Search For:

Displaying 1-7 out of 7 total
Location-Related Privacy in Geo-Social Networks
Found in: IEEE Internet Computing
By Carmen Ruiz Vicente, Dario Freni, Claudio Bettini, Christian S. Jensen
Issue Date:May 2011
pp. 20-27
<p>Geo-social networks (GeoSNs) provide context-aware services that help associate location with users and content. The proliferation of GeoSNs indicates that they're rapidly attracting users. GeoSNs currently offer different types of services, inclu...
Detecting Hazardous Vehicles and Disseminating Their Behavior in Urban Areas
Found in: 2012 13th IEEE International Conference on Mobile Data Management (MDM)
By Vasilis Verroios,Carmen Ruiz Vicente,Alex Delis
Issue Date:July 2012
pp. 280-281
Speeding cars and motorcycles constantly varying their speed, changing lanes or committing other apparent traffic violations as well as police cars and ambulances responding to incidents, are examples of vehicles that demonstrate hazardous traffic patterns...
Effective Privacy-Preserving Online Route Planning
Found in: Mobile Data Management, IEEE International Conference on
By Carmen Ruiz Vicente,Ira Assent,Christian S. Jensen
Issue Date:June 2011
pp. 119-128
An online Route Planning Service (RPS) computes a route from one location to another. Current RPSs such as Google Maps require the use of precise locations. However, some users may not want to disclose their source and destination locations due to privacy ...
User-Generated Content: The Case for Mobile Services
Found in: Computer
By Christian S. Jensen, Carmen Ruiz Vicente, Rico Wind
Issue Date:December 2008
pp. 116-118
Enabling user-generated services could help fuel the mobile revolution.
Privacy-preserving matching of spatial datasets with protection against background knowledge
Found in: Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems (GIS '10)
By Carmen Ruiz Vicente, Elisa Bertino, Gabriel Ghinita, Ning Shang
Issue Date:November 2010
pp. 3-12
Private matching (or join) of spatial datasets is crucial for applications where distinct parties wish to share information about nearby geo-tagged data items. To protect each party's data, only joining pairs of points should be revealed, and no additional...
Preserving location and absence privacy in geo-social networks
Found in: Proceedings of the 19th ACM international conference on Information and knowledge management (CIKM '10)
By Carmen Ruiz Vicente, Christian S. Jensen, Claudio Bettini, Dario Freni, Sergio Mascetti
Issue Date:October 2010
pp. 309-318
Online social networks often involve very large numbers of users who share very large volumes of content. This content is increasingly being tagged with geo-spatial and temporal coordinates that may then be used in services. For example, a service may retr...
Towards location-based access control in healthcare emergency response
Found in: Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS (SPRINGL '09)
By Carmen Ruiz Vicente, Christian S. Jensen, Elisa Bertino, Gabriel Ghinita, Michael Kirkpatrick
Issue Date:November 2009
pp. 22-26
Recent advances in positioning and tracking technologies have led to the emergence of novel location-based applications that allow participants to access information relevant to their spatio-temporal context. Traditional access control models, such as role...