M. F. Mokbel, C. Y. Chow, and W. G. Aref, The New Casper: A Privacy-Aware Location-Based Database Server, 2007 IEEE 23rd International Conference on Data Engineering, pp.1499-1500, 2007.
DOI : 10.1109/ICDE.2007.369052

G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K. L. Tan, Private queries in location based services, Proceedings of the 2008 ACM SIGMOD international conference on Management of data , SIGMOD '08, pp.121-132, 2008.
DOI : 10.1145/1376616.1376631

L. Sweeney, k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, issue.05, pp.557-570, 2002.
DOI : 10.1142/S0218488502001648

R. Ostrovsky and W. E. Iii, A Survey of Single-Database Private Information Retrieval: Techniques and Applications, In: Public Key Cryptography, pp.393-411, 2007.
DOI : 10.1007/978-3-540-71677-8_26

Q. Zhang, N. Koudas, D. Srivastava, and T. Yu, Aggregate Query Answering on Anonymized Tables, 2007 IEEE 23rd International Conference on Data Engineering, pp.116-125, 2007.
DOI : 10.1109/ICDE.2007.367857

K. Lefevre, D. J. Dewitt, and R. Ramakrishnan, Workload-aware anonymization, Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining , KDD '06, pp.277-286, 2006.
DOI : 10.1145/1150402.1150435

J. Li, Y. Tao, and X. Xiao, Preservation of proximity privacy in publishing numerical sensitive data, Proceedings of the 2008 ACM SIGMOD international conference on Management of data , SIGMOD '08, pp.473-486, 2008.
DOI : 10.1145/1376616.1376666

E. Kushilevitz and R. Ostrovsky, Replication is not needed: single database, computationally-private information retrieval, Proceedings 38th Annual Symposium on Foundations of Computer Science, pp.364-373, 1997.
DOI : 10.1109/SFCS.1997.646125

R. Sion and B. Carbunar, On the computational practicality of private information retrieval, Network and Distributed System Security Symposium, 2007.

B. Chor, E. Kushilevitz, O. Goldreich, and M. Sudan, Private information retrieval, Journal of the ACM, vol.45, issue.6, pp.965-981, 1998.
DOI : 10.1145/293347.293350

P. Williams and R. Sion, Usable private information retrieval, Network and Distributed System Security Symposium, 2008.

A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam, -diversity, ACM Transactions on Knowledge Discovery from Data, vol.1, issue.1, p.24, 2006.
DOI : 10.1145/1217299.1217302

N. Li, T. Li, and S. Venkatasubramanian, t-Closeness: Privacy Beyond k-Anonymity and l-Diversity, 2007 IEEE 23rd International Conference on Data Engineering, pp.106-115, 2007.
DOI : 10.1109/ICDE.2007.367856

B. Chor, N. Gilboa, and M. Naor, Private information retrieval by keywords, 1997.

L. Sweeney, ACHIEVING k-ANONYMITY PRIVACY PROTECTION USING GENERALIZATION AND SUPPRESSION, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, issue.05, pp.571-588, 2002.
DOI : 10.1142/S021848850200165X

K. Lefevre, D. J. Dewitt, and R. Ramakrishnan, Incognito, Proceedings of the 2005 ACM SIGMOD international conference on Management of data , SIGMOD '05, pp.49-60, 2005.
DOI : 10.1145/1066157.1066164

A. Asuncion and D. Newman, UCI machine learning repository, 2007.

S. Wang, D. Agrawal, and A. E. Abbadi, Generalizing PIR for Practical Private Retrieval of Public Data, 2009.
DOI : 10.1007/978-3-642-13739-6_1

URL : https://hal.archives-ouvertes.fr/hal-01056681