{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,29]],"date-time":"2023-09-29T09:21:38Z","timestamp":1695979298536},"reference-count":37,"publisher":"Elsevier BV","issue":"4","license":[{"start":{"date-parts":[[2012,7,1]],"date-time":"2012-07-01T00:00:00Z","timestamp":1341100800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers, Environment and Urban Systems"],"published-print":{"date-parts":[[2012,7]]},"DOI":"10.1016\/j.compenvurbsys.2011.12.002","type":"journal-article","created":{"date-parts":[[2011,12,24]],"date-time":"2011-12-24T21:21:14Z","timestamp":1324761674000},"page":"311-320","source":"Crossref","is-referenced-by-count":7,"title":["Protecting location privacy in mobile geoservices using fuzzy inference systems"],"prefix":"10.1016","volume":"36","author":[{"given":"Mahdi","family":"Hashemi","sequence":"first","affiliation":[]},{"given":"Mohammad Reza","family":"Malek","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.compenvurbsys.2011.12.002_b0005","doi-asserted-by":"crossref","first-page":"547","DOI":"10.1016\/j.futures.2004.10.012","article-title":"Location based services\u2014new challenges for planning and public administration?","volume":"37","author":"Ahas","year":"2005","journal-title":"Futures"},{"key":"10.1016\/j.compenvurbsys.2011.12.002_b0010","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1016\/j.sysarc.2009.01.003","article-title":"Landscape-aware location-privacy protection in location-based services","volume":"55","author":"Ardagna","year":"2009","journal-title":"Journal of Systems Architecture"},{"key":"10.1016\/j.compenvurbsys.2011.12.002_b0015","series-title":"Pattern recognition with fuzzy objective function algorithms","author":"Bezdek","year":"1981"},{"key":"10.1016\/j.compenvurbsys.2011.12.002_b0020","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1016\/S0198-9715(98)00045-3","article-title":"A fuzzy approach for modelling knowledge in environmental systems evaluation","volume":"22","author":"Borri","year":"1998","journal-title":"Computers, Environment and Urban Systems"},{"key":"10.1016\/j.compenvurbsys.2011.12.002_b0025","doi-asserted-by":"crossref","first-page":"193","DOI":"10.2307\/1321160","article-title":"The right to privacy","volume":"4","author":"Brandeis","year":"1890","journal-title":"Harvard Law Review"},{"key":"10.1016\/j.compenvurbsys.2011.12.002_b0030","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1016\/j.jnca.2008.04.002","article-title":"Towards anonymous mobile community services","volume":"32","author":"Demestichas","year":"2009","journal-title":"Journal of Network and Computer Applications"},{"key":"10.1016\/j.compenvurbsys.2011.12.002_b0035","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1016\/S0198-9715(00)00026-0","article-title":"NEXUS \u2013 positioning and data management concepts for location-aware applications","volume":"25","author":"Fritsch","year":"2001","journal-title":"Computers, Environment and Urban Systems"},{"key":"10.1016\/j.compenvurbsys.2011.12.002_b0040","series-title":"Location based services and telecartography","author":"Gartner","year":"2007"},{"key":"10.1016\/j.compenvurbsys.2011.12.002_b0045","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1016\/j.is.2009.10.001","article-title":"A reciprocal framework for spatial K-anonymity","volume":"35","author":"Ghinita","year":"2010","journal-title":"Information Systems"},{"key":"10.1016\/j.compenvurbsys.2011.12.002_b0050","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/MSECP.2004.1281242","article-title":"Protecting privacy in continuous location-tracking applications","volume":"2","author":"Gruteser","year":"2004","journal-title":"IEEE Security & Privacy"},{"key":"10.1016\/j.compenvurbsys.2011.12.002_b0055","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1016\/S0165-0114(99)00016-0","article-title":"Imprecise reasoning in geographic information systems","volume":"113","author":"Guesgen","year":"2000","journal-title":"Fuzzy Sets and Systems"},{"key":"10.1016\/j.compenvurbsys.2011.12.002_b0060","unstructured":"Hashem, T., & Kulik, L. (2010). \u201cDon\u2019t trust anyone\u2019\u2019: Privacy protection for location-based services. Pervasive and Mobile Computing."},{"key":"10.1016\/j.compenvurbsys.2011.12.002_b0065","doi-asserted-by":"crossref","first-page":"427","DOI":"10.1016\/j.pmcj.2006.07.007","article-title":"Avoiding privacy violations caused by context-sensitive services","volume":"2","author":"Hengartner","year":"2006","journal-title":"Pervasive and Mobile Computing"},{"key":"10.1016\/j.compenvurbsys.2011.12.002_b0070","series-title":"MATLAB fuzzy logic toolbox","author":"Jang","year":"1997"},{"key":"10.1016\/j.compenvurbsys.2011.12.002_b0075","series-title":"Foundations of neural networks, fuzzy systems, and knowledge engineering","author":"Kasabov","year":"1998"},{"key":"10.1016\/j.compenvurbsys.2011.12.002_b0080","doi-asserted-by":"crossref","first-page":"527","DOI":"10.1016\/S0198-9715(02)00065-0","article-title":"WebGIS for monitoring \u2018\u2018Sudden Oak Death\u2019\u2019 in coastal California","volume":"27","author":"Kelly","year":"2003","journal-title":"Computers, Environment and Urban Systems"},{"key":"10.1016\/j.compenvurbsys.2011.12.002_b0085","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1016\/j.clsr.2008.01.006","article-title":"Legal considerations on privacy-enhancing location based services using PRIME technology","volume":"24","author":"Kosta","year":"2008","journal-title":"Computer Law & Security Report"},{"key":"10.1016\/j.compenvurbsys.2011.12.002_b0090","series-title":"Location-based services: fundamentals and operation","author":"Kupper","year":"2005"},{"key":"10.1016\/j.compenvurbsys.2011.12.002_b0095","doi-asserted-by":"crossref","first-page":"2966","DOI":"10.1016\/j.eswa.2007.05.022","article-title":"LACO: A location-aware cooperative query system for securely personalized services","volume":"34","author":"Kwon","year":"2008","journal-title":"Expert Systems with Applications"},{"key":"10.1016\/j.compenvurbsys.2011.12.002_b0100","doi-asserted-by":"crossref","first-page":"726","DOI":"10.1016\/j.compenvurbsys.2006.02.008","article-title":"User preferences, information transactions and location-based services: A study of urban pedestrian way finding","volume":"30","author":"Li","year":"2006","journal-title":"Computers, Environment and Urban Systems"},{"key":"10.1016\/j.compenvurbsys.2011.12.002_b0105","doi-asserted-by":"crossref","first-page":"637","DOI":"10.1016\/S0198-9715(02)00069-8","article-title":"Modelling urban development with cellular automata incorporating fuzzy-set approaches","volume":"27","author":"Liu","year":"2003","journal-title":"Computers, Environment and Urban Systems"},{"key":"10.1016\/j.compenvurbsys.2011.12.002_b0110","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1016\/j.istr.2009.10.002","article-title":"Privacy and consent in pervasive networks","volume":"14","author":"Malik","year":"2009","journal-title":"Information Security Technical Report"},{"key":"10.1016\/j.compenvurbsys.2011.12.002_b0115","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1016\/j.tele.2005.07.006","article-title":"Applying privacy on the dissemination of location information","volume":"23","author":"Marias","year":"2006","journal-title":"Telematics and Informatics"},{"key":"10.1016\/j.compenvurbsys.2011.12.002_b0120","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1016\/j.compenvurbsys.2007.06.002","article-title":"Downscaling spatial structure for the analysis of epidemiological data","volume":"32","author":"Matisziw","year":"2008","journal-title":"Computers, Environment and Urban Systems"},{"key":"10.1016\/j.compenvurbsys.2011.12.002_b0125","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1016\/j.ijhcs.2005.04.008","article-title":"Keeping ubiquitous computing to yourself: A practical model for user control of privacy","volume":"63","author":"Price","year":"2005","journal-title":"Int. J. Human-Computer Studies"},{"key":"10.1016\/j.compenvurbsys.2011.12.002_b0130","doi-asserted-by":"crossref","first-page":"762","DOI":"10.1016\/j.comcom.2009.11.024","article-title":"Private location-based information retrieval through user collaboration","volume":"33","author":"Rebollo-Monedero","year":"2010","journal-title":"Computer Communications"},{"key":"10.1016\/j.compenvurbsys.2011.12.002_b0135","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1016\/j.cose.2009.07.006","article-title":"Anonymization models for directional location based service environments","volume":"29","author":"Shin","year":"2010","journal-title":"Computers & Security"},{"key":"10.1016\/j.compenvurbsys.2011.12.002_b0140","doi-asserted-by":"crossref","first-page":"1181","DOI":"10.1016\/j.comcom.2008.01.007","article-title":"A TTP-free protocol for location privacy in location-based services","volume":"31","author":"Solanas","year":"2008","journal-title":"Computer Communications"},{"key":"10.1016\/j.compenvurbsys.2011.12.002_b0145","series-title":"Ubiquitous and pervasive computing: Concepts, methodologies, tools, and applications","author":"Symonds","year":"2010"},{"key":"10.1016\/j.compenvurbsys.2011.12.002_b0150","series-title":"Adaptive fuzzy systems and control: Design and stability analysis","author":"Wang","year":"1994"},{"key":"10.1016\/j.compenvurbsys.2011.12.002_b0155","series-title":"Data engineering: Fuzzy mathematics in systems theory and data analysis","author":"Wolkenhauer","year":"2001"},{"key":"10.1016\/j.compenvurbsys.2011.12.002_b0160","doi-asserted-by":"crossref","first-page":"633","DOI":"10.1080\/13658810110061162","article-title":"Nearness relations in environmental space","volume":"15","author":"Worboys","year":"2001","journal-title":"International Journal of Geographical Information Science"},{"issue":"2","key":"10.1016\/j.compenvurbsys.2011.12.002_b0165","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1111\/j.1467-9671.2005.00211.x","article-title":"How far is too far? \u2013 A statistical approach to context-contingent proximity modeling","volume":"9","author":"Yao","year":"2005","journal-title":"Transactions in GIS"},{"key":"10.1016\/j.compenvurbsys.2011.12.002_b0175","doi-asserted-by":"crossref","first-page":"485","DOI":"10.1016\/j.compenvurbsys.2004.08.001","article-title":"Spatial queries with qualitative locations in spatial information systems","volume":"30","author":"Yao","year":"2006","journal-title":"Computers, Environment and Urban Systems"},{"issue":"2","key":"10.1016\/j.compenvurbsys.2011.12.002_b0170","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1111\/j.1538-4632.2007.00700.x","article-title":"Neurofuzzy modeling of context-contingent proximity relations","volume":"39","author":"Yao","year":"2007","journal-title":"Geographical Analysis"},{"key":"10.1016\/j.compenvurbsys.2011.12.002_b0180","series-title":"Proceedings of the 6th international conference on mobile data management","first-page":"67","article-title":"Preserving mobile customer privacy: an access control system for moving objects and customer profiles","author":"Youssef","year":"2005"},{"key":"10.1016\/j.compenvurbsys.2011.12.002_b0185","doi-asserted-by":"crossref","first-page":"784","DOI":"10.1016\/j.compenvurbsys.2006.02.005","article-title":"Implementing adaptive mobile GI services based on ontologies examples from pedestrian navigation support","volume":"30","author":"Zipf","year":"2006","journal-title":"Computers, Environment and Urban Systems"}],"container-title":["Computers, Environment and Urban Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0198971511001189?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0198971511001189?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,11,27]],"date-time":"2018-11-27T14:00:26Z","timestamp":1543327226000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0198971511001189"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7]]},"references-count":37,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2012,7]]}},"alternative-id":["S0198971511001189"],"URL":"https:\/\/doi.org\/10.1016\/j.compenvurbsys.2011.12.002","relation":{},"ISSN":["0198-9715"],"issn-type":[{"value":"0198-9715","type":"print"}],"subject":[],"published":{"date-parts":[[2012,7]]}}}