Protecting respondents identities in microdata release, IEEE Transactions on Knowledge and Data Engineering, vol.13, issue.6, 2001. ,
DOI : 10.1109/69.971193
k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, issue.05, 2002. ,
DOI : 10.1142/S0218488502001648
Induction of decision trees, Machine Learning, vol.1, issue.1, 1986. ,
DOI : 10.1007/BF00116251
Protecting privacy when disclosing information: kanonymity and its enforcement through generalization and suppression, 1998. ,
Incognito:efficient full-domain kanonymity, Proceedings of the 2005 ACM SIGMOD, 2005. ,
Data Privacy through Optimal k-Anonymization, 21st International Conference on Data Engineering (ICDE'05), p.5 ,
DOI : 10.1109/ICDE.2005.42
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.88.6221
Anatomy: Simple and effective privacy preservation, p.6 ,
Worst case background knowledge, p.7 ,
Privacy-preserving data mining, SIGMOD'00, pp.439-450, 2000. ,
Maintaining Data Privacy in Association Rule Mining, Proceedings of the 28th VLDB Conference, 2002. ,
DOI : 10.1016/B978-155860869-6/50066-4
Privacy preserving mining of association rules, p.2 ,
Ldiversity: Privacy beyond k-anonymity, p.6 ,
DOI : 10.1109/icde.2006.1
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.147.2134
(?, k)-anonymity: An enhanced k-anonymity model for privacy-preserving data publishing, p.6 ,
t-Closeness: Privacy Beyond k-Anonymity and l-Diversity, 2007 IEEE 23rd International Conference on Data Engineering, p.7 ,
DOI : 10.1109/ICDE.2007.367856
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.157.824
M-invariance, Proceedings of the 2007 ACM SIGMOD international conference on Management of data , SIGMOD '07, p.7 ,
DOI : 10.1145/1247480.1247556
When do data mining results violate privacy?, Proceedings of the 2004 ACM SIGKDD international conference on Knowledge discovery and data mining , KDD '04 ,
DOI : 10.1145/1014052.1014126
Privacy-preserving decision trees over vertically partitioned data ,
DOI : 10.1007/11535706_11
URL : http://cimic.rutgers.edu/~jsvaidya/pub-papers/vaidyaID3-ifip05.pdf
Privacy-preserving Bayesian network structure computation on distributed heterogeneous data, Proceedings of the 2004 ACM SIGKDD international conference on Knowledge discovery and data mining , KDD '04 ,
DOI : 10.1145/1014052.1014145
Privacy-MaxEnt, Proceedings of the 2008 ACM SIGMOD international conference on Management of data , SIGMOD '08, p.8 ,
DOI : 10.1145/1376616.1376665
Minimality attack in privacy preserving data publishing, p.7 ,
Information disclosure under realistic assumptions, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, p.7 ,
DOI : 10.1145/1315245.1315316
Deriving Private Information from Association Rule Mining Results, 2009 IEEE 25th International Conference on Data Engineering, p.9 ,
DOI : 10.1109/ICDE.2009.97
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.157.3463
Information Theory and Statistical Mechanics, Physical Review, vol.106, issue.4, pp.620-630, 1957. ,
DOI : 10.1103/PhysRev.106.620
Knitro: An integrated package for nonlinear optimization Large-Scale Nonlinear Optimization, pp.35-59, 2006. ,
C4.5: Programs for Machine Learning, 1993. ,
Classification and Regression Trees, 1984. ,