P. Samarati, Protecting respondents identities in microdata release, IEEE Transactions on Knowledge and Data Engineering, vol.13, issue.6, pp.1010-1027, 2001.
DOI : 10.1109/69.971193

P. Samarati and L. Sweeney, Generalizing data to provide anonymity when disclosing information (abstract), Proceedings of the seventeenth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems , PODS '98, p.188, 1998.
DOI : 10.1145/275487.275508

L. Sweeney, ACHIEVING k-ANONYMITY PRIVACY PROTECTION USING GENERALIZATION AND SUPPRESSION, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, issue.05, pp.571-588, 2002.
DOI : 10.1142/S021848850200165X

R. J. Bayardo and R. Agrawal, Data Privacy through Optimal k-Anonymization, 21st International Conference on Data Engineering (ICDE'05)
DOI : 10.1109/ICDE.2005.42

A. Hundepool and L. Willenborg, Mu and Tau Argus: Software for Statistical Disclosure Control, Proceedings of the Third International Seminar on Statistical Confidentiality, 1996.

V. S. Iyengar, Transforming data to satisfy privacy constraints, Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining , KDD '02, pp.279-288, 2002.
DOI : 10.1145/775047.775089

N. Li, T. Li, and S. Venkatasubramaniam, t-Closeness: Privacy Beyond k-Anonymity and l-Diversity, 2007 IEEE 23rd International Conference on Data Engineering, pp.106-115, 2007.
DOI : 10.1109/ICDE.2007.367856

T. M. Truta and B. Vinay, Privacy Protection: p-Sensitive k-Anonymity Property, 22nd International Conference on Data Engineering Workshops (ICDEW'06), p.94, 2006.
DOI : 10.1109/ICDEW.2006.116

R. Dewri, I. Ray, I. Ray, and D. Whitley, On the comparison of microdata disclosure control algorithms, Proceedings of the 12th International Conference on Extending Database Technology Advances in Database Technology, EDBT '09, pp.240-251, 2009.
DOI : 10.1145/1516360.1516389

A. Meyerson and R. Williams, On the complexity of optimal K-anonymity, Proceedings of the twenty-third ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems , PODS '04, pp.223-228, 2004.
DOI : 10.1145/1055558.1055591

K. Lefevre, D. J. Dewitt, and R. Ramakrishnan, Incognito, Proceedings of the 2005 ACM SIGMOD international conference on Management of data , SIGMOD '05, pp.49-60, 2005.
DOI : 10.1145/1066157.1066164

B. C. Fung, K. Wang, and P. S. Yu, Top-Down Specialization for Information and Privacy Preservation, 21st International Conference on Data Engineering (ICDE'05), pp.205-216, 2005.
DOI : 10.1109/ICDE.2005.143

R. Dewri, I. Ray, I. Ray, and D. Whitley, On the Optimal Selection of k in the k-Anonymity Problem, 2008 IEEE 24th International Conference on Data Engineering, pp.1364-1366, 2008.
DOI : 10.1109/ICDE.2008.4497557

Z. Huang and W. Du, OptRR: Optimizing Randomized Response Schemes for Privacy-Preserving Data Mining, 2008 IEEE 24th International Conference on Data Engineering, pp.705-714, 2008.
DOI : 10.1109/ICDE.2008.4497479

E. Zitzler, M. Laumanns, and L. Thiele, SPEA2: Improving the Strength Pareto Evolutionary Algorithm In: Evolutionary Methods for Design, Optimization and Control with Applications to Industrial Problems, pp.95-100, 2002.