C. C. Aggarwal, J. Pei, and B. Zhang, On privacy preservation against adversarial data mining, Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining , KDD '06, 2006.
DOI : 10.1145/1150402.1150460

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.122.9773

C. C. Aggarwal, Y. , and P. S. , A General Survey of Privacy-Preserving Data Mining Models and Algorithms Advances in Database Systems, 2008.

R. Agrawal and R. Srikant, Privacy-Preserving Data Mining, ACM Sigmod Record, vol.29, issue.2, 2000.

P. Alimonti, G. Ausiello, L. Giovaniello, and M. Protasi, On the Complexity of approximating weighted satisfiability problems, 1998.

T. Allard, N. Anciaux, L. Bouganim, Y. Guo, L. Folgoc et al., Secure personal data servers, Proceedings of the VLDB Endowment, 2010.
DOI : 10.14778/1920841.1920850

URL : https://hal.archives-ouvertes.fr/inria-00551875

A. H. Anderson, An introduction to the Web Services Policy Language (WSPL), Proceedings. Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, 2004. POLICY 2004., 2004.
DOI : 10.1109/POLICY.2004.1309166

C. A. Ardagna, M. Cremonini, S. De-capitani-di-vimercati, and P. Samarati, A privacy-aware access control system, Journal of Computer Security, vol.16, issue.4, 2008.
DOI : 10.3233/JCS-2008-0328

B. Baesens, R. Setiono, C. Mues, and J. Vanthienen, Using Neural Network Rule Extraction and Decision Tables for Credit-Risk Evaluation, Management Science, vol.49, issue.3, p.49, 2003.
DOI : 10.1287/mnsc.49.3.312.12739

C. Bazgan, P. , and V. Th, Differential approximation for optimal satisfiability and related problems, European Journal of Operational Research, vol.147, issue.2, 2003.
DOI : 10.1016/S0377-2217(02)00299-0

P. Belotti, J. Lee, L. Liberti, F. Margot, and A. Wachter, Branching and bounds tightening techniques for non-convex MINLP. Optimization Methods and Software, 2009.
DOI : 10.1080/10556780903087124

J. Brickell and V. Shmatikov, The cost of privacy, Proceeding of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD 08, 2008.
DOI : 10.1145/1401890.1401904

J. Byun, L. , and N. , Purpose based access control for privacy protection in relational database systems, The VLDB Journal, vol.29, issue.2, 2008.
DOI : 10.1007/s00778-006-0023-0

J. N. Crook, D. B. Edelman, T. , and L. C. , Recent developments in consumer credit risk assessment, European Journal of Operational Research, vol.183, issue.3, 2007.
DOI : 10.1016/j.ejor.2006.09.100

C. Dwork and J. Lei, Differential privacy and robust statistics, Proceedings of the 41st annual ACM symposium on Symposium on theory of computing, STOC '09, 2009.
DOI : 10.1145/1536414.1536466

B. Escoffier, P. , and V. Th, Differential approximation of min sat, max sat and related problems, European Journal of Operational Research, vol.181, issue.2, 2007.
DOI : 10.1016/j.ejor.2005.04.057

URL : https://hal.archives-ouvertes.fr/hal-00958506

A. Evfimievski and T. Grandison, Privacy Perserving Data Mining. Handbook of Research on Innovations in Database Technologies and Applications: Current and Future Trends, 2009.

B. C. Fung, K. Wang, R. Chen, and P. Yu, Privacy-preserving data publishing, ACM Computing Surveys, vol.42, issue.4, 2010.
DOI : 10.1145/1749603.1749605

J. Huysmans, B. Baesens, and J. Vanthienen, Using Rule Extraction to Improve the Comprehensibility of Predictive Models, SSRN Electronic Journal, 2007.
DOI : 10.2139/ssrn.961358

S. Kirkpatrick, C. D. Gelatt, and M. P. Vecchi, Optimization by Simulated Annealing, Science, vol.220, issue.4598, 1983.

K. Lefevre, R. Agrawal, V. Ercegovac, R. Ramakrishnan, Y. Xu et al., Disclosure in hippocratic databases, Proceedings of VLDB, 2004.

Y. Lindell and B. Pinkas, Privacy Preserving Data Mining, Proceedings of Advances in Cryptology, 2000.

T. Moses, Extensible access control markup language (xacml) version 2.0. Oasis Standard, 2005.

Q. Ni, E. Bertino, and J. Lobo, An obligation model bridging access control policies and privacy policies, Proceedings of the 13th ACM symposium on Access control models and technologies , SACMAT '08, 2008.
DOI : 10.1145/1377836.1377857

Q. Ni, E. Bertino, J. Lobo, C. Brodie, C. Karat et al., Privacyaware role-based access control, 2010.

C. Papadimitriou, Y. , and M. , Optimization, approximation and complexity classes, Journal of Computer and System Sciences, 1991.
DOI : 10.1016/0022-0000(91)90023-x

URL : http://doi.org/10.1016/0022-0000(91)90023-x

P. Samarati, Protecting respondents identities in microdata release, IEEE Transactions on Knowledge and Data Engineering, vol.13, issue.6, 2001.
DOI : 10.1109/69.971193

L. Sweeney, k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, issue.05, 2002.
DOI : 10.1142/S0218488502001648

V. S. Verykios, A. K. Elmagarmid, E. Bertino, Y. Saygin, and E. Dasseni, Association rule hiding, IEEE Transactions on Knowledge and Data Engineering, vol.16, issue.4, 2004.
DOI : 10.1109/TKDE.2004.1269668

URL : http://research.sabanciuniv.edu/371/1/3011800001167.pdf

X. Xiao and Y. Tao, Personalized privacy preservation, Proceedings of the 2006 ACM SIGMOD international conference on Management of data , SIGMOD '06, 2006.
DOI : 10.1145/1142473.1142500

C. A. Ardagna, S. De-capitani-di-vimercati, S. Foresti, S. Paraboschi, and P. Samarati, Minimising disclosure of client information in credential-based interactions, International Journal of Information Privacy, Security and Integrity, vol.1, issue.2/3
DOI : 10.1504/IJIPSI.2012.046133

W. Chen, L. Clarke, J. Kurose, and D. Towsley, Optimizing cost-sensitive trust-negotiation protocols, IEEE Computer and Communications Societies, 2005.

D. Yao, K. B. Frikken, M. J. Atallah, and R. Tamassia, Private Information, ACM Transactions on Information and System Security, vol.12, issue.1, 2008.
DOI : 10.1145/1410234.1410240