D. E. Bakken, R. Parameswaran, D. M. Blough, A. A. Franz, and T. J. Palmer, Data obfuscation: anonymity and desensitization of usable data sets, IEEE Security and Privacy Magazine, vol.2, issue.6, pp.34-41, 2004.
DOI : 10.1109/MSP.2004.97

K. Benitez and B. Malin, Evaluating re-identification risks with respect to the HIPAA privacy rule, Journal of the American Medical Informatics Association, vol.17, issue.2, pp.169-177, 2010.
DOI : 10.1136/jamia.2009.000026

J. Camenisch, D. Sommer, S. Fischer-hübner, M. Hansen, H. Krasemann et al., Privacy and identity management for everyone, Proceedings of the 2005 workshop on Digital identity management , DIM '05, pp.20-27, 2005.
DOI : 10.1145/1102486.1102491

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.68.5681

E. Emam and K. , Methods for the de-identification of electronic health records for genomic research, Genome Medicine, vol.3, issue.4, p.25, 2011.
DOI : 10.1126/science.1122655

. Eu-commission, Proposal for a Regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation) (2015)

F. Giunchiglia and T. Walsh, A theory of abstraction, Artificial Intelligence, vol.57, issue.2-3, pp.323-389, 1992.
DOI : 10.1016/0004-3702(92)90021-O

M. Hartswood, M. Jirotka, R. Chenu-abente, A. Hume, F. Giunchiglia et al., Privacy for Peer Profiling in Collective Adaptive Systems, Privacy and Identity Management for the Future Internet in the Age of Globalisation, IFIP Advances in Information and Communication Technology, pp.237-252978, 2015.
DOI : 10.1007/978-3-319-18621-4_16

URL : https://hal.archives-ouvertes.fr/hal-01431584

N. Li, T. Li, and S. Venkatasubramanian, t-Closeness: Privacy Beyond k-Anonymity and l-Diversity, 2007 IEEE 23rd International Conference on Data Engineering, pp.106-115, 2007.
DOI : 10.1109/ICDE.2007.367856

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.157.824

A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam, -diversity, ACM Transactions on Knowledge Discovery from Data, vol.1, issue.1, 2007.
DOI : 10.1145/1217299.1217302

S. Martínez, D. Sánchez, and A. Valls, Ontology-Based Anonymization of Categorical Values, Proc. of the 7 th Int. Conf. on Modeling Decisions for Artificial Intelligence (MDAI). LNCS, pp.243-254, 2010.
DOI : 10.1145/1233321.1233324

S. Martínez, D. Sánchez, and A. Valls, A semantic framework to protect the privacy of electronic health records with non-numerical attributes, Journal of Biomedical Informatics, vol.46, issue.2, pp.294-303, 2013.
DOI : 10.1016/j.jbi.2012.11.005

A. Hansen and M. , Protected Health Information in Accordance with the Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule http://www.hhs.gov/sites A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability , pseudonymity, and identity management, Office for Civil Rights, p.http, 2010.

F. Rahman, I. D. Addo, and S. I. Ahamed, PriSN, Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems, RACS '14, pp.66-71, 2014.
DOI : 10.1007/BF02344719

L. Sweeney, k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.2, issue.3, pp.557-570, 2002.
DOI : 10.1109/RISP.1993.287632

R. Wishart, K. Henricksen, and J. Indulska, Context Obfuscation for Privacy via Ontological Descriptions, WP29: Opinion 05/2014 on anonymisation techniques, pp.276-288, 2005.
DOI : 10.1007/11426646_26