paper adopts a descriptive and narrative case study-based approach to achieve two primary goals.  ... 
doi:10.24043/isj.93 fatcat:7mnbhwx5qjdxnobmdyaivdnuai

Discovering People's Life Patterns from Anonymized WiFi Scanlists

Sha Zhao, Zhe Zhao, Yifan Zhao, Runhe Huang, Shijian Li, Gang Pan
2014 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops  
Our work is a promising step towards automatically mining people's life patterns from anonymized mobility data of smart phones.  ...  Particularly, we design a user feature space in which we use frequent trajectory patterns to represent each user as a feature vector.  ...  Our work is a promising step towards automatically mining people's life patterns from anonymized mobility data captured by smart phones.  ... 
doi:10.1109/uic-atc-scalcom.2014.122 dblp:conf/uic/ZhaoZZHLP14 fatcat:pxq7od2oqvgsrccvt2wsodt4ti

Efficient Time-Stamped Event Sequence Anonymization

Reza Sherkat, Jing Li, Nikos Mamoulis
2013 ACM Transactions on the Web  
With the rapid growth of applications which generate timestamped sequences (click streams, RFID sequences, GPS trajectories), sequence anonymization becomes an important problem, if such data should be  ...  Existing trajectory anonymization techniques disregard the importance of time or the sensitivity of events.  ...  The set E r imposes a constraint on each sequence S b ∈ B; ∀(e, t) ∈ S b , e ∈ E r . Generalization model and information loss To anonymize D, we follow a partition-based approach [30] .  ... 
doi:10.1145/2532643 fatcat:qwr7vu3s7bcctarujcik3n3suy
« Previous Showing results 1 — 15 out of 88,585 results