Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
3GPP (3rd Generation Partnership Project), Technical Specification Group Core Network, Universal Geographical Area Description (GAD), Release 1999, Technical Specification, 3G TS 23.032 V3.1.0 (2000-03)
N. Asokan, “Anonymity in Mobile Computing Environment”, IEEE Workshop on Mobile Computing Systems and Applications, Santa Cruz, CA, 1994, http://citeseer.nj.nec.com/asokan94anonymity.html
N. Asokan. Security Issues in Mobile Computing. Unpublished manuscript, October 1994. http://citeseer.nj.nec.com/ asokan94security.html
O Berthold, M Köhntopp: Identity Management Based On P3P, in: H Federrath (Ed.): Designing Privacy Enhancing Technologies; Proc. Workshop on Design Issues in Anonymity and Unobservability; LNCS 2009; 2001; 141–160
M Blaze, J Feigenbaum, J Ioannidis, and A D. Keromytis: The Role of Trust Management in Distributed Systems Security. In: Vitek, J., Jensen, C.D., (Eds.), Secure Internet Programming, Security Issues for Mobile and Distributed Objects, Lecture Notes in Computer Science.1603, Pages 185–210, Springer
M Blaze, J Feigenbaum, and J Lacy: Decentralized Trust Management.
Brands S A.: Rethinking Public Key Infrastructures and Digital Certificates, The MIT Press, Cambridge, Massachusetts, August 2000. ISBN 0-262-02491-82000
Brands S A.: Private credentials. White paper by Zero-Knowledge Systems, Inc., November 2000. Available at: http://www.zks.net/media/credsnew.pdf..
D. L. Chaum. Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM, 24(2):84–88, February 1981.
D. Chaum, Security Without Identification: Card Computers to Make Big Brother Obsolete, Available at: http://www.chaum.com/ articles/Security-Wthout-Identification.htm Updated Version of: Security Without Identification: Transaction Systems to Make Big Brother Obsolete. Communications of the ACM, 28(10): 1030–1044, October 1985.
D. Chaum: Showing Credentials without Identification: Transferring Signatures between Unconditionally Unlinkable Pseudonyms; in: J. Seberry /J. Pieprzyk (Eds.): Advances in Cryptology, AUSCRYPT’ 90, volume 453 of Lecture Notes in Computer Science, 8–11 January, 1990, Sydney, Australia, Springer; 246–264.
D. L. Chaum. Achieving Electronic Privacy, Scientific American, August 1992, p. 96–101.
Chor, B., Goldreich, O., Kushilevitz, E., and Sudan, M. Private information retrieval. Journal of the ACM 45, 6 (1998), 965–981.
J Claessens, B Preneel, and J Vandewalle: “Solutions for Anonymous Communication on the Internet”, in Proceedings of the IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology, ICCST’99, Madrid, Spain, October 5–7, 1999, pp 298–303
J. Claessens and B. Preneel and J. Vandewalle, “Anonymity controlled electronic payment systems”, 20th Symp. on Information Theory in the Benelux, A. M. Barb et. al. (Editors), ISBN: 90-71048-14-4, pages 109–116, 1999.
EPIC (Electronic Privacy Information Center): Surfer Beware III: Privacy Policies without Privacy Protection, December 1999, http://www.epic.org/reports/surfer-beware3.html
J Hagel, M Singer: Net Worth: Shaping Markets When Customers Make the Rules; Harvard Business School Press, U.S.; 1999.
International Working Group on Data Protection in Telecommunications: Common Position on Privacy and location information in mobile communications services. Adopted at the 29th meeting of the Working Group on 15/16 Februar 2001 in Bangalore. http://www.datenschutz-berlin.de/doc/int/iwgdpt/locat-en.htm
Hiroyuki Kanemitsu, Tomihisa Kamada, POIX: Point Of Interest eXchange Language Specification, W3C Note 24 June 1999, http://www.w3.org/TR/poix
B. Lampson. Designing a global name service. In Proceedings of the 5th Symposium on Principles of Distributed Computing, ACM SIGACTSIGOPS, pages 1–10, 1986. Available through http://citeseer.nj.nec.com/lampson86designing.html
Leonhardi, A.; Rothermel, K.: A Comparison of Protocols for Updating Location Information, To appear in Special Issue on Spatial Location in Networking, Baltzer Cluster Computing Journal, Baltzer Science Publishers, 2001.
