Academic literature on the topic 'Location- Privacy control'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Location- Privacy control.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Location- Privacy control"

1

Yunxiang, Zhang, and Wang Bin. "Stability Control of Position Flow Fuzzy Estimation in Swarm Intelligence Aware Privacy Protection." Wireless Communications and Mobile Computing 2023 (January 30, 2023): 1–8. http://dx.doi.org/10.1155/2023/4792248.

Full text
Abstract:
The group intelligence perception privacy protection model is a method to achieve the balance between user privacy and service requests through the cooperation between users using location services and has a good perception effect. In order to better protect the location privacy of network users and improve the stability control effect of fuzzy estimation of location flow, this paper designs a stability control method of fuzzy estimation of location flow in group intelligent perception privacy protection. This method uses the group intelligence aware privacy protection model to obtain the user network location coordinates in the group intelligence aware privacy protection. Taking the user’s network location coordinates as input, the location flow queue of multiple users in the group intelligence aware privacy protection network is obtained by the Lyapunov multiobjective location flow estimation queue model. After the fuzzy processing of the user location flow queue, the online control mechanism of location flow fuzzy estimation stability under different conditions is established. According to the online control mechanism, a stability control method based on access control and group intelligence aware task allocation is used to realize the stability control of location flow fuzzy estimation in group intelligence aware privacy protection. The experimental results show that the method can obtain 100% of the user location integrity in the group intelligence aware privacy protection, and the target location flow estimation queue is more accurate. It can effectively reduce the number of communication rounds of fuzzy estimation of location flow in the group intelligence aware privacy protection and has better stability control ability.
APA, Harvard, Vancouver, ISO, and other styles
2

Peng, Tao, Qin Liu, and Guojun Wang. "Enhanced Location Privacy Preserving Scheme in Location-Based Services." IEEE Systems Journal 11, no. 1 (March 2017): 219–30. http://dx.doi.org/10.1109/jsyst.2014.2354235.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zhu, Liang, Xiaowei Liu, Zhiyong Jing, Liping Yu, Zengyu Cai, and Jianwei Zhang. "Knowledge-Driven Location Privacy Preserving Scheme for Location-Based Social Networks." Electronics 12, no. 1 (December 24, 2022): 70. http://dx.doi.org/10.3390/electronics12010070.

Full text
Abstract:
Location privacy-preserving methods for location-based services in mobile communication networks have received great attention. Traditional location privacy-preserving methods mostly focus on the researches of location data analysis in geographical space. However, there is a lack of studies on location privacy preservation by considering the personalized features of users. In this paper, we present a Knowledge-Driven Location Privacy Preserving (KD-LPP) scheme, in order to mine user preferences and provide customized location privacy protection for users. Firstly, the UBPG algorithm is proposed to mine the basic portrait. User familiarity and user curiosity are modelled to generate psychological portrait. Then, the location transfer matrix based on the user portrait is built to transfer the real location to an anonymous location. In order to achieve customized privacy protection, the amount of privacy is modelled to quantize the demand of privacy protection of target user. Finally, experimental evaluation on two real datasets illustrates that our KD-LPP scheme can not only protect user privacy, but also achieve better accuracy of privacy protection.
APA, Harvard, Vancouver, ISO, and other styles
4

Yang, Guangcan, Shoushan Luo, Yang Xin, Hongliang Zhu, Jingkai Wang, Mingzhen Li, and Yunfeng Wang. "A Search Efficient Privacy-Preserving Location-Sharing Scheme in Mobile Online Social Networks." Applied Sciences 10, no. 23 (November 25, 2020): 8402. http://dx.doi.org/10.3390/app10238402.

Full text
Abstract:
With the advent of intelligent handheld devices, location sharing becomes one of the most popular services in mobile online social networks (mOSNs). In location-sharing services, users can enjoy a better social experience by updating their real-time location information. However, the leakage of private information may hinder the further development of location-sharing services. Although many solutions have been proposed to protect users’ privacy, the privacy-utility trade-offs must be considered. Therefore, we propose a new scheme called search efficient privacy-preserving location-sharing (SELS) system. In our scheme, we create a new approach named associated grids to improve the efficiency of location-sharing systems while maintaining users’ privacy. In addition, by setting the user-defined access control policy proposed in our scheme, users’ flexible privacy-preserving requirements can be satisfied. Detailed complexity and security analysis show that the proposed scheme is a practical and efficient privacy-preserving solution. Extensive simulations are performed to validate the effectiveness and performance of our scheme.
APA, Harvard, Vancouver, ISO, and other styles
5

Perusco, Laura, and Katina Michael. "Control, trust, privacy, and security: evaluating location-based services." IEEE Technology and Society Magazine 26, no. 1 (2007): 4–16. http://dx.doi.org/10.1109/mtas.2007.335564.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Luceri, Luca, Davide Andreoletti, Massimo Tornatore, Torsten Braun, and Silvia Giordano. "Measurement and control of geo-location privacy on Twitter." Online Social Networks and Media 17 (May 2020): 100078. http://dx.doi.org/10.1016/j.osnem.2020.100078.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chu, Xiang, Jun Liu, Daqing Gong, and Rui Wang. "Preserving Location Privacy in Spatial Crowdsourcing Under Quality Control." IEEE Access 7 (2019): 155851–59. http://dx.doi.org/10.1109/access.2019.2949409.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Qi He, Dapeng Wu, and P. Khosla. "The quest for personal control over mobile location privacy." IEEE Communications Magazine 42, no. 5 (May 2004): 130–36. http://dx.doi.org/10.1109/mcom.2004.1299356.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Góes, Rômulo Meira, Blake C. Rawlings, Nicholas Recker, Gregory Willett, and Stéphane Lafortune. "Demonstration of Indoor Location Privacy Enforcement using Obfuscation." IFAC-PapersOnLine 51, no. 7 (2018): 145–51. http://dx.doi.org/10.1016/j.ifacol.2018.06.293.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Xu, Chuan, Li Luo, Yingyi Ding, Guofeng Zhao, and Shui Yu. "Personalized Location Privacy Protection for Location-Based Services in Vehicular Networks." IEEE Wireless Communications Letters 9, no. 10 (October 2020): 1633–37. http://dx.doi.org/10.1109/lwc.2020.2999524.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Location- Privacy control"

1

Jedrzejczyk, Lukasz. "Supporting location privacy management through feedback and control." Thesis, Open University, 2012. http://oro.open.ac.uk/36211/.

Full text
Abstract:
Participation in modern, socially-focused digital systems involves a large degree of privacy management, i.e. controlling who may access what information under what circumstances. Effective privacy management (control) requires that mobile systems’ users be able to make informed privacy decisions as their experience and knowledge of a system progresses. By informed, we mean users be aware of the actual information flow. Moreover, privacy preferences vary across the context and it is hard to define privacy policy that reflects the dynamic nature of our lives. This research explores the problem of supporting awareness of information flow and designing usable interfaces for maintaining privacy policies ad-hoc. We borrow from the world of Computer Supported Collaborative Work (CSCW) and propose to incorporate social translucence, a design approach that “supports coherent behaviour by making participants and their activities visible to one another”. We use the characteristics of social translucence, namely visibility, awareness and accountability in order to introduce social norms in spatially dispersed systems. Our research is driven by two questions: (1) how can artifacts from real world social interaction, such as responsibility, be embedded into mobile interaction; and (2) can systems be designed in which both privacy violations and the burden of privacy management is minimized. The contributions of our work are: (1) an implementation of Buddy Tracker, privacy-aware location-sharing application based on the social translucence; (2) the design and evaluation of the concept of real-time feedback as a means of incorporating social translucence in location-sharing scenarios; and finally (3) a novel interface for ad-hoc privacy management called Privacy-Shake. We explore the role of real-time feedback for privacy management in the context of Buddy Tracker. Informed by focus group discussions, interviews, surveys and two field trials of Buddy Tracker we found that when using a system that provided real-time feedback, people were more accountable for their actions and reduced the number of unreasonable location requests. From our observations we develop concrete design guidelines for incorporating real-time feedback into information sharing applications in a manner that ensures social acceptance of the technology.
APA, Harvard, Vancouver, ISO, and other styles
2

Cerf, Sophie. "control theory for computing systems : application to big-data cloud services & location privacy protection." Thesis, Université Grenoble Alpes (ComUE), 2019. http://www.theses.fr/2019GREAT024.

Full text
Abstract:
Cette thèse présente une application de la théorie du contrôle pour les systèmes informatiques. Un algorithme de contrôle peut gérer des systèmes plus grands et plus complexes, même lorsqu'ils sont particulièrement sensibles aux variations de leur environnement. Cependant, l'application du contrôle aux systèmes informatiques soulève plusieurs défis, par exemple dû au fait qu'aucune physique ne les régisse. D'une part, le cadre mathématique fourni par la théorie du contrôle peut être utilisé pour améliorer l'automatisation, la robustesse et la fiabilité des systèmes informatiques. D'autre part, les défis spécifiques de ces cas d'étude permettent d'élargir la théorie du contrôle elle-même. L'approche adoptée dans ce travail consiste à utiliser deux systèmes informatiques d'application: la protection de vie privée liée à la mobilité et les performances des services clouds. Ces deux cas d'utilisation sont complémentaires par la nature de leurs technologies, par leur échelle et par leurs utilisateurs finaux.La popularité des appareils mobiles a favorisé la diffusion et la collecte des données de localisation, que ce soit pour que l'utilisateur bénéficie d'un service personnalisé (e.g. une planification d'itinéraire) ou pour que le prestataire de services tire des informations utiles des bases de données de mobilité (e.g. la popularité de lieux). En effet, de nombreuses informations peuvent être extraites de données de localisation, y compris des données personnelles très sensibles. Pour remédier à cette atteinte à la vie privée, des mécanismes de protection spécifiques aux données de mobilité (LPPM) ont été élaborés. Ce sont des algorithmes qui modifient les données de localisation de l'utilisateur, dans le but de cacher des informations sensibles. Cependant, ces outils ne sont pas facilement configurables par des non experts et sont des processus statiques qui ne s'adaptent pas à la mobilité de l'utilisateur. Dans cette thèse, nous développons deux outils, l'un pour les bases de données déjà collectées et l'autre pour l'utilisation en ligne, qui garantissent aux utilisateurs des niveaux de protection de la vie privée et de préservation de la qualité des services en configurant les LPPMs. Nous présentons la première formulation du problème en termes de théorie du contrôle (système et contrôleur, signaux d’entrée et de sortie), et un contrôleur PI pour servir de démonstration d’applicabilité. Dans les deux cas, la conception, la mise en œuvre et la validation ont été effectuées par le biais d'expériences utilisant des données d'utilisateurs réels recueillies sur le terrain.L'essor récent des bigdata a conduit au développement de programmes capables de les analyser, tel que MapReduce. Les progrès des pratiques informatiques ont également permis d'établir le modèle du cloud (où il est possible de louer des ressources de bas niveau pour permettre le développement d'applications de niveau supérieur sans se préoccuper d'investissement ou de maintenance) comme une solution incontournable pour tous types d'utilisateurs. Garantir les performances des tâches MapReduce exécutées sur les clouds est donc une préoccupation majeure pour les grandes entreprises informatiques et leurs clients. Dans ce travail, nous développons des techniques avancées de contrôle du temps d'exécution des tâches et de la disponibilité de la plate-forme en ajustant la taille du cluster de ressources et en réalisant un contrôle d'admission, fonctionnant quelle que soit la charge des clients. Afin de traiter les non linéarités de MapReduce, un contrôleur adaptatif a été conçu. Pour réduire l'utilisation du cluster (qui entraîne des coûts financiers et énergétiques considérables), nous présentons une nouvelle formulation du mécanisme de déclenchement du contrôle événementiel, combiné à un contrôleur prédictif optimal. L'évaluation est effectuée sur un benchmark s'exécutant en temps réel sur un cluster, et en utilisant des charges de travail industrielles
This thesis presents an application of Control Theory for Computing Systems. It aims at investigating techniques to build and control efficient, dependable and privacy-preserving computing systems. Ad-hoc service configuration require a high level of expertise which could benefit from automation in many ways. A control algorithm can handle bigger and more complex systems, even when they are extremely sensitive to variations in their environment. However, applying control to computing systems raises several challenges, e.g. no physics governs the applications. On one hand, the mathematical framework provided by control theory can be used to improve automation and robustness of computing systems. Moreover, the control theory provides by definition mathematical guarantees that its objectives will be fulfilled. On the other hand, the specific challenges of such use cases enable to expand the control theory itself. The approach taken in this work is to use two application computing systems: location privacy and cloud control. Those two use-cases are complementary in the nature of their technologies and softwares, their scale and in their end-users.The widespread of mobile devices has fostered the broadcasting and collection of users’ location data. It could be for the user to benefit from a personalized service (e.g. weather forecast or route planning) or for the service provider or any other third party to derive useful information from the mobility databases (e.g. road usage frequency or popularity of places). Indeed, many information can be retrieved from location data, including highly sensitive personal data. To overcome this privacy breach, Location Privacy Protection Mechanisms (LPPMs) have been developed. They are algorithm that modify the user’s mobility data, hopefully to hide some sensitive information. However, those tools are not easily configurable by non experts and are static processes that do not adapt to the user’s mobility. We develop two tools, one for already collected databases and one for online usage, that, by tuning the LPPMs, guarantee to the users objective-driven levels of privacy protection and of service utility preservation. First, we present an automated tool able to choose and configure LPPMs to protect already collected databases while ensuring a trade-off between privacy protection and database processing quality. Second, we present the first formulation of the location privacy challenge in control theory terms (plant and control, disturbance and performance signals), and a feedback controller to serve as a proof of concept. In both cases, design, implementation and validation has been done through experiments using data of real users collected on the field.The surge in data generation of the last decades, the so-called bigdata, has lead to the development of frameworks able to analyze them, such as the well known MapReduce. Advances in computing practices has also settled the cloud paradigms (where low-level resources can be rented to allow the development of higher level application without dealing with consideration such as investment in hardware or maintenance) as premium solution for all kind of users. Ensuring the performances of MapReduce jobs running on clouds is thus a major concern for the big IT companies and their clients. In this work, we develop advanced monitoring techniques of the jobs execution time and the platform availability by tuning the resource cluster size and realizing admission control, in spite of the unpredictable client workload. In order to deal with the non linearities of the MapReduce system, a robust adaptive feedback controller has been designed. To reduce the cluster utilization (leading to massive financial and energetic costs), we present a new event-based triggering mechanism formulation combined with an optimal predictive controller. Evaluation is done on a MapReduce benchmark suite running on a large-scale cluster, and using real jobs workloads
APA, Harvard, Vancouver, ISO, and other styles
3

Chini, Foroushan Amir Hossein. "Protecting Location-Data Against Inference Attacks Using Pre-Defined Personas." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-66792.

Full text
Abstract:
Usage of locational data is getting more popular day by day. Location-aware application, context aware application and Ubiquities applications are some of the major categories of applications which are based on locational data. One of the most concerning issues regarding such applications is how to protect user’s privacy against malicious attackers. Failing in this task would result in a total failure for the project, considering how privacy concerns are getting more and more important for the end users. In this project, we will propose a theoretical solution for protecting user privacy in location-based application against inference attacks. Our solution is based on categorizing target users into pre-defined groups (a. k. a. Personas) and utilizing their common characteristics in order to synthesize access control rules for the collected data.
APA, Harvard, Vancouver, ISO, and other styles
4

Ardagna, C. A. "Privacy and security in distributed and pervasive systems." Doctoral thesis, Università degli Studi di Milano, 2008. http://hdl.handle.net/2434/55664.

Full text
Abstract:
Technical improvements of Web and location technologies have fostered the development of online applications that use private information of users to offer enhanced services. As a consequence, the vast amount of personal information thus available on the Web has led to growing concerns about privacy of its users. Today global networked infrastructure requires the ability for parties to communicate in a secure environment while at the same time preserving their privacy. Support for digital identities and definition of privacy-enhanced protocols and techniques for their management and exchange become then fundamental requirements. A number of useful privacy enhancing technologies (PETs) have been developed for dealing with privacy issues and previous works on privacy protection have focused on a wide variety of topics. Among them, for helping users in maintaining control over their personal information, access control solutions have been enriched with the ability of supporting privacy requirements, by regulating access to and release of users personal information. Despite the benefits of such solutions few proposals have addressed the problem of how to regulate use of personal information in secondary applications. Moreover, this large number of solutions is causing some confusion and seems increasing the effort for developers to build online services. In this thesis, the notions of privacy and access control are fully integrated within a common framework, and a privacy-aware access control system supporting digital identities, anonymous interactions, and fine-grained context information is defined together with an evaluation infrastructure. The defined models and languages, which provide authorizations based on digital certificates, include support for obligations constraints and data handling policies that regulate secondary use and dissemination of private information exchanged among parties. The proposed privacy-aware access control system is however of little values if location privacy is not protected. Location information in fact has achieved a level of accuracy that makes straightforward its adoption within an access control system to define restrictions based on physical position of users. By contrast, location information can cause loss of privacy on users whereabouts and can easily permit to re-identify the users by looking at information, such as the place in which users stay during the night. Special attention is then devoted to protection of location information with respect to privacy threats that can happen in today pervasive environment, where location information of users is available to external parties without restrictions. A further complicating factor is that while protecting location privacy, the quality of service of location-based applications plays an important role and should be preserved. In this thesis, we propose an obfuscation-based solution to location privacy protection that balances the need of privacy of users and the need of location information accuracy of location-based services. This solution is then validated in the context of our location-based access control (LBAC) system, which is responsible for the evaluation and management of an innovative access control language supporting a new class of location-aware conditions. This approach coupled with the privacy-aware access control system guarantees flexible and reliable access control evaluation and enforcement while protecting the privacy of the users. In summary, the contribution of this thesis is twofold: first we develop a privacy-aware access control system for Web transactions; then we propose a LBAC system and a location privacy solution to be validated in the context of such a system. With respect to the development of a privacy-aware access control system, the original results are: the definition of an access control model, composed of attribute-based access control and release policies, which on the one side regulates access to service provider resources, and on the other side manages release of user data. Our model supports requests for certified and uncertified data, ontology definition, anonymous interactions, and zero-knowledge proofs; the definition of a data handling model and language for specification and enforcement of policies aimed at protecting secondary use of private information of users after their release to external parties; an architecture for the composition of access control, release, and data handling policies. With respect to the definition of a location privacy solution to be integrated in the context of our location-based access control model and language, the original results are: the definition of an infrastructure for the evaluation and enforcement of LBAC policies, which manages the uncertainty of location-based information; the definition of a location privacy solution based on obfuscation techniques balancing privacy need of users and accuracy need of location-based services; a privacy-aware LBAC system integrating our privacy-aware access control system, our location-based access control system, and our location privacy solution.
APA, Harvard, Vancouver, ISO, and other styles
5

Lin, Yousi. "Spectrum Management Issues in Centralized and Distributed Dynamic Spectrum Access." Diss., Virginia Tech, 2021. http://hdl.handle.net/10919/104362.

Full text
Abstract:
Dynamic spectrum access (DSA) is a powerful approach to mitigate the spectrum scarcity problem caused by rapid increase in wireless communication demands. Based on architecture design, DSA systems can be categorized as centralized and distributed. To successfully enable DSA, both centralized and distributed systems have to deal with spectrum management issues including spectrum sensing, spectrum decision, spectrum sharing and spectrum mobility. Our work starts by investigating the challenges of efficient spectrum monitoring in centralized spectrum sensing. Since central controllers usually require the presence information of incumbent users/primary users (IUs) for decision making, which is obtained during spectrum sensing, privacy issues of IUs become big concerns in some DSA systems where IUs have strong operation security needs. To aid in this, we design novel location privacy protection schemes for IUs. Considering the general drawbacks of centralized systems including high computational overhead for central controllers, single point failure and IU privacy issues, in many scenarios, a distributed DSA system is required. In this dissertation, we also cope with the spectrum sharing issues in distributed spectrum management, specifically the secondary user (SU) power control problem, by developing distributed and secure transmit power control algorithms for SUs. In centralized spectrum management, the common approach for spectrum monitoring is to build infrastructures (e.g. spectrum observatories), which cost much money and manpower yet have relatively low coverage. To aid in this, we propose a crowdsourcing based spectrum monitoring system to capture the accurate spectrum utilization at a large geographical area, which leverages the power of masses of portable mobile devices. The central controller can accurately predict future spectrum utilization and intelligently schedule the spectrum monitoring tasks among mobile SUs accordingly, so that the energy of mobile devices can be saved and more spectrum activities can be monitored. We also demonstrate our system's ability to capture not only the existing spectrum access patterns but also the unknown patterns where no historical spectrum information exists. The experiment shows that our spectrum monitoring system can obtain a high spectrum monitoring coverage with low energy consumption. Environmental Sensing Capability (ESC) systems are utilized in DSA in 3.5 GHz to sense the IU activities for protecting them from SUs' interference. However, IU location information is often highly sensitive in this band and hence it is preferable to hide its true location under the detection of ESCs. As a remedy, we design novel schemes to preserve both static and moving IU's location information by adjusting IU's radiation pattern and transmit power. We first formulate IU privacy protection problems for static IU. Due to the intractable nature of this problem, we propose a heuristic approach based on sampling. We also formulate the privacy protection problem for moving IUs, in which two cases are analyzed: (1) protect IU's moving traces; (2) protect its real-time current location information. Our analysis provides insightful advice for IU to preserve its location privacy against ESCs. Simulation results show that our approach provides great protection for IU's location privacy. Centralized DSA spectrum management systems has to bear several fundamental issues, such as the heavy computational overhead for central controllers, single point failure and privacy concerns of IU caused by large amounts of information exchange between users and controllers and often untrusted operators of the central controllers. In this dissertation, we propose an alternative distributed and privacy-preserving spectrum sharing design for DSA, which relies on distributed SU power control and security mechanisms to overcome the limitations of centralized DSA spectrum management.
Doctor of Philosophy
Due to the rapid growth in wireless communication demands, the frequency spectrum is becoming increasingly crowded. Traditional spectrum allocation policy gives the unshared access of fixed bands to the licensed users, and there is little unlicensed spectrum left now to allocate to newly emerged communication demands. However, studies on spectrum occupancy show that many licensed users who own the license of certain bands are only active for a small percentage of time, which results in plenty of underutilized spectrum. Hence, a new spectrum sharing paradigm, called dynamic spectrum access (DSA), is proposed to mitigate this problem. DSA enables the spectrum sharing between different classes of users, generally, the unlicensed users in the DSA system can access the licensed spectrum opportunistically without interfering with the licensed users. Based on architecture design, DSA systems can be categorized as centralized and distributed. In centralized systems, a central controller will make decisions on spectrum usage for all unlicensed users. Whereas in distributed systems, unlicensed users can make decisions for themselves independently. To successfully enable DSA, both centralized and distributed DSA systems need to deal with spectrum management issues, such as resource allocation problems and user privacy issues, etc. The resource allocation problems include, for example, the problems to discover and allocate idle bands and the problems to control users' transmit power for successful coexistence. Privacy issues may also arise during the spectrum management process since certain information exchange is inevitable for global decision making. However, due to the Federal Communications Commission's (FCC) regulation, licensed users' privacy such as their location information must be protected in any case. As a result, dynamic and efficient spectrum management techniques are necessary for DSA users. In this dissertation, we investigate the above-mentioned spectrum management issues in both types of DSA systems, specifically, the spectrum sensing challenges with licensed user location privacy issues in centralized DSA, and the spectrum sharing problems in distributed DSA systems. In doing so, we propose novel schemes for solving each related spectrum management problem and demonstrate their efficacy through the results from extensive evaluations and simulations. We believe that this dissertation provides insightful advice for DSA users to solve different spectrum management issues for enabling DSA implementation, and hence helps in a wider adoption of dynamic spectrum sharing.
APA, Harvard, Vancouver, ISO, and other styles
6

Chu, Yu-Shan, and 朱育姍. "How Private Benefit of Control Affects Emerging Market Enterprises FDI Location Choices." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/74300086758241454361.

Full text
Abstract:
碩士
輔仁大學
金融與國際企業學系金融碩士班
103
Most of previous research focused on location selectivity by analyzing environmental factors or competitive advantages, and majority of the sample are in developed countries. However, with the rise of emerging markets, most of the companies have one or more control shareholders who can lead the business decisions. Due to this reason, those companies will consider the other factors that differ from the companies in developed countries when they face overseas investment decisions. Therefore, this study focuses on the companies in emerging markets, and analyzes the view of private benefit of control, investigates the relationship between private benefits and oversea investment locations choices. Our samples period is from 2009 to 2013. We examine whether private benefit will affect the choice of oversea investment locations. We discuss it from three aspects: ownership structure, transaction and management. Empirical results show that there is a negative relation between divergence in control and cash flow rights, related party transaction and earnings management. This means control shareholders may try to influence corporate to invest in the region with weak institutions because they want to protect their private benefits, and avoid the monitoring mechanism reducing the scope of private benefits. However, there are no significant relations between cash holding and external environment institution. We believe that besides consideration for investment demand, there are other purposes of cash holding. As a result, when the companies of emerging market face oversea investment decisions, private benefit is also one of the factor that will affect the location choices.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Location- Privacy control"

1

Sushil, Jajodia, Samarati Pierangela, Wang X. Sean, and SpringerLink (Online service), eds. Privacy in Location-Based Applications: Research Issues and Emerging Trends. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jordan, Frith, ed. Mobile interfaces in public spaces: Locational privacy, control, and urban sociability. New York, NY: Routledge, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Institute of Medicine (U.S.). Committee on the Role of Institutional Review Boards in Health Services Research Data Privacy Protection. Protecting data privacy in health services research. Washington, D.C: National Academy Press, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Frith, Jordan, and Adriana de Souza e Silva. Mobile Interfaces in Public Spaces: Locational Privacy, Control, and Urban Sociability. Taylor & Francis Group, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Frith, Jordan, and Adriana de Souza e Silva. Mobile Interfaces in Public Spaces: Locational Privacy, Control, and Urban Sociability. Taylor & Francis Group, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Medicine, Institute of, Division of Health Care Services, and Committee on the Role of Institutional Review Boards in Health Services Research Data Privacy Protection. Protecting Data Privacy in Health Services Research. National Academies Press, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Location- Privacy control"

1

Ardagna, Claudio A., Marco Cremonini, Sabrina De Capitani di Vimercati, and Pierangela Samarati. "Access Control in Location-Based Services." In Privacy in Location-Based Applications, 106–26. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03511-1_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Solomon, Michael G., Vaidy Sunderam, Li Xiong, and Ming Li. "Mutually Private Location Proximity Detection with Access Control." In Data and Applications Security and Privacy XXXI, 164–84. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-61176-1_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ulltveit-Moe, Nils, and Vladimir Oleshchuk. "Mobile Security with Location-Aware Role-Based Access Control." In Security and Privacy in Mobile Information and Communication Systems, 172–83. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30244-2_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Smith, Ian, Giovanni Iachello, and Mika Raento. "Mobile HCI 2004 Workshop on Location Systems Privacy and Control." In Mobile Human-Computer Interaction - MobileHCI 2004, 525–26. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-28637-0_72.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Pennekamp, Jan, Anastasiia Belova, Thomas Bergs, Matthias Bodenbenner, Andreas Bührig-Polaczek, Markus Dahlmanns, Ike Kunze, et al. "Evolving the Digital Industrial Infrastructure for Production: Steps Taken and the Road Ahead." In Internet of Production, 1–25. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-030-98062-7_2-1.

Full text
Abstract:
AbstractThe Internet of Production (IoP) leverages concepts such as digital shadows, data lakes, and a World Wide Lab (WWL) to advance today’s production. Consequently, it requires a technical infrastructure that can support the agile deployment of these concepts and corresponding high-level applications, which, e.g., demand the processing of massive data in motion and at rest. As such, key research aspects are the support for low-latency control loops, concepts on scalable data stream processing, deployable information security, and semantically rich and efficient long-term storage. In particular, such an infrastructure cannot continue to be limited to machines and sensors, but additionally needs to encompass networked environments: production cells, edge computing, and location-independent cloud infrastructures. Finally, in light of the envisioned WWL, i.e., the interconnection of production sites, the technical infrastructure must be advanced to support secure and privacy-preserving industrial collaboration. To evolve today’s production sites and lay the infrastructural foundation for the IoP, we identify five broad streams of research: (1) adapting data and stream processing to heterogeneous data from distributed sources, (2) ensuring data interoperability between systems and production sites, (3) exchanging and sharing data with different stakeholders, (4) network security approaches addressing the risks of increasing interconnectivity, and (5) security architectures to enable secure and privacy-preserving industrial collaboration. With our research, we evolve the underlying infrastructure from isolated, sparsely networked production sites toward an architecture that supports high-level applications and sophisticated digital shadows while facilitating the transition toward a WWL.
APA, Harvard, Vancouver, ISO, and other styles
6

Vaidya, Tavish, and Micah Sherr. "Mind Your $$(R, \varPhi )$$ s: Location-Based Privacy Controls for Consumer Drones." In Security Protocols XXIII, 80–90. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26096-9_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Vaidya, Tavish, and Micah Sherr. "Mind Your $$(R, \varPhi )$$ s: Location-Based Privacy Controls for Consumer Drones (Transcript of Discussion)." In Security Protocols XXIII, 91–104. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26096-9_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chen, Jiahang, and Jürgen Roßmann. "Integration of an IoT Communication Infrastructure in Distributed Production Systems in Industry 4.0." In Annals of Scientific Society for Assembly, Handling and Industrial Robotics 2022, 367–77. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-10071-0_30.

Full text
Abstract:
AbstractThe term Internet of Things (IoT) denotes a communication network, where various Things are interconnected using novel scenario-specific Internet technologies and predefined customizable semantics. Industry 4.0 aims at enabling a globally networked production, with the use of IoT as a crucial concept. Since production systems tend to be technically and organizationally heterogeneous, distributed at different locations, and associated with large amounts of data, communication and information processing platforms that provide confidentiality, integrity, availability (CIA rules), access control, and privacy are needed. In this contribution, we introduce a concept for designing and operating heterogeneous and spatially distributed industrial systems with Digital Twins, connected via an IoT communication infrastructure, the Smart Systems Service Infrastructure (S3I). By demonstrating an industrial use case with our concept, it is proven that the S3I can be used as a cross-domain solution for the interconnection of devices in a distributed production scenario.
APA, Harvard, Vancouver, ISO, and other styles
9

Eldin, Amr Ali, and Zoran Stojanovic. "Privacy Control Requirements for Context-Aware Mobile Services." In Ubiquitous and Pervasive Computing, 1465–80. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-60566-960-1.ch091.

Full text
Abstract:
With the rapid developments of mobile telecommunications technology over the last two decades, a new computing paradigm known as ‘anywhere and anytime’ or ‘ubiquitous’ computing has evolved. Consequently, attention has been given not only to extending current Web services and mobile service models and architectures, but increasingly also to make these services context-aware. Privacy represents one of the hot topics that has questioned the success of these services. In this chapter, we discuss the different requirements of privacy control in context-aware services architectures. Further, we present the different functionalities needed to facilitate this control. The main objective of this control is to help end users make consent decisions regarding their private information collection under conditions of uncertainty. The proposed functionalities have been prototyped and integrated in a UMTS location-based mobile services test bed platform on a university campus. Users have experienced the services in real time. A survey of users’ responses on the privacy functionality has been carried out and analyzed as well. Users’ collected response on the privacy functionality was positive in most cases. Additionally, results obtained reflected the feasibility and usability of this approach.
APA, Harvard, Vancouver, ISO, and other styles
10

Magkos, Emmanouil. "Cryptographic Approaches for Privacy Preservation in Location-Based Services." In Systems Approach Applications for Developments in Information Technology, 273–97. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-1562-5.ch019.

Full text
Abstract:
Current research in location-based services (LBSs) highlights the importance of cryptographic primitives in privacy preservation for LBSs, and presents solutions that attempt to support the (apparently) mutually exclusive requirements for access control and context privacy (i.e., identity and/or location), while at the same time adopting more conservative assumptions in order to reduce or completely remove the need for trust on system entities (e.g., the LBS provider, the network operator, or other peer nodes). This paper surveys the current state of knowledge concerning the use of cryptographic primitives for privacy-preservation in LBS applications.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Location- Privacy control"

1

Koufogiannis, Fragkiskos, and George J. Pappas. "Location-dependent privacy." In 2016 IEEE 55th Conference on Decision and Control (CDC). IEEE, 2016. http://dx.doi.org/10.1109/cdc.2016.7799441.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hongxia Jin, Gokay Saldamli, Richard Chow, and Bart P. Knijnenburg. "Recommendations-based location privacy control." In 2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops 2013). IEEE, 2013. http://dx.doi.org/10.1109/percomw.2013.6529526.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Heng Liu, Tiejun Wang, Ming Sun, Zhen Liu, and Mingtian Zhou. "Location privacy in sparse environment." In 2010 2nd International Conference on Advanced Computer Control. IEEE, 2010. http://dx.doi.org/10.1109/icacc.2010.5486958.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Rama Krishna, T. Siva, L. Venkateswara Kiran, and P. Siva Prasad. "Privacy control on location and co-location in interdependent data." In 2019 International Conference on Vision Towards Emerging Trends in Communication and Networking (ViTECoN). IEEE, 2019. http://dx.doi.org/10.1109/vitecon.2019.8899664.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Yang, Tao, Cong Tang, Liangwen Yu, Wei Xin, Yong Deng, Jianbin Hu, and Zhong Chen. "VLSP: Enabling Location Privacy in Vehicular Location Based Services." In 2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control (IMCCC). IEEE, 2011. http://dx.doi.org/10.1109/imccc.2011.121.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zheng, Jiangyu, Xiaobin Tan, Cliff Zou, Yukun Niu, and Jin Zhu. "A cloaking-based approach to protect location privacy in location-based services." In 2014 33rd Chinese Control Conference (CCC). IEEE, 2014. http://dx.doi.org/10.1109/chicc.2014.6895872.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Na, and Haiyang Yu. "Generating Perturbations with Hilbert Curves and Differential Privacy for Location Privacy." In 2017 International Conference on Mechanical, Electronic, Control and Automation Engineering (MECAE 2017). Paris, France: Atlantis Press, 2017. http://dx.doi.org/10.2991/mecae-17.2017.17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Tong, Wei, and Xi Feng. "Location Privacy Protection and Location Verification Mechanism of Vehicle in VANET." In 2023 IEEE 6th Information Technology,Networking,Electronic and Automation Control Conference (ITNEC). IEEE, 2023. http://dx.doi.org/10.1109/itnec56291.2023.10082547.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lei, Zhang, Yu Lili, Li Jing, and Meng Fanbo. "Location privacy protection algorithm based on correlation coefficient." In 2018 4th International Conference on Control, Automation and Robotics (ICCAR). IEEE, 2018. http://dx.doi.org/10.1109/iccar.2018.8384695.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lakadkutta, Ahmed H. I., and R. V. Mante. "Location based privacy preserving access control for relational data." In 2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT). IEEE, 2016. http://dx.doi.org/10.1109/rteict.2016.7808206.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Location- Privacy control"

1

Qi, Yan, Ryan Fries, Shambhu Saran Baral, and Pranesh Biswas. Evaluating the Costs and Benefits of Snow Fences in Illinois: Phase 2. Illinois Center for Transportation, November 2020. http://dx.doi.org/10.36501/0197-9191/20-020.

Full text
Abstract:
Serving as a windbreak, properly sited and designed snow fences have been proven effective in mitigating the negative impacts of blowing snow. To achieve the best snow-control effects, the ideal locations for snow fences are usually outside the roadway right-of-way. Few efforts have been made to examine the economic efficiency of snow fences and explore ways to reward private landowners. The objective of this project was to develop methodologies for evaluation of the costs and benefits of snow fences in Illinois and identify ways to encourage private landowners’ participation in the snow fence program while keeping it cost-effective. The researchers conducted a literature review as well as agency and landowner surveys. They also acquired crash data, snow fence and blowing snow segment inventory data, and blowing snow removal expenditure data as well as performed benefit-cost analyses of three types of snow fences following Federal Highway Administration guides. The survey results suggested that standing corn rows (SCRs) and structural snow fences (SSFs) were the least intrusive options for landowners and living snow fences (LSFs) with trees were the most intrusive. Some concerns related to LSFs could be reduced by allowing landowners to play a role in the design and plant-selection process. The crash data indicated that no fatal and severe crashes occurred at snow fence segments, while several fatal and severe crashes occurred at blowing snow segments during 2012–2016. The results of the benefit-cost analyses showed that the benefit-cost ratios for LSFs and SSFs are comparable. However, LSFs are favorable over SSFs because little maintenance is needed after the plants are mature. Although SCRs have the highest benefit-cost ratio, the need to renew the agency-landowner agreement annually and the alternating of crops planted may limit their snow-control effectiveness and large-scale implementation. A tool was developed using MS Excel to facilitate the benefit-cost analysis of snow fences.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography