{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,5]],"date-time":"2024-05-05T00:03:57Z","timestamp":1714867437578},"reference-count":55,"publisher":"Elsevier BV","issue":"3","content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Pervasive and Mobile Computing"],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1016\/j.pmcj.2012.12.004","type":"journal-article","created":{"date-parts":[[2013,1,9]],"date-time":"2013-01-09T21:06:01Z","timestamp":1357765561000},"page":"372-391","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":15,"title":["Application and analysis of multidimensional negative surveys in participatory sensing applications"],"prefix":"10.1016","volume":"9","author":[{"given":"Michael M.","family":"Groat","sequence":"first","affiliation":[]},{"given":"Benjamin","family":"Edwards","sequence":"additional","affiliation":[]},{"given":"James","family":"Horey","sequence":"additional","affiliation":[]},{"given":"Wenbo","family":"He","sequence":"additional","affiliation":[]},{"given":"Stephanie","family":"Forrest","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.pmcj.2012.12.004_br000005","series-title":"ACM Sensys","article-title":"Participatory sensing, in: World Sensor Web Workshop","author":"Burke","year":"2006"},{"key":"10.1016\/j.pmcj.2012.12.004_br000010","doi-asserted-by":"crossref","unstructured":"A.T. Campbell, S.B. Eisenman, N.D. Lane, E. Miluzzo, R.A. Peterson, People-centric urban sensing, in: Proc. 2nd Annu. Int. Workshop on Wireless Internet, WICON \u201906, Boston, MA, 2006, p. 18.","DOI":"10.1145\/1234161.1234179"},{"issue":"4","key":"10.1016\/j.pmcj.2012.12.004_br000015","doi-asserted-by":"crossref","first-page":"541","DOI":"10.2105\/AJPH.94.4.541","article-title":"Confronting the challenges in reconnecting urban planning and public health","volume":"94","author":"Corburn","year":"2004","journal-title":"American Journal of Public Health"},{"key":"10.1016\/j.pmcj.2012.12.004_br000020","unstructured":"J. Horey, M.M. Groat, S. Forrest, F. Esponda, Anonymous data collection in sensor networks, in: 4th Annu. Int. Conf. Mobile and Ubiquitous Systems: Computing, Networking and Services, Philadelphia, PA, 2007, pp. 1\u20138."},{"key":"10.1016\/j.pmcj.2012.12.004_br000025","unstructured":"C. Sharp, S. Schaffert, A. Woo, N. Sastry, C. Karlof, S. Sastry, D. Culler, Design and implementation of a sensor network system for vehicle tracking and autonomous interception, in: Proc. 2nd European Workshop Wireless Sensor Networks, Istanbul, Turkey, 2005, pp. 93\u2013107."},{"key":"10.1016\/j.pmcj.2012.12.004_br000030","doi-asserted-by":"crossref","unstructured":"A. Meyerson, R. Williams, On the complexity of optimal K-anonymity, in: Proc. 23rd ACM SIGMOD-SIGACT-SIGART Symp. Principles of Database Systems, Paris, France, 2004, pp. 223\u2013228.","DOI":"10.1145\/1055558.1055591"},{"key":"10.1016\/j.pmcj.2012.12.004_br000035","unstructured":"C.C. Aggarwal, On k-Anonymity and the curse of dimensionality, in: Proc. 31st Int. Conf. Very Large Data Bases, Trondheim, Norway, 2005, pp. 901\u2013909."},{"key":"10.1016\/j.pmcj.2012.12.004_br000040","doi-asserted-by":"crossref","unstructured":"F. Furfaro, G.M. Mazzeo, D. Sacc\u00e0, A probabilistic framework for building privacy-preserving synopses of multi-dimensional data, in: Proc. 20th Int. Conf. Scientific and Statistical Database Management, Hong Kong, China, 2008, pp. 114\u2013130.","DOI":"10.1007\/978-3-540-69497-7_10"},{"issue":"5","key":"10.1016\/j.pmcj.2012.12.004_br000045","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1142\/S021848850200165X","article-title":"Achieving k-anonymity privacy protection using generalization and suppression","volume":"10","author":"Sweeney","year":"2002","journal-title":"International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems"},{"key":"10.1016\/j.pmcj.2012.12.004_br000050","unstructured":"P. Samarati, L. Sweeney, Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression, in: Proceedings of the IEEE Symposium on Research in Security and Privacy, 1998."},{"key":"10.1016\/j.pmcj.2012.12.004_br000055","series-title":"Basic Applications","volume":"vol. 2","author":"Goldreich","year":"2004"},{"key":"10.1016\/j.pmcj.2012.12.004_br000060","unstructured":"V. Bozovic, D. Socek, R. Steinwandt, V.I. Villanyi, Multi-authority attribute based encryption with honest-but-curious central authority, in: IACR Eprint Archive, 2009, http:\/\/eprint.iacr.org\/2009\/083."},{"issue":"6","key":"10.1016\/j.pmcj.2012.12.004_br000065","doi-asserted-by":"crossref","first-page":"576","DOI":"10.1016\/j.datak.2011.03.007","article-title":"Privacy-aware collection of aggregate spatial data","volume":"70","author":"Xie","year":"2011","journal-title":"Data & Knowledge Engineering"},{"key":"10.1016\/j.pmcj.2012.12.004_br000070","doi-asserted-by":"crossref","unstructured":"H. Kargupta, S. Datta, Q. Wang, K. Sivakumar, On the privacy preserving properties of random data perturbation techniques, in: Proc. 3rd IEEE Int. Conf. Data Mining, Melbourne, FL, 2003, pp. 99\u2013106. http:\/\/dx.doi.org\/10.1109\/ICDM.2003.1250908.","DOI":"10.1109\/ICDM.2003.1250908"},{"issue":"4","key":"10.1016\/j.pmcj.2012.12.004_br000075","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1016\/j.is.2003.09.001","article-title":"Privacy preserving mining of association rules (invited journal version)","volume":"29","author":"Evfimievski","year":"2004","journal-title":"Journal of Information Systems"},{"key":"10.1016\/j.pmcj.2012.12.004_br000080","doi-asserted-by":"crossref","unstructured":"Z. Huang, W. Du, B. Chen, Deriving private information from randomized data, in: Proc. 2005 ACM SIGMOD Int. Conf. Management of Data, Baltimore, MD, 2005, pp. 37\u201348.","DOI":"10.1145\/1066157.1066163"},{"issue":"2","key":"10.1016\/j.pmcj.2012.12.004_br000085","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1145\/772862.772865","article-title":"Cryptographic techniques for privacy-preserving data mining","volume":"4","author":"Pinkas","year":"2002","journal-title":"SIGKDD Explorations Newsletter"},{"key":"10.1016\/j.pmcj.2012.12.004_br000090","doi-asserted-by":"crossref","unstructured":"J. Girao, D. Westhoff, M. Schneider, CDA: Concealed data aggregation for reverse multicast traffic in wireless sensor networks, in: Proc. 40th IEEE Int. Conf. Communications, Seoul, Korea, 2005.","DOI":"10.1109\/ICC.2005.1494953"},{"key":"10.1016\/j.pmcj.2012.12.004_br000095","unstructured":"C. Castelluccia, E. Mykletum, G. Tsudik, Efficient aggregation of encrypted data in wireless sensor networks, in: 2nd Annu. Int. Conf. Mobile and Ubiquitous Systems: Networking and Services, San Diego, CA, 2005, pp. 109\u2013117."},{"key":"10.1016\/j.pmcj.2012.12.004_br000100","series-title":"26th Annual IEEE Conference on Computer Communications","first-page":"2045","article-title":"Pda: Privacy-preserving data aggregation in wireless sensor networks","author":"He","year":"2007"},{"key":"10.1016\/j.pmcj.2012.12.004_br000105","series-title":"Proceedings of the 6th ACM Conference on Embedded Network Sensor Systems","first-page":"281","article-title":"Poolview: Stream privacy for grassroots participatory sensing","author":"Ganti","year":"2008"},{"key":"10.1016\/j.pmcj.2012.12.004_br000110","article-title":"Confidentiality protection schemes for data aggregation in sensor networks","author":"Feng","year":"2008","journal-title":"IEEE INFOCOM"},{"key":"10.1016\/j.pmcj.2012.12.004_br000115","series-title":"Proc. 5th Annu. IEEE Int. Conf. Pervasive Computing and Communications","first-page":"13","article-title":"Dynamic key-updating: Privacy-preserving authentication for RFID systems","author":"Lu","year":"2007"},{"key":"10.1016\/j.pmcj.2012.12.004_br000120","series-title":"Proc. 28th IEEE Int. Conf. Computer Communication","first-page":"936","article-title":"ElliPS: A privacy preserving scheme for sensor data storage and query","author":"Subramanian","year":"2009"},{"key":"10.1016\/j.pmcj.2012.12.004_br000125","series-title":"Proc. 32nd Annu. ACM Symp. Theory of Computing","first-page":"325","article-title":"On the complexity of verifiable secret sharing and multiparty computation","author":"Cramer","year":"2000"},{"key":"10.1016\/j.pmcj.2012.12.004_br000130","doi-asserted-by":"crossref","unstructured":"J. Halpern, V. Teague, Rational secret sharing and multiparty computation: Extended abstract, in: Proc. 36th Annu. ACM Symp. Theory of Computing, Chicago, IL, 2004, pp. 623\u2013632.","DOI":"10.1145\/1007352.1007447"},{"key":"10.1016\/j.pmcj.2012.12.004_br000135","unstructured":"Q. Huang, H.J. Wang, N. Borisov, Privacy-preserving friends troubleshooting network, in: Proc. 12th Annu. Symp. Network and Distributed Systems Security, San Diego, CA, 2005, pp. 245\u2013257."},{"key":"10.1016\/j.pmcj.2012.12.004_br000140","series-title":"The 29th Int\u2019l Conference on Distributed Computing Systems","first-page":"49","article-title":"Cap: A context-aware privacy protection system for location-based services.","author":"Pingley","year":"2009"},{"key":"10.1016\/j.pmcj.2012.12.004_br000145","series-title":"Proceedings of the 15th Annual International Conference on Mobile Computing and Networking","first-page":"345","article-title":"Hiding stars with fireworks: Location privacy through camouflage","author":"Meyerowitz","year":"2009"},{"key":"10.1016\/j.pmcj.2012.12.004_br000150","unstructured":"C. Dwork, M. Naor, T. Pitassi, G. Rothblum, S. Yekhanin, Pan-private streaming algorithms, in: Proc. 1st Symp. Innovations in Computer Science, Beijing, China, 2010, pp. 66\u201380."},{"key":"10.1016\/j.pmcj.2012.12.004_br000155","doi-asserted-by":"crossref","unstructured":"C. Dwork, Differential privacy, in: Proc. 33rd Int. Colloq. Automata, Languages and Programming, Part II, Venice, Italy, 2006, pp. 1\u201312.","DOI":"10.1007\/11787006_1"},{"key":"10.1016\/j.pmcj.2012.12.004_br000160","doi-asserted-by":"crossref","unstructured":"Z. Huang, W. Du, OptRR: Optimizing randomized response schemes for privacy-preserving data mining, in: Proc. IEEE 24th Int. Conf. Data Engineering, Cancun, Mexico, 2008, pp. 705\u2013714.","DOI":"10.1109\/ICDE.2008.4497479"},{"key":"10.1016\/j.pmcj.2012.12.004_br000165","unstructured":"S. Agrawal, J.R. Haritsa, A framework for high-accuracy privacy-preserving mining, in: Proc. 21st Int. Conf. Data Engineering, Tokyo, Japan, 2005, pp. 193\u2013204."},{"issue":"309","key":"10.1016\/j.pmcj.2012.12.004_br000170","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1080\/01621459.1965.10480775","article-title":"Randomized response: A survey technique for eliminating evasive answer bias","volume":"60","author":"Warner","year":"1965","journal-title":"Journal of the American Statistical Association"},{"key":"10.1016\/j.pmcj.2012.12.004_br000175","doi-asserted-by":"crossref","unstructured":"R. Agrawal, R. Srikant, D. Thomas, Privacy preserving olap, in: Proc. 2005 ACM SIGMOD Int. Conf. Management of Data, Baltimore, MD, 2005, pp. 251\u2013262.","DOI":"10.1145\/1066157.1066187"},{"key":"10.1016\/j.pmcj.2012.12.004_br000180","unstructured":"F. Esponda, Negative surveys, ArXiv Mathematics e-Prints arXiv:math\/0608176."},{"issue":"15","key":"10.1016\/j.pmcj.2012.12.004_br000185","doi-asserted-by":"crossref","first-page":"2456","DOI":"10.1016\/j.spl.2009.08.019","article-title":"Surveys with negative questions for sensitive items","volume":"79","author":"Esponda","year":"2009","journal-title":"Statistics & Probability Letters"},{"issue":"6","key":"10.1016\/j.pmcj.2012.12.004_br000190","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1007\/s10207-007-0030-1","article-title":"Protecting data privacy through hard-to-reverse negative databases","volume":"6","author":"Esponda","year":"2007","journal-title":"International Journal of Information Security"},{"key":"10.1016\/j.pmcj.2012.12.004_br000195","doi-asserted-by":"crossref","unstructured":"F. Esponda, S. Forrest, P. Helman, Enhancing privacy through negative representations of data, Tech. rep., University of New Mexico, 2004.","DOI":"10.21236\/ADA498766"},{"key":"10.1016\/j.pmcj.2012.12.004_br000200","unstructured":"F. Esponda, Everything that is not important: Negative databases, IEEE Computational Intelligence Magazine."},{"key":"10.1016\/j.pmcj.2012.12.004_br000205","doi-asserted-by":"crossref","unstructured":"D. Quercia, I. Leontiadis, L. McNamara, C. Mascolo, J. Crowcroft, Spotme if you can: Randomized responses for location obfuscation on mobile phones, in: ICDCS, 2011, pp. 363\u2013372.","DOI":"10.1109\/ICDCS.2011.79"},{"key":"10.1016\/j.pmcj.2012.12.004_br000210","doi-asserted-by":"crossref","unstructured":"J. Horey, S. Forrest, M. Groat, Reconstructing spatial distributions from anonymized locations, in: ICDE Workshop on Secure Data Management on Smartphones and Mobiles, Washington D.C., 2012.","DOI":"10.1109\/ICDEW.2012.82"},{"key":"10.1016\/j.pmcj.2012.12.004_br000215","doi-asserted-by":"crossref","unstructured":"R.A. Horn, C.R. Johnson, Topics in Matrix Analysis, Cambridge University Press, Cambridge, UK, 1991, Ch. 4: Matrix equations and the Kronecker product, pp. 239\u2013297.","DOI":"10.1017\/CBO9780511840371.005"},{"key":"10.1016\/j.pmcj.2012.12.004_br000220","series-title":"HOTOS\u201903: Proceedings of the 9th conference on Hot Topics in Operating Systems","article-title":"Privacy-aware location sensor networks","author":"Gruteser","year":"2003"},{"key":"10.1016\/j.pmcj.2012.12.004_br000225","unstructured":"G. Aggarwal, T. Feder, K. Kenthapadi, R. Motwani, R. Panigrahy, D. Thomas, A. Zhu, Approximation Algorithms for K-Anonymity, Journal of Privacy Technology."},{"key":"10.1016\/j.pmcj.2012.12.004_br000230","doi-asserted-by":"crossref","unstructured":"M.M. Groat, B. Edwards, J. Horey, W. He, S. Forrest, Enhancing privacy in participatory sensing applications with multidimensional data, in: Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, Lugano, Switzerland, 2012, pp. 144\u2013152.","DOI":"10.1109\/PerCom.2012.6199861"},{"key":"10.1016\/j.pmcj.2012.12.004_br000235","doi-asserted-by":"crossref","unstructured":"C. Castelluccia, C. Soriente, ABBA: A balls and bins approach to secure aggregation in WSNs, in: 6th Int. Symp. Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, Berlin, Germany, 2008, pp. 185\u2013191.","DOI":"10.4108\/ICST.WIOPT2008.3183"},{"key":"10.1016\/j.pmcj.2012.12.004_br000240","unstructured":"FOXNEWS.com, Homeland security looking into cell phones as anti-terror device, 2007, http:\/\/www.foxnews.com\/story\/0,2933,270033,00.html."},{"key":"10.1016\/j.pmcj.2012.12.004_br000245","unstructured":"A. Bertaud, S. Malpezzi, The spatial distribution of population in 48 world cities: Implications for economies in transition, unpublished manuscript (2003)."},{"key":"10.1016\/j.pmcj.2012.12.004_br000250","doi-asserted-by":"crossref","unstructured":"R. Agrawal, R. Srikant, Privacy-preserving data mining, in: Proc. 2000 ACM SIGMOD Int. Conf Management of Data, Dallas, TX, 2000, pp. 439\u2013450.","DOI":"10.1145\/342009.335438"},{"key":"10.1016\/j.pmcj.2012.12.004_br000255","doi-asserted-by":"crossref","unstructured":"S. Zhang, J. Ford, F. Makedon, Deriving private information from randomly perturbed ratings, in: SDM, 2006.","DOI":"10.1137\/1.9781611972764.6"},{"issue":"1","key":"10.1016\/j.pmcj.2012.12.004_br000260","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1111\/j.2517-6161.1977.tb01600.x","article-title":"Compressed sensing","volume":"39","author":"Dempster","year":"1977","journal-title":"Journal of the Royal Statistical Society"},{"key":"10.1016\/j.pmcj.2012.12.004_br000265","series-title":"Proceedings of the 20th symposium on principles of database systems","first-page":"247","article-title":"On the design and quantification of privacy preserving data mining algorithms","author":"Agrawal","year":"2001"},{"key":"10.1016\/j.pmcj.2012.12.004_br000270","unstructured":"F. Esponda, Negative representations of information, Ph.D. thesis, University of New Mexico (2005)."},{"key":"10.1016\/j.pmcj.2012.12.004_br000275","doi-asserted-by":"crossref","unstructured":"M.M. Groat, W. He, S. Forrest, KIPDA: k-Indistinguishable privacy-preserving data aggregation in wireless sensor networks, in: Proc. 30th IEEE Int. Conf. Computer Communications, Shanghai, China, 2011, pp. 2024\u20132032.","DOI":"10.1109\/INFCOM.2011.5935010"}],"container-title":["Pervasive and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1574119213000023?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1574119213000023?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,5,4]],"date-time":"2024-05-04T14:42:12Z","timestamp":1714833732000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1574119213000023"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":55,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013,6]]}},"alternative-id":["S1574119213000023"],"URL":"http:\/\/dx.doi.org\/10.1016\/j.pmcj.2012.12.004","relation":{},"ISSN":["1574-1192"],"issn-type":[{"value":"1574-1192","type":"print"}],"subject":[],"published":{"date-parts":[[2013,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Application and analysis of multidimensional negative surveys in participatory sensing applications","name":"articletitle","label":"Article Title"},{"value":"Pervasive and Mobile Computing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.pmcj.2012.12.004","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2013 Elsevier B.V. Published by Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}