Statistical and technological solutions for controlled data dissemination. Pre-proceedings of New Techniques and Technologies for Statistics 1, pp.225-232, 1998. ,
An entropy based method for measuring anonymity, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops, SecureComm 2007, 2007. ,
DOI : 10.1109/SECCOM.2007.4550303
The risk of disclosure for microdata, Journal of Business & Economic Statistics, vol.7, issue.207, 1989. ,
Disclosure risk versus data utility: The RU confidentiality map, 2001. ,
Assessing disclosure risk in anonymized datasets, Proceedings of the FloCon Workshop, 2009. ,
How to break anonymity of the netflix prize dataset, 2006. ,
Protecting respondents identities in microdata release, IEEE Transactions on Knowledge and Data Engineering, vol.13, issue.6, pp.1010-1027, 2001. ,
DOI : 10.1109/69.971193
A measure of disclosure risk for microdata, Journal of the Royal Statistical Society: Series B (Statistical Methodology), vol.10, issue.4, pp.855-867, 2002. ,
DOI : 10.1111/1467-9868.00365
Sharing computer network logs for security and privacy: a motivation for new methodologies of anonymization, Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005., 2005. ,
DOI : 10.1109/SECCMW.2005.1588299
Flaim: A multi-level anonymization framework for computer and network logs, pp.63-77, 2006. ,
Data disclosure risk evaluation, 2009 Fourth International Conference on Risks and Security of Internet and Systems (CRiSIS 2009), pp.35-72, 2009. ,
DOI : 10.1109/CRISIS.2009.5411979
Assessing global disclosure risk in masked microdata, Proceedings of the 2004 ACM workshop on Privacy in the electronic society , WPES '04, pp.85-93, 2004. ,
DOI : 10.1145/1029179.1029202
Technical Description of RODS: A Real-time Public Health Surveillance System, Journal of the American Medical Informatics Association, vol.10, issue.5, pp.399-408399, 2003. ,
DOI : 10.1197/jamia.M1345
Disclosure Risk Assessment in Perturbative Microdata Protection, Lecture Notes in Computer Science, vol.2316, pp.135-152, 2002. ,
DOI : 10.1007/3-540-47804-3_11