Skip to main content

Part of the book series: The International Series in Engineering and Computer Science ((SECS,volume 691))

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 3GPP (3rd Generation Partnership Project), Technical Specification Group Core Network, Universal Geographical Area Description (GAD), Release 1999, Technical Specification, 3G TS 23.032 V3.1.0 (2000-03)

    Google Scholar 

  2. N. Asokan, “Anonymity in Mobile Computing Environment”, IEEE Workshop on Mobile Computing Systems and Applications, Santa Cruz, CA, 1994, http://citeseer.nj.nec.com/asokan94anonymity.html

  3. N. Asokan. Security Issues in Mobile Computing. Unpublished manuscript, October 1994. http://citeseer.nj.nec.com/ asokan94security.html

  4. O Berthold, M Köhntopp: Identity Management Based On P3P, in: H Federrath (Ed.): Designing Privacy Enhancing Technologies; Proc. Workshop on Design Issues in Anonymity and Unobservability; LNCS 2009; 2001; 141–160

    Google Scholar 

  5. M Blaze, J Feigenbaum, J Ioannidis, and A D. Keromytis: The Role of Trust Management in Distributed Systems Security. In: Vitek, J., Jensen, C.D., (Eds.), Secure Internet Programming, Security Issues for Mobile and Distributed Objects, Lecture Notes in Computer Science.1603, Pages 185–210, Springer

    Google Scholar 

  6. M Blaze, J Feigenbaum, and J Lacy: Decentralized Trust Management.

    Google Scholar 

  7. Brands S A.: Rethinking Public Key Infrastructures and Digital Certificates, The MIT Press, Cambridge, Massachusetts, August 2000. ISBN 0-262-02491-82000

    Google Scholar 

  8. Brands S A.: Private credentials. White paper by Zero-Knowledge Systems, Inc., November 2000. Available at: http://www.zks.net/media/credsnew.pdf..

  9. D. L. Chaum. Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM, 24(2):84–88, February 1981.

    Google Scholar 

  10. D. Chaum, Security Without Identification: Card Computers to Make Big Brother Obsolete, Available at: http://www.chaum.com/ articles/Security-Wthout-Identification.htm Updated Version of: Security Without Identification: Transaction Systems to Make Big Brother Obsolete. Communications of the ACM, 28(10): 1030–1044, October 1985.

  11. D. Chaum: Showing Credentials without Identification: Transferring Signatures between Unconditionally Unlinkable Pseudonyms; in: J. Seberry /J. Pieprzyk (Eds.): Advances in Cryptology, AUSCRYPT’ 90, volume 453 of Lecture Notes in Computer Science, 8–11 January, 1990, Sydney, Australia, Springer; 246–264.

    Google Scholar 

  12. D. L. Chaum. Achieving Electronic Privacy, Scientific American, August 1992, p. 96–101.

    Google Scholar 

  13. Chor, B., Goldreich, O., Kushilevitz, E., and Sudan, M. Private information retrieval. Journal of the ACM 45, 6 (1998), 965–981.

    MathSciNet  Google Scholar 

  14. J Claessens, B Preneel, and J Vandewalle: “Solutions for Anonymous Communication on the Internet”, in Proceedings of the IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology, ICCST’99, Madrid, Spain, October 5–7, 1999, pp 298–303

    Google Scholar 

  15. J. Claessens and B. Preneel and J. Vandewalle, “Anonymity controlled electronic payment systems”, 20th Symp. on Information Theory in the Benelux, A. M. Barb et. al. (Editors), ISBN: 90-71048-14-4, pages 109–116, 1999.

    Google Scholar 

  16. EPIC (Electronic Privacy Information Center): Surfer Beware III: Privacy Policies without Privacy Protection, December 1999, http://www.epic.org/reports/surfer-beware3.html

  17. J Hagel, M Singer: Net Worth: Shaping Markets When Customers Make the Rules; Harvard Business School Press, U.S.; 1999.

    Google Scholar 

  18. International Working Group on Data Protection in Telecommunications: Common Position on Privacy and location information in mobile communications services. Adopted at the 29th meeting of the Working Group on 15/16 Februar 2001 in Bangalore. http://www.datenschutz-berlin.de/doc/int/iwgdpt/locat-en.htm

  19. Hiroyuki Kanemitsu, Tomihisa Kamada, POIX: Point Of Interest eXchange Language Specification, W3C Note 24 June 1999, http://www.w3.org/TR/poix

  20. B. Lampson. Designing a global name service. In Proceedings of the 5th Symposium on Principles of Distributed Computing, ACM SIGACTSIGOPS, pages 1–10, 1986. Available through http://citeseer.nj.nec.com/lampson86designing.html

  21. Leonhardi, A.; Rothermel, K.: A Comparison of Protocols for Updating Location Information, To appear in Special Issue on Spatial Location in Networking, Baltzer Cluster Computing Journal, Baltzer Science Publishers, 2001.