U. Leonhardt and J. Magee: Security Considerations for a Distributed Location Service, http://citeseer.nj.nec.com/105245.html
A Lysyanskaya, R Rivest, A Sahai, and S Wolf. Pseudonym systems, Proceedings of SAC 99, Available at: ftp://ftp.inf.ethz.ch/pub/crypto/publications/LRSW99.ps
D. V. Martin Jr.: Local Anonymity in the Internet, PhD Thesis, Boston University Graduate School of Arts and Sciences, 1999
A J. Menezes, P C. van Oorschot and S A. Vanstone; Handbook of Applied Cryptography, CRC Press, ISBN: 0-8493-8523-7, Fourth Printing, July 1999
NMEA: Bennett P., The NMEA FAQ, version 6.3, April 25, 2000, http://vancouver-webpages.com/pub/peter/nmeafaq.txt
OECD: Guidelines on the Protection of Privacy and Transborder Flows of Personal Data, 1980, updated 05 January 1999 http://wwwl.oecd.org/dsti/sti/it/secur/prod/PRTV-EN.HTM
OGC: Lake, R., Cuthbert, A. (eds.), Geography Markup Language (GML) v1.0, OGC Document Number: 00-029, 12-May-2000, http://www.opengis.org/techno/specs/00-029.pdf
S Olsen “Privacy flaw continues to dig IE hole”, CNET News.com, January 15, 2002, 2:40 p.m. PT http://news.cnet.com/news/0-1005-200-8494180.html
Andreas Pfitzmann, Marit Köhntopp: Anonymity, Unobservability, and Pseudonymity-A Proposal for Terminology; in: H Federrath (Ed.): Designing Privacy Enhancing Technologies; Proc. Workshop on Design Issues in Anonymity and Unobservability; LNCS 2009; 2001; 1–9. Newer versions available at http://www.koehntopp.de/marit/pub/anon/
RFC 2486: B. Aboba, M. Beadles. The Network Access Identifier. January 1999.
RFC 2692: C. Ellison: SPKI Requirements. September 1999.
RFC 2693: C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, T. Ylonen: SPKI Certificate Theory.. September 1999
RFC 2704: M. Blaze, J. Feigenbaum, J. Ioannidis, A. Keromytis. The KeyNote Trust-Management System Version 2, September 1999.
R. L. Rivest and B. Lampson. SDSI-A Simple Distributed Security Infrastructure. Version 1.1, Presented at CRYPTO’96 Rumpsession, http://theory. lcs.mit.edu/rivest/sdsi11.html, 1996.
S. Schneider and A. Sidiropoulos CSP and anonymity, ESORICS, LNCS 1146, 1996.
Sekiguchi, et al., Navigation Markup Language (NVML), W3C Note 6 Aug 1999,http://www.w3.org/TR/NVML
Kerry L. Shackelford: “Privacy: A Report from the Front Lines” and “Privacy: Taking Action to Safeguard Customer Loyalty”, Electronic Banking Law and Commerce Report, Glasser Legal Works, 150 Clove Road, Little Falls, NJ 07424, Oct/Nov 2001. Available at: http://www.andersen.com/
Shmatikov, V., and Hughes, D.J.D. Defining Anonymity and Privacy (extended abstract). In Workshop on Issues in the Theory of Security (WITS’ 02), 2002.
S. Stubblebine, P. Syverson, and D. Goldschlag. Unlinkable Serial Transactions: Protocols and Applications, ACM Transactions on Information and System Security, Vol. 2, No. 4, Nov. 1999.
S. Stubblebine, and P. Syverson. Authentic Attributes with Fine-Grained Anonymity Protection, Financial Cryptography 2000, LNCS Series, Springer-Verlag, 2000.
Paul Syverson and Stuart Stubblebine. “Group Principals and the Formalization of Anonymity”, in FM’99 Formal Methods, Vol. I, J.M. Wing, J. Woodcock, and J. Davies (eds.), Springer-Verlag, LNCS vol. 1708, pp.814–833, 1999.
John Wells, Claude Castelluccia, Cloaking: Location Hiding in IPv6, Inria Rhone-Alpes, Rapport de Recherche, June 25, 2001, ISSN 0249-6399, Available through http://www.inria.fr
Westin, A: Privacy and Freedom, New York, Atheneum, 1967
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Kluwer Academic Publishers
About this chapter
Cite this chapter
Cuellar, J.R. (2002). Location Information Privacy. In: Sarikaya, B. (eds) Geographic Location in the Internet. The International Series in Engineering and Computer Science, vol 691. Springer, Boston, MA. https://doi.org/10.1007/0-306-47573-1_8
Download citation
DOI: https://doi.org/10.1007/0-306-47573-1_8
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4020-7097-6
Online ISBN: 978-0-306-47573-3
eBook Packages: Springer Book Archive