On privacy preservation against adversarial data mining, Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining , KDD '06, 2006. ,
DOI : 10.1145/1150402.1150460
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.122.9773
A General Survey of Privacy-Preserving Data Mining Models and Algorithms Advances in Database Systems, 2008. ,
Privacy-Preserving Data Mining, ACM Sigmod Record, vol.29, issue.2, 2000. ,
On the Complexity of approximating weighted satisfiability problems, 1998. ,
Secure personal data servers, Proceedings of the VLDB Endowment, 2010. ,
DOI : 10.14778/1920841.1920850
URL : https://hal.archives-ouvertes.fr/inria-00551875
An introduction to the Web Services Policy Language (WSPL), Proceedings. Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, 2004. POLICY 2004., 2004. ,
DOI : 10.1109/POLICY.2004.1309166
A privacy-aware access control system, Journal of Computer Security, vol.16, issue.4, 2008. ,
DOI : 10.3233/JCS-2008-0328
Using Neural Network Rule Extraction and Decision Tables for Credit-Risk Evaluation, Management Science, vol.49, issue.3, p.49, 2003. ,
DOI : 10.1287/mnsc.49.3.312.12739
Differential approximation for optimal satisfiability and related problems, European Journal of Operational Research, vol.147, issue.2, 2003. ,
DOI : 10.1016/S0377-2217(02)00299-0
Branching and bounds tightening techniques for non-convex MINLP. Optimization Methods and Software, 2009. ,
DOI : 10.1080/10556780903087124
The cost of privacy, Proceeding of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD 08, 2008. ,
DOI : 10.1145/1401890.1401904
Purpose based access control for privacy protection in relational database systems, The VLDB Journal, vol.29, issue.2, 2008. ,
DOI : 10.1007/s00778-006-0023-0
Recent developments in consumer credit risk assessment, European Journal of Operational Research, vol.183, issue.3, 2007. ,
DOI : 10.1016/j.ejor.2006.09.100
Differential privacy and robust statistics, Proceedings of the 41st annual ACM symposium on Symposium on theory of computing, STOC '09, 2009. ,
DOI : 10.1145/1536414.1536466
Differential approximation of min sat, max sat and related problems, European Journal of Operational Research, vol.181, issue.2, 2007. ,
DOI : 10.1016/j.ejor.2005.04.057
URL : https://hal.archives-ouvertes.fr/hal-00958506
Privacy Perserving Data Mining. Handbook of Research on Innovations in Database Technologies and Applications: Current and Future Trends, 2009. ,
Privacy-preserving data publishing, ACM Computing Surveys, vol.42, issue.4, 2010. ,
DOI : 10.1145/1749603.1749605
Using Rule Extraction to Improve the Comprehensibility of Predictive Models, SSRN Electronic Journal, 2007. ,
DOI : 10.2139/ssrn.961358
Optimization by Simulated Annealing, Science, vol.220, issue.4598, 1983. ,
Disclosure in hippocratic databases, Proceedings of VLDB, 2004. ,
Privacy Preserving Data Mining, Proceedings of Advances in Cryptology, 2000. ,
Extensible access control markup language (xacml) version 2.0. Oasis Standard, 2005. ,
An obligation model bridging access control policies and privacy policies, Proceedings of the 13th ACM symposium on Access control models and technologies , SACMAT '08, 2008. ,
DOI : 10.1145/1377836.1377857
Privacyaware role-based access control, 2010. ,
Optimization, approximation and complexity classes, Journal of Computer and System Sciences, 1991. ,
DOI : 10.1016/0022-0000(91)90023-x
URL : http://doi.org/10.1016/0022-0000(91)90023-x
Protecting respondents identities in microdata release, IEEE Transactions on Knowledge and Data Engineering, vol.13, issue.6, 2001. ,
DOI : 10.1109/69.971193
k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, issue.05, 2002. ,
DOI : 10.1142/S0218488502001648
Association rule hiding, IEEE Transactions on Knowledge and Data Engineering, vol.16, issue.4, 2004. ,
DOI : 10.1109/TKDE.2004.1269668
URL : http://research.sabanciuniv.edu/371/1/3011800001167.pdf
Personalized privacy preservation, Proceedings of the 2006 ACM SIGMOD international conference on Management of data , SIGMOD '06, 2006. ,
DOI : 10.1145/1142473.1142500
Minimising disclosure of client information in credential-based interactions, International Journal of Information Privacy, Security and Integrity, vol.1, issue.2/3 ,
DOI : 10.1504/IJIPSI.2012.046133
Optimizing cost-sensitive trust-negotiation protocols, IEEE Computer and Communications Societies, 2005. ,
Private Information, ACM Transactions on Information and System Security, vol.12, issue.1, 2008. ,
DOI : 10.1145/1410234.1410240