<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1870-9044</journal-id>
<journal-title><![CDATA[Polibits]]></journal-title>
<abbrev-journal-title><![CDATA[Polibits]]></abbrev-journal-title>
<issn>1870-9044</issn>
<publisher>
<publisher-name><![CDATA[Instituto Politécnico Nacional, Centro de Innovación y Desarrollo Tecnológico en Cómputo]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1870-90442012000200010</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Anonymizing but Deteriorating Location Databases]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Khanh Dang]]></surname>
<given-names><![CDATA[Tran]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Anh Truong]]></surname>
<given-names><![CDATA[Tuan]]></given-names>
</name>
<xref ref-type="aff" rid="A02"/>
</contrib>
</contrib-group>
<aff id="A01">
<institution><![CDATA[,Vietnam National University of Technology Faculty of Computer Science & Engineering ]]></institution>
<addr-line><![CDATA[Ho Chi Minh ]]></addr-line>
<country>Vietnam</country>
</aff>
<aff id="A02">
<institution><![CDATA[,University of Trento Department of Information Engineering and Computer Science ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Italy</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>12</month>
<year>2012</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>12</month>
<year>2012</year>
</pub-date>
<numero>46</numero>
<fpage>73</fpage>
<lpage>81</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1870-90442012000200010&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1870-90442012000200010&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1870-90442012000200010&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[The tremendous development of location-based services and mobile devices has led to an increase in location databases. Through the data mining process, valuable information can be discovered from such location databases. However, the malicious data miner or attackers may also extract private and sensitive information about the user, and this can create threats against the user location privacy. Therefore, location privacy protection becomes a key factor to the success in privacy protection for the users of location-based services. In this paper, we propose a novel approach as well as an algorithm to guarantee k-anonymity in a location database. The algorithm will maintain the association rules that have significance for the data mining process. Moreover, there may appear new significant association rules created after anonymization, they maybe affect the data mining result. Therefore, the algorithm also considers excluding new significant association rules that are created during the run of the algorithm. Theoretical analyses and experimental results with real-world datasets will confirm the practical value of our newly proposed approach.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[k-anonymity]]></kwd>
<kwd lng="en"><![CDATA[location databases]]></kwd>
<kwd lng="en"><![CDATA[data mining]]></kwd>
<kwd lng="en"><![CDATA[privacy protection]]></kwd>
</kwd-group>
</article-meta>
</front><body><![CDATA[ <p align="center"><font face="verdana" size="4"><b>Anonymizing but Deteriorating Location Databases</b></font></p>     <p align="center"><font face="verdana" size="2">&nbsp;</font></p>     <p align="center"><font face="verdana" size="2"><b>Tran Khanh Dang<sup>1</sup> and Tuan Anh Truong<sup>2</sup></b></font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><i><sup>1</sup> Faculty of Computer Science &amp; Engineering, HCMC University of Technology, VNUHCM, Ho Chi Minh City, Vietnam (e&#150;mail:</i> <a href="mailto:khanh@cse.hcmut.edu.vn">khanh@cse.hcmut.edu.vn</a><i>).</i></font></p>     <p align="justify"><font face="verdana" size="2"><i><sup>2</sup> Department of Information Engineering and Computer Science, University of Trento, Italy (e&#150;mail:</i> <a href="mailto:anhtt@cse.hcmut.edu.vn">anhtt@cse.hcmut.edu.vn</a><i>).</i></font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2">Manuscript received March 14, 2012.    <br> Manuscript accepted for publication December 12, 2012.</font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2"><b>Abstract </b></font></p>     <p align="justify"><font face="verdana" size="2">The tremendous development of location&#150;based services and mobile devices has led to an increase in location databases. Through the data mining process, valuable information can be discovered from such location databases. However, the malicious data miner or attackers may also extract private and sensitive information about the user, and this can create threats against the user location privacy. Therefore, location privacy protection becomes a key factor to the success in privacy protection for the users of location&#150;based services. In this paper, we propose a novel approach as well as an algorithm to guarantee k&#150;anonymity in a location database. The algorithm will maintain the association rules that have significance for the data mining process. Moreover, there may appear new significant association rules created after anonymization, they maybe affect the data mining result. Therefore, the algorithm also considers excluding new significant association rules that are created during the run of the algorithm. Theoretical analyses and experimental results with real&#150;world datasets will confirm the practical value of our newly proposed approach.</font></p>     <p align="justify"><font face="verdana" size="2"><b>Key words: </b>k&#150;anonymity, location databases, data mining, privacy protection.</font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><a href="/pdf/poli/n46/n46a10.pdf" target="_blank">DESCARGAR ART&Iacute;CULO EN FORMATO PDF</a></font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>REFERENCES</b></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;1&#93; Sergio, M., Claudio, B., Wang, S.X. and Sushil, J.: k&#150;anonymity in Databases with Time Stamped Data. In: 13<sup>th</sup> International Symposium on Temporal Representation and Reasoning, pp. 177&#150;&#150;186, IEEE Press, Budapest, Hungary (2006).    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6048185&pid=S1870-9044201200020001000001&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;2&#93; Truong, T.A., Truong, Q.C. and Dang, T.K.: An Adaptive Grid&#150;based Approach to Location Privacy Preservation. In: 2<sup>nd</sup> Asian Conference on Intelligent Information and Database Systems, pp. 133&#150;&#150;144, Springer Verlag, Vietnam (2010)</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6048187&pid=S1870-9044201200020001000002&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">&#91;3&#93; Truong, Q.C., Truong, T.A. and Dang, T.K.: The Memorizing Algorithm: Protecting User Privacy in Location&#150;Based Services using Historical Services Information. In: International Journal of Mobile Computing and Multimedia Comm., 2(4), pp. 65&#150;&#150;86, IGI&#150;Global (2010)</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6048188&pid=S1870-9044201200020001000003&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">&#91;4&#93; Dang, T.K, Kueng, J., Huynh, V.Q.P: Protecting User Privacy while Discovering and Maintaining Association Rules. In: 4<sup>th</sup> IFIP International Conference on New Technologies, Mobility and Security, IEEE Computer Society, Paris, France (2011)</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6048189&pid=S1870-9044201200020001000004&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">&#91;5&#93; Ciriani, V., De Capitani di Vimercati, S., Foresti, S. and Samarati, P.: k&#150;Anonymous Data Mining: A Survey. In: Michael, G., Sushil, J. (eds.), Handbook of Database Security&#150; Applications and Trends, pp. 105&#150;136, Springer Science, LLC (2008)</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6048190&pid=S1870-9044201200020001000005&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">&#91;6&#93; Sweeney, L.: Achieving k&#150;anonymity Privacy Protection using Generalization and Suppression. In: International Journal of Uncertainty, Fuzziness and Knowledge&#150;based Systems, 10(5), pp. 571&#150;588, World Scientific (2002)</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6048191&pid=S1870-9044201200020001000006&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">&#91;7&#93; Samarati, P. and Sweeney, L.: Protecting Privacy When Disclosing Information: k&#150;anonymity and its Enforcement through Generalization and Suppression. Technical Report SRI&#150;CSL&#150;98&#150;04, Computer Science Laboratory, SRI International (1998)</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6048192&pid=S1870-9044201200020001000007&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">&#91;8&#93; Gedik, B. and Ling, L.: Protecting Location Privacy with Personalized k&#150;Anonymity: Architecture and Algorithms. In: IEEE Trans. on Mobile Computing, 7(1), pp. 1&#150;&#150;18 (2008)</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6048193&pid=S1870-9044201200020001000008&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">&#91;9&#93;   Gruteser, M. and Grunwald, D.: Anonymous Usage of Location&#150;Based Services   through   Spatial   and   Temporal   Cloaking.   In: ACM International Conference Mobile Systems, Applications, and Services, pp 31&#150;&#150;42, ACM New York, USA (2003) </font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6048194&pid=S1870-9044201200020001000009&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">&#91;10&#93; Bettini, C., Mascetti, S. and Wang, X.S.: Privacy Protection through Anonymity in Location&#150;based Services. In: Michael, G., Sushil, J. (eds.), Handbook of Database Security &#150; Applications and Trends, pp. 509&#150;&#150;530, Springer Science, LLC (2008) </font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6048195&pid=S1870-9044201200020001000010&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">&#91;11&#93; To, Q.C., Dang, T.K., Kueng, J.: A Hilbert&#150;based Framework for Preserving Privacy in Location&#150;based Services.  Intl.  Journal of Intelligent Information and Database Systems (IJIIDS), Inderscience Publisher, ISSN 1751&#150;5858 (2012) <i>(to appear) </i></font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6048196&pid=S1870-9044201200020001000011&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">&#91;12&#93; Cuellar, J.R.: Location Information Privacy. In: B. Srikaya (Ed.), Geographic Location in the Internet, pp. 179&#150;&#150;208, Kluwer Academic Publishers (2002)</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6048197&pid=S1870-9044201200020001000012&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">&#91;13&#93; Gid&oacute;falvi, G., Huang, X. and Pedersen, T.B: Privacy&#150;Preserving Data Mining on Moving Object Trajectories. In: 8<sup>th</sup> International Conference on Mobile Data Management, pp. 60&#150;&#150;68, Mannheim, Germany (2007)</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6048198&pid=S1870-9044201200020001000013&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">&#91;14&#93; Bettini, C., Wang, X. and Jajodia, S.: Protecting Privacy against Location&#150;based Personal Identification. In: 2<sup>nd</sup> VLDB Workshop on Secure Data Management, pp. 185&#150;&#150;199, Trondheim, Norway (2005)</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6048199&pid=S1870-9044201200020001000014&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">&#91;15&#93; Ardagna, C.A., Cremonini, M., Vimercati, S.D.C. and Samarati, P.: Privacy&#150;enhanced Location&#150;based Access Control. In: Michael, G., Sushil, J. (eds.), Handbook of Database Security &#150; Applications and Trends, pp. 531&#150;&#150;552, Springer Science, LLC (2008)</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6048200&pid=S1870-9044201200020001000015&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">&#91;16&#93; Zheng, Y., Li, Q., Chen, Y. and Xie, X.: Understanding Mobility Based on GPS Data. In: ACM conference on Ubiquitous Computing, pp. 312&#150;321, ACM Press, Seoul, Korea (2008)</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6048201&pid=S1870-9044201200020001000016&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">&#91;17&#93; Zheng, Y., Zhang, L., Xie, X. and Ma, W.Y.: Mining Interesting Locations and Travel Sequences from GPS Trajectories. In: International conference on World Wild Web, pp. 791&#150;&#150;800, ACM Press, Madrid, Spain (2009)</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6048202&pid=S1870-9044201200020001000017&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">&#91;18&#93; Newman, D.J., Hettich, S., Blake, C.L. and Merz, C.J.: UCI Repository of Machine Learning Databases, available at <i><a href="http://www.ics.uci.edu/mlearn/MLRepository.html" target="_blank">www.ics.uci.edu/mlearn/MLRepository.html</a>, </i>University of California, Irvine (1998)</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6048203&pid=S1870-9044201200020001000018&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">&#91;19&#93; Jun, L.L. and Meng, C.W.: An Efficient Clustering Method for k&#150;anonymization. In: the 2008 International Workshop on Privacy and Anonymity in Information Society, pp. 46&#150;&#150;50, ACM New York, Nantes, France (2008) </font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6048204&pid=S1870-9044201200020001000019&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">&#91;20&#93; Li, J., Wong, R.C.W., Fu, A.W.C and Pei, J.: Achieving k&#150;Anonymity by Clustering in Attribute Hierarchical Structures. In: Tjoa, A.M., Trujillo, J. (eds.) Data Warehousing and Knowledge Discovery, LNCS 4081, pp. 405&#150;&#150;416, Springer Verlag, Heidelberg (2006) </font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6048205&pid=S1870-9044201200020001000020&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">&#91;21&#93; Huynh, V.Q.P. and Dang, T.K.: eM<sup>2</sup>: An Efficient Member Migration Algorithm for Ensuring k&#150;Anonymity and Mitigating Information Loss. In: 7<sup>th</sup> VLDB Workshop on Secure Data Management, pp. 26&#150;&#150;40, Springer Verlag, Singapore (2010)</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6048206&pid=S1870-9044201200020001000021&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">&#91;22&#93; To, Q.C., Dang, T.K., Kueng, J.: OST&#150;tree: An Access Method for Obfuscating Spatio&#150;Temporal Data in Location Based Services. In: 4<sup>th </sup>IFIP International Conference on New Technologies, Mobility and Security, IEEE Computer Society, Paris, France (2011)</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6048207&pid=S1870-9044201200020001000022&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">&#91;23&#93; To, Q.C., Dang, T.K., Kueng, J.: B<sup>ob</sup>&#150;Tree: An Efficient B+&#150;Tree Based Index Structure for Geographic&#150;aware Obfuscation. In: 3<sup>rd</sup> Asian Conference on Intelligent Information and Database Systems, LNAI 6591, pp. 109&#150;&#150;118, Springer Verlag, Korea (2011)</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6048208&pid=S1870-9044201200020001000023&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">&#91;24&#93; To, Q.C., Dang, T.K., Kueng, J.: A Hilbert&#150;based Framework for Preserving Privacy in Location&#150;based Services. In: International Journal of Intelligent Information and Database Systems, Inderscience Publisher (2013, to appear)</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6048209&pid=S1870-9044201200020001000024&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">&#91;25&#93; Le, T.B.T, Dang, T.K.: Semantic Bob&#150;Tree: A New Obfuscation Technique for Location Privacy Protection. In: 10<sup>th</sup> International Conference on Advances in Mobile Computing &amp; Multimedia, ACM, Bali, Indonesia (2012)</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6048210&pid=S1870-9044201200020001000025&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> ]]></body><back>
<ref-list>
<ref id="B1">
<label>1</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[M.]]></surname>
<given-names><![CDATA[Sergio]]></given-names>
</name>
<name>
<surname><![CDATA[B.]]></surname>
<given-names><![CDATA[Claudio]]></given-names>
</name>
<name>
<surname><![CDATA[S.X.]]></surname>
<given-names><![CDATA[Wang]]></given-names>
</name>
<name>
<surname><![CDATA[J.]]></surname>
<given-names><![CDATA[Sushil]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[k-anonymity in Databases with Time Stamped Data]]></article-title>
<source><![CDATA[13th International Symposium on Temporal Representation and Reasoning]]></source>
<year>2006</year>
<page-range>177--186</page-range><publisher-loc><![CDATA[Budapest ]]></publisher-loc>
<publisher-name><![CDATA[IEEE Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B2">
<label>2</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[T.A.]]></surname>
<given-names><![CDATA[Truong]]></given-names>
</name>
<name>
<surname><![CDATA[Q.C.]]></surname>
<given-names><![CDATA[Truong]]></given-names>
</name>
<name>
<surname><![CDATA[T.K.]]></surname>
<given-names><![CDATA[Dang]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[An Adaptive Grid-based Approach to Location Privacy Preservation]]></article-title>
<source><![CDATA[2nd Asian Conference on Intelligent Information and Database Systems]]></source>
<year>2010</year>
<page-range>133--144</page-range><publisher-name><![CDATA[Springer Verlag]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B3">
<label>3</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Q.C.]]></surname>
<given-names><![CDATA[Truong]]></given-names>
</name>
<name>
<surname><![CDATA[T.A.]]></surname>
<given-names><![CDATA[Truong]]></given-names>
</name>
<name>
<surname><![CDATA[Dang]]></surname>
<given-names><![CDATA[T.K.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[The Memorizing Algorithm: Protecting User Privacy in Location-Based Services using Historical Services Information]]></article-title>
<source><![CDATA[International Journal of Mobile Computing and Multimedia Comm.]]></source>
<year>2010</year>
<volume>2</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>65--86</page-range><publisher-name><![CDATA[IGI-Global]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B4">
<label>4</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[T.K]]></surname>
<given-names><![CDATA[Dang]]></given-names>
</name>
<name>
<surname><![CDATA[J.]]></surname>
<given-names><![CDATA[Kueng]]></given-names>
</name>
<name>
<surname><![CDATA[V.Q.P]]></surname>
<given-names><![CDATA[Huynh]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Protecting User Privacy while Discovering and Maintaining Association Rules]]></article-title>
<source><![CDATA[4th IFIP International Conference on New Technologies, Mobility and Security]]></source>
<year>2011</year>
<publisher-loc><![CDATA[Paris ]]></publisher-loc>
<publisher-name><![CDATA[IEEE Computer Society]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B5">
<label>5</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ciriani]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[De Capitani di Vimercati]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Foresti]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Samarati]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[k-Anonymous Data Mining: A Survey]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[G.]]></surname>
<given-names><![CDATA[Michael]]></given-names>
</name>
<name>
<surname><![CDATA[Sushil]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Handbook of Database Security- Applications and Trends]]></source>
<year>2008</year>
<page-range>105-136</page-range><publisher-name><![CDATA[Springer Science, LLC]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B6">
<label>6</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sweeney]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Achieving k-anonymity Privacy Protection using Generalization and Suppression]]></article-title>
<source><![CDATA[International Journal of Uncertainty, Fuzziness and Knowledge-based Systems]]></source>
<year>2002</year>
<volume>10</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>571-588</page-range><publisher-name><![CDATA[World Scientific]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B7">
<label>7</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Samarati]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Sweeney]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Protecting Privacy When Disclosing Information: k-anonymity and its Enforcement through Generalization and Suppression]]></article-title>
<source><![CDATA[Technical Report SRI-CSL-98-04]]></source>
<year>1998</year>
<publisher-name><![CDATA[Computer Science Laboratory, SRI International]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B8">
<label>8</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gedik]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Ling]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms]]></article-title>
<source><![CDATA[IEEE Trans. on Mobile Computing]]></source>
<year>2008</year>
<volume>7</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1--18</page-range></nlm-citation>
</ref>
<ref id="B9">
<label>9</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gruteser]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Grunwald]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Anonymous Usage of Location-Based Services through Spatial and Temporal Cloaking]]></article-title>
<source><![CDATA[ACM International Conference Mobile Systems, Applications, and Services]]></source>
<year>2003</year>
<page-range>31--42</page-range><publisher-loc><![CDATA[New York ]]></publisher-loc>
<publisher-name><![CDATA[ACM]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B10">
<label>10</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bettini]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Mascetti]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[X.S.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Privacy Protection through Anonymity in Location-based Services]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[G.]]></surname>
<given-names><![CDATA[Michael]]></given-names>
</name>
<name>
<surname><![CDATA[Sushil]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Handbook of Database Security - Applications and Trends]]></source>
<year>2008</year>
<page-range>509--530</page-range><publisher-name><![CDATA[Springer Science, LLC]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B11">
<label>11</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[To]]></surname>
<given-names><![CDATA[Q.C.]]></given-names>
</name>
<name>
<surname><![CDATA[Dang]]></surname>
<given-names><![CDATA[T.K.]]></given-names>
</name>
<name>
<surname><![CDATA[Kueng]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A Hilbert-based Framework for Preserving Privacy in Location-based Services]]></article-title>
<source><![CDATA[Intl. Journal of Intelligent Information and Database Systems (IJIIDS)]]></source>
<year>2012</year>
<publisher-name><![CDATA[Inderscience Publisher]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B12">
<label>12</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cuellar]]></surname>
<given-names><![CDATA[J.R.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Location Information Privacy]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Srikaya]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<source><![CDATA[Geographic Location in the Internet]]></source>
<year>2002</year>
<page-range>179--208</page-range><publisher-name><![CDATA[Kluwer Academic Publishers]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B13">
<label>13</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gidófalvi]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Huang]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Pedersen]]></surname>
<given-names><![CDATA[T.B]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Privacy-Preserving Data Mining on Moving Object Trajectories]]></article-title>
<source><![CDATA[8th International Conference on Mobile Data Management]]></source>
<year>2007</year>
<page-range>60--68,</page-range><publisher-loc><![CDATA[Mannheim ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B14">
<label>14</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bettini]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Jajodia]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Protecting Privacy against Location-based Personal Identification]]></article-title>
<source><![CDATA[2nd VLDB Workshop on Secure Data Management]]></source>
<year>2005</year>
<page-range>185--199,</page-range><publisher-loc><![CDATA[Trondheim ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B15">
<label>15</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ardagna]]></surname>
<given-names><![CDATA[C.A.]]></given-names>
</name>
<name>
<surname><![CDATA[Cremonini]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Vimercati]]></surname>
<given-names><![CDATA[S.D.C.]]></given-names>
</name>
<name>
<surname><![CDATA[Samarati]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Privacy-enhanced Location-based Access Control]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[G.]]></surname>
<given-names><![CDATA[Michael]]></given-names>
</name>
<name>
<surname><![CDATA[Sushil]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Handbook of Database Security - Applications and Trends]]></source>
<year>2008</year>
<page-range>531--552</page-range><publisher-name><![CDATA[Springer Science, LLC]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B16">
<label>16</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zheng]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Xie]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Understanding Mobility Based on GPS Data]]></article-title>
<source><![CDATA[ACM conference on Ubiquitous Computing]]></source>
<year>2008</year>
<page-range>312-321</page-range><publisher-loc><![CDATA[Seoul ]]></publisher-loc>
<publisher-name><![CDATA[ACM Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B17">
<label>17</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zheng]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Xie]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Ma]]></surname>
<given-names><![CDATA[W.Y.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Mining Interesting Locations and Travel Sequences from GPS Trajectories]]></article-title>
<source><![CDATA[International conference on World Wild Web]]></source>
<year>2009</year>
<page-range>791--800</page-range><publisher-loc><![CDATA[Madrid ]]></publisher-loc>
<publisher-name><![CDATA[ACM Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B18">
<label>18</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Newman]]></surname>
<given-names><![CDATA[D.J.]]></given-names>
</name>
<name>
<surname><![CDATA[Hettich]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Blake]]></surname>
<given-names><![CDATA[C.L.]]></given-names>
</name>
<name>
<surname><![CDATA[Merz]]></surname>
<given-names><![CDATA[C.J.]]></given-names>
</name>
</person-group>
<source><![CDATA[UCI Repository of Machine Learning Databases]]></source>
<year>1998</year>
<publisher-loc><![CDATA[Irvine ]]></publisher-loc>
<publisher-name><![CDATA[University of California]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B19">
<label>19</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jun]]></surname>
<given-names><![CDATA[L.L.]]></given-names>
</name>
<name>
<surname><![CDATA[Meng]]></surname>
<given-names><![CDATA[C.W.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[An Efficient Clustering Method for k-anonymization]]></article-title>
<source><![CDATA[the 2008 International Workshop on Privacy and Anonymity in Information Society]]></source>
<year></year>
<page-range>46--50</page-range><publisher-loc><![CDATA[New YorkNantes ]]></publisher-loc>
<publisher-name><![CDATA[ACM]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B20">
<label>20</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Wong]]></surname>
<given-names><![CDATA[R.C.W.]]></given-names>
</name>
<name>
<surname><![CDATA[Fu]]></surname>
<given-names><![CDATA[A.W.C]]></given-names>
</name>
<name>
<surname><![CDATA[Pei]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Achieving k-Anonymity by Clustering in Attribute Hierarchical Structures]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Tjoa]]></surname>
<given-names><![CDATA[A.M.]]></given-names>
</name>
<name>
<surname><![CDATA[Trujillo]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Data Warehousing and Knowledge Discovery]]></source>
<year>2006</year>
<page-range>405--416</page-range><publisher-loc><![CDATA[Heidelberg ]]></publisher-loc>
<publisher-name><![CDATA[Springer Verlag]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B21">
<label>21</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Huynh]]></surname>
<given-names><![CDATA[V.Q.P.]]></given-names>
</name>
<name>
<surname><![CDATA[Dang]]></surname>
<given-names><![CDATA[T.K.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[eM²: An Efficient Member Migration Algorithm for Ensuring k-Anonymity and Mitigating Information Loss]]></article-title>
<source><![CDATA[7th VLDB Workshop on Secure Data Management]]></source>
<year>2010</year>
<page-range>26--40</page-range><publisher-name><![CDATA[Springer Verlag]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B22">
<label>22</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[To]]></surname>
<given-names><![CDATA[Q.C.]]></given-names>
</name>
<name>
<surname><![CDATA[Dang]]></surname>
<given-names><![CDATA[T.K.]]></given-names>
</name>
<name>
<surname><![CDATA[Kueng]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[OST-tree: An Access Method for Obfuscating Spatio-Temporal Data in Location Based Services]]></article-title>
<source><![CDATA[4th IFIP International Conference on New Technologies, Mobility and Security]]></source>
<year>2011</year>
<publisher-loc><![CDATA[Paris ]]></publisher-loc>
<publisher-name><![CDATA[IEEE Computer Society]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B23">
<label>23</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[To]]></surname>
<given-names><![CDATA[Q.C.]]></given-names>
</name>
<name>
<surname><![CDATA[Dang]]></surname>
<given-names><![CDATA[T.K.]]></given-names>
</name>
<name>
<surname><![CDATA[Kueng]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Bob-Tree: An Efficient B+-Tree Based Index Structure for Geographic-aware Obfuscation]]></article-title>
<source><![CDATA[3rd Asian Conference on Intelligent Information and Database Systems]]></source>
<year>2011</year>
<page-range>109--118</page-range><publisher-name><![CDATA[Springer Verlag]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B24">
<label>24</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[To]]></surname>
<given-names><![CDATA[Q.C.]]></given-names>
</name>
<name>
<surname><![CDATA[Dang]]></surname>
<given-names><![CDATA[T.K.]]></given-names>
</name>
<name>
<surname><![CDATA[Kueng]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A Hilbert-based Framework for Preserving Privacy in Location-based Services]]></article-title>
<source><![CDATA[International Journal of Intelligent Information and Database Systems]]></source>
<year>2013</year>
<publisher-name><![CDATA[Inderscience Publisher]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B25">
<label>25</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Le]]></surname>
<given-names><![CDATA[T.B.T]]></given-names>
</name>
<name>
<surname><![CDATA[Dang]]></surname>
<given-names><![CDATA[T.K.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Semantic Bob-Tree: A New Obfuscation Technique for Location Privacy Protection]]></article-title>
<source><![CDATA[10th International Conference on Advances in Mobile Computing & Multimedia]]></source>
<year>2012</year>
<publisher-loc><![CDATA[Bali ]]></publisher-loc>
<publisher-name><![CDATA[ACM]]></publisher-name>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
