P. Samarati, Protecting respondents identities in microdata release, IEEE Transactions on Knowledge and Data Engineering, vol.13, issue.6, 2001.
DOI : 10.1109/69.971193

L. Sweeney, k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, issue.05, 2002.
DOI : 10.1142/S0218488502001648

J. R. Quinlan, Induction of decision trees, Machine Learning, vol.1, issue.1, 1986.
DOI : 10.1007/BF00116251

P. Samarati and L. Sweeney, Protecting privacy when disclosing information: kanonymity and its enforcement through generalization and suppression, 1998.

K. Lefevre, D. J. Dewitt, and R. Ramakrishnan, Incognito:efficient full-domain kanonymity, Proceedings of the 2005 ACM SIGMOD, 2005.

R. J. Bayardo and R. Agrawal, Data Privacy through Optimal k-Anonymization, 21st International Conference on Data Engineering (ICDE'05), p.5
DOI : 10.1109/ICDE.2005.42

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.88.6221

X. Xiao and Y. Tao, Anatomy: Simple and effective privacy preservation, p.6

D. J. Martin, D. Kifer, A. Machanavajjhala, J. E. Gehrke, and J. Halpern, Worst case background knowledge, p.7

R. Agrawal and R. Srikant, Privacy-preserving data mining, SIGMOD'00, pp.439-450, 2000.

S. Rizvi and J. R. Haritsa, Maintaining Data Privacy in Association Rule Mining, Proceedings of the 28th VLDB Conference, 2002.
DOI : 10.1016/B978-155860869-6/50066-4

A. Evfimievski, R. Srikant, R. Agrawal, and J. Gehrke, Privacy preserving mining of association rules, p.2

A. Machanavajjhala, J. E. Gehrke, D. Kifer, and M. Venkitasubramaniam, Ldiversity: Privacy beyond k-anonymity, p.6
DOI : 10.1109/icde.2006.1

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.147.2134

R. C. Wong, J. Li, A. W. Fu, and K. Wang, (?, k)-anonymity: An enhanced k-anonymity model for privacy-preserving data publishing, p.6

N. Li and T. Li, t-Closeness: Privacy Beyond k-Anonymity and l-Diversity, 2007 IEEE 23rd International Conference on Data Engineering, p.7
DOI : 10.1109/ICDE.2007.367856

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.157.824

X. Xiao and Y. Tao, M-invariance, Proceedings of the 2007 ACM SIGMOD international conference on Management of data , SIGMOD '07, p.7
DOI : 10.1145/1247480.1247556

M. Kantarcioglu, J. Jin, and C. Clifton, When do data mining results violate privacy?, Proceedings of the 2004 ACM SIGKDD international conference on Knowledge discovery and data mining , KDD '04
DOI : 10.1145/1014052.1014126

J. Vaidya and C. Clifton, Privacy-preserving decision trees over vertically partitioned data
DOI : 10.1007/11535706_11

URL : http://cimic.rutgers.edu/~jsvaidya/pub-papers/vaidyaID3-ifip05.pdf

R. Wright and Z. Yang, Privacy-preserving Bayesian network structure computation on distributed heterogeneous data, Proceedings of the 2004 ACM SIGKDD international conference on Knowledge discovery and data mining , KDD '04
DOI : 10.1145/1014052.1014145

W. Du, Z. Teng, and Z. Zhu, Privacy-MaxEnt, Proceedings of the 2008 ACM SIGMOD international conference on Management of data , SIGMOD '08, p.8
DOI : 10.1145/1376616.1376665

R. Wong, A. Fu, K. Wang, and J. Pei, Minimality attack in privacy preserving data publishing, p.7

L. Zhang, S. Jajodia, and A. Brodsky, Information disclosure under realistic assumptions, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, p.7
DOI : 10.1145/1315245.1315316

Z. Zhu, G. Wang, and W. Du, Deriving Private Information from Association Rule Mining Results, 2009 IEEE 25th International Conference on Data Engineering, p.9
DOI : 10.1109/ICDE.2009.97

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.157.3463

E. T. Jaynes, Information Theory and Statistical Mechanics, Physical Review, vol.106, issue.4, pp.620-630, 1957.
DOI : 10.1103/PhysRev.106.620

R. Byrd, J. Nocedal, and R. Waltz, Knitro: An integrated package for nonlinear optimization Large-Scale Nonlinear Optimization, pp.35-59, 2006.

J. R. Quinlan, C4.5: Programs for Machine Learning, 1993.

L. Breiman, J. Friedman, C. J. Stone, and R. A. Olshen, Classification and Regression Trees, 1984.