    Google Scholar 

  22. U. Leonhardt and J. Magee: Security Considerations for a Distributed Location Service, http://citeseer.nj.nec.com/105245.html

  23. A Lysyanskaya, R Rivest, A Sahai, and S Wolf. Pseudonym systems, Proceedings of SAC 99, Available at: ftp://ftp.inf.ethz.ch/pub/crypto/publications/LRSW99.ps

  24. D. V. Martin Jr.: Local Anonymity in the Internet, PhD Thesis, Boston University Graduate School of Arts and Sciences, 1999

    Google Scholar 

  25. A J. Menezes, P C. van Oorschot and S A. Vanstone; Handbook of Applied Cryptography, CRC Press, ISBN: 0-8493-8523-7, Fourth Printing, July 1999

    Google Scholar 

  26. NMEA: Bennett P., The NMEA FAQ, version 6.3, April 25, 2000, http://vancouver-webpages.com/pub/peter/nmeafaq.txt

  27. OECD: Guidelines on the Protection of Privacy and Transborder Flows of Personal Data, 1980, updated 05 January 1999 http://wwwl.oecd.org/dsti/sti/it/secur/prod/PRTV-EN.HTM

  28. OGC: Lake, R., Cuthbert, A. (eds.), Geography Markup Language (GML) v1.0, OGC Document Number: 00-029, 12-May-2000, http://www.opengis.org/techno/specs/00-029.pdf

  29. S Olsen “Privacy flaw continues to dig IE hole”, CNET News.com, January 15, 2002, 2:40 p.m. PT http://news.cnet.com/news/0-1005-200-8494180.html

  30. Andreas Pfitzmann, Marit Köhntopp: Anonymity, Unobservability, and Pseudonymity-A Proposal for Terminology; in: H Federrath (Ed.): Designing Privacy Enhancing Technologies; Proc. Workshop on Design Issues in Anonymity and Unobservability; LNCS 2009; 2001; 1–9. Newer versions available at http://www.koehntopp.de/marit/pub/anon/

  31. RFC 2486: B. Aboba, M. Beadles. The Network Access Identifier. January 1999.

    Google Scholar 

  32. RFC 2692: C. Ellison: SPKI Requirements. September 1999.

    Google Scholar 

  33. RFC 2693: C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, T. Ylonen: SPKI Certificate Theory.. September 1999

    Google Scholar 

  34. RFC 2704: M. Blaze, J. Feigenbaum, J. Ioannidis, A. Keromytis. The KeyNote Trust-Management System Version 2, September 1999.

    Google Scholar 

  35. R. L. Rivest and B. Lampson. SDSI-A Simple Distributed Security Infrastructure. Version 1.1, Presented at CRYPTO’96 Rumpsession, http://theory. lcs.mit.edu/rivest/sdsi11.html, 1996.

  36. S. Schneider and A. Sidiropoulos CSP and anonymity, ESORICS, LNCS 1146, 1996.

    Google Scholar 

  37. Sekiguchi, et al., Navigation Markup Language (NVML), W3C Note 6 Aug 1999,http://www.w3.org/TR/NVML

  38. Kerry L. Shackelford: “Privacy: A Report from the Front Lines” and “Privacy: Taking Action to Safeguard Customer Loyalty”, Electronic Banking Law and Commerce Report, Glasser Legal Works, 150 Clove Road, Little Falls, NJ 07424, Oct/Nov 2001. Available at: http://www.andersen.com/

  39. Shmatikov, V., and Hughes, D.J.D. Defining Anonymity and Privacy (extended abstract). In Workshop on Issues in the Theory of Security (WITS’ 02), 2002.

    Google Scholar 

  40. S. Stubblebine, P. Syverson, and D. Goldschlag. Unlinkable Serial Transactions: Protocols and Applications, ACM Transactions on Information and System Security, Vol. 2, No. 4, Nov. 1999.

    Google Scholar 

  41. S. Stubblebine, and P. Syverson. Authentic Attributes with Fine-Grained Anonymity Protection, Financial Cryptography 2000, LNCS Series, Springer-Verlag, 2000.

    Google Scholar 

  42. Paul Syverson and Stuart Stubblebine. “Group Principals and the Formalization of Anonymity”, in FM’99 Formal Methods, Vol. I, J.M. Wing, J. Woodcock, and J. Davies (eds.), Springer-Verlag, LNCS vol. 1708, pp.814–833, 1999.

    Google Scholar 

  43. John Wells, Claude Castelluccia, Cloaking: Location Hiding in IPv6, Inria Rhone-Alpes, Rapport de Recherche, June 25, 2001, ISSN 0249-6399, Available through http://www.inria.fr

  44. Westin, A: Privacy and Freedom, New York, Atheneum, 1967

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Kluwer Academic Publishers

About this chapter

Cite this chapter

Cuellar, J.R. (2002). Location Information Privacy. In: Sarikaya, B. (eds) Geographic Location in the Internet. The International Series in Engineering and Computer Science, vol 691. Springer, Boston, MA. https://doi.org/10.1007/0-306-47573-1_8

Download citation

  • DOI: https://doi.org/10.1007/0-306-47573-1_8

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4020-7097-6

  • Online ISBN: 978-0-306-47573-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics