Using constraints to protect personal location information

Anand S. Gajparia, Chris J. Mitchell, Chan Yeun

Research output: Contribution to journalConference articlepeer-review

4 Scopus citations

Abstract

This paper assesses the possible use of constraints to control the dissemination and use of location information (LI) within a location based service architecture. The various types of constraint which may by required are also considered. Finally, issues and risks with the possible use of constraints are discussed, as are possible solutions to these hazards.

Original languageBritish English
Pages (from-to)2112-2116
Number of pages5
JournalIEEE Vehicular Technology Conference
Volume58
Issue number3
DOIs
StatePublished - 2003
Event2003 IEEE 58th Vehicular Technology Conference, VTC2003-Fall - Orlando, FL, United States
Duration: 6 Oct 20039 Oct 2003

Fingerprint

Dive into the research topics of 'Using constraints to protect personal location information'. Together they form a unique fingerprint.

Cite this