P. Samarati, Protecting respondents identities in microdata release, IEEE Transactions on Knowledge and Data Engineering, vol.13, issue.6, pp.1010-1027, 2001.
DOI : 10.1109/69.971193

L. Sweeney, k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, issue.05, pp.557-570, 2002.
DOI : 10.1142/S0218488502001648

O. Abul, F. Bonchi, and M. Nanni, Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases, 2008 IEEE 24th International Conference on Data Engineering, pp.376-385, 2008.
DOI : 10.1109/ICDE.2008.4497446

M. Terrovitis and N. Mamoulis, Privacy Preservation in the Publication of Trajectories, The Ninth International Conference on Mobile Data Management (mdm 2008), pp.65-72, 2008.
DOI : 10.1109/MDM.2008.29

A. Monreale, G. L. Andrienko, N. V. Andrienko, F. Giannotti, D. Pedreschi et al., Movement data anonymity through generalization, pp.91-121, 2010.

A. Monreale, D. Pedreschi, R. Pensa, and F. Pinelli, Anonymity preserving sequential pattern mining, Artificial Intelligence and Law, vol.30, issue.4, 2014.
DOI : 10.1007/s10506-014-9154-6

URL : http://hdl.handle.net/2318/141980

G. Vorono¨?vorono¨?, Nouvelles applications des paramètres continusàcontinusà la théorie des formes quadratiques.deuxì eme mémoire. recherches sur lesparalléllò edres primitifs, Journal für die reine und angewandte Mathematik, vol.134, pp.198-287, 1908.

A. F. Westin, Privacy and freedom, Washington and Lee Law Review, vol.25, issue.1, p.166, 1968.

J. I. Hong, J. D. Ng, S. Lederer, and J. A. Landay, Privacy risk models for designing privacy-sensitive ubiquitous computing systems, Proceedings of the 2004 conference on Designing interactive systems processes, practices, methods, and techniques, DIS '04, pp.91-100, 2004.
DOI : 10.1145/1013115.1013129

T. A. Kosa, K. Ei-khatib, and S. Marsh, Measuring privacy, Journal of Internet Services and Information Security (JISIS), vol.1, issue.4, pp.60-73, 2011.

S. Kiyomoto, T. Nakamura, H. Takasaki, R. Watanabe, and Y. Miyake, PPM: Privacy Policy Manager for Personalized Services, Security Engineering and Intelligence Informatics, pp.377-392, 2013.
DOI : 10.1007/978-3-642-40588-4_26

URL : https://hal.archives-ouvertes.fr/hal-01506558

J. L. Becker and H. Chen, Measuring privacy risk in online social networks, 2009.

B. Krishnamurthy, D. Malandrino, and C. E. Wills, Measuring privacy loss and the impact of privacy protection in web browsing, Proceedings of the 3rd symposium on Usable privacy and security, SOUPS '07, pp.52-63, 2007.
DOI : 10.1145/1280680.1280688

T. Yu, Y. Zhang, and K. J. Lin, Modeling and measuring privacy risks in qos web services, The 3rd IEEE Conference on E-Commerce Technology and the 8th IEEE International Conference on and Enterprise Computing, E-Commerce, and E-Services, pp.4-4, 2006.

S. Banescu, M. Petkovi´cpetkovi´c, and N. Zannone, Measuring Privacy Compliance Using Fitness Metrics, Business Process Management, pp.114-119, 2012.
DOI : 10.1007/978-3-642-32885-5_8

R. Agrawal and R. Srikant, Privacy-preserving data mining, ACM SIGMOD Record, vol.29, issue.2, pp.439-450, 2000.
DOI : 10.1145/335191.335438

I. Dinur and K. Nissim, Revealing information while preserving privacy, Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems , PODS '03, pp.202-210, 2003.
DOI : 10.1145/773153.773173

A. Evfimievski, J. Gehrke, and R. Srikant, Limiting privacy breaches in privacy preserving data mining, Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems , PODS '03, pp.211-222, 2003.
DOI : 10.1145/773153.773174

A. Blum, C. Dwork, F. Mcsherry, and K. Nissim, Practical privacy, Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems , PODS '05, pp.128-138, 2005.
DOI : 10.1145/1065167.1065184

A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam, -diversity, ACM Transactions on Knowledge Discovery from Data, vol.1, issue.1, 2007.
DOI : 10.1145/1217299.1217302

N. Li, T. Li, and S. Venkatasubramanian, t-Closeness: Privacy Beyond k-Anonymity and l-Diversity, 2007 IEEE 23rd International Conference on Data Engineering, pp.106-115, 2007.
DOI : 10.1109/ICDE.2007.367856

T. M. Truta and B. Vinay, Privacy Protection: p-Sensitive k-Anonymity Property, 22nd International Conference on Data Engineering Workshops (ICDEW'06), pp.94-94, 2006.
DOI : 10.1109/ICDEW.2006.116

R. C. Wong, J. Li, A. W. Fu, and K. Wang, (?, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing, The 12th ACM SIGKDD international Conference on Knowledge Discovery and Data Mining, pp.754-759, 2006.

C. Dwork, Differential Privacy, pp.1-12, 2006.
DOI : 10.1007/11787006_1

J. Domingo-ferrer and V. Torra, A Critique of k-Anonymity and Some of Its Enhancements, 2008 Third International Conference on Availability, Reliability and Security, pp.990-993, 2008.
DOI : 10.1109/ARES.2008.97

V. Rastogi, D. Suciu, and S. Hong, The boundary between privacy and utility in data publishing, The 33rd International Conference on Very Large Databases, VLDB Endowment, pp.531-542, 2007.

J. Brickell and V. Shmatikov, The cost of privacy, Proceeding of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD 08, pp.70-78, 2008.
DOI : 10.1145/1401890.1401904

M. Sramka, R. Safavi-naini, J. Denzinger, and M. Askari, A practice-oriented framework for measuring privacy and utility in data sanitization systems, Proceedings of the 1st International Workshop on Data Semantics, DataSem '10, p.27, 2010.
DOI : 10.1145/1754239.1754270