C. C. Aggarwal and P. S. Yu, Privacy-Preserving Data Mining -Models and Algorithms, Advances in Database Systems, 2008.

A. Asuncion and A. Frank, UCI machine learning repository, 2010.

E. Bertino, D. Lin, and W. Jiang, A Survey of Quantification of Privacy Preserving Data Mining Algorithms, pp.183-205
DOI : 10.1007/978-0-387-70992-5_8

D. Kifer, Attacks on privacy and deFinetti's theorem, Proceedings of the 35th SIGMOD international conference on Management of data, SIGMOD '09, pp.127-138, 2009.
DOI : 10.1145/1559845.1559861

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

H. W. Kuhn, The Hungarian method for the assignment problem, Naval Research Logistics Quarterly, vol.3, issue.1-2, pp.83-97, 1955.
DOI : 10.1002/nav.3800020109

C. Li, H. Shirani-mehr, and X. Yang, Protecting Individual Information Against Inference Attacks in Data Publishing, Lecture Notes in Computer Science, vol.4443, pp.422-433, 2007.
DOI : 10.1007/978-3-540-71703-4_37

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

X. B. Li and S. Sarkar, Against Classification Attacks: A Decision Tree Pruning Approach to Privacy Protection in Data Mining, Operations Research, vol.57, issue.6, pp.1496-1509, 2009.
DOI : 10.1287/opre.1090.0702

X. B. Li and S. Sarkar, Protecting privacy against regression attacks in predictive data mining, pp.1-15, 2011.

J. Munkres, Algorithms for the Assignment and Transportation Problems, Journal of the Society for Industrial and Applied Mathematics, vol.5, issue.1, pp.32-38, 1957.
DOI : 10.1137/0105003

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

J. R. Quinlan, Induction of decision trees, Machine Learning, vol.1, issue.1, pp.81-106, 1986.
DOI : 10.1007/BF00116251

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

J. R. Quinlan, C4.5: Programs for Machine Learning, 1993.

C. E. Shannon, A mathematical theory of communication. The Bell Systems Technical, Journal, vol.27, pp.379-423, 1948.

V. S. Verykios, E. Bertino, I. N. Fovino, L. P. Provenza, Y. Saygin et al., State-of-the-art in privacy preserving data mining, ACM SIGMOD Record, vol.33, issue.1, pp.50-57, 2004.
DOI : 10.1145/974121.974131

I. H. Witten and E. Frank, Data mining, ACM SIGMOD Record, vol.31, issue.1, 1999.
DOI : 10.1145/507338.507355