Data obfuscation: anonymity and desensitization of usable data sets, IEEE Security and Privacy Magazine, vol.2, issue.6, pp.34-41, 2004. ,
DOI : 10.1109/MSP.2004.97
Evaluating re-identification risks with respect to the HIPAA privacy rule, Journal of the American Medical Informatics Association, vol.17, issue.2, pp.169-177, 2010. ,
DOI : 10.1136/jamia.2009.000026
Privacy and identity management for everyone, Proceedings of the 2005 workshop on Digital identity management , DIM '05, pp.20-27, 2005. ,
DOI : 10.1145/1102486.1102491
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.68.5681
Methods for the de-identification of electronic health records for genomic research, Genome Medicine, vol.3, issue.4, p.25, 2011. ,
DOI : 10.1126/science.1122655
Proposal for a Regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation) (2015) ,
A theory of abstraction, Artificial Intelligence, vol.57, issue.2-3, pp.323-389, 1992. ,
DOI : 10.1016/0004-3702(92)90021-O
Privacy for Peer Profiling in Collective Adaptive Systems, Privacy and Identity Management for the Future Internet in the Age of Globalisation, IFIP Advances in Information and Communication Technology, pp.237-252978, 2015. ,
DOI : 10.1007/978-3-319-18621-4_16
URL : https://hal.archives-ouvertes.fr/hal-01431584
t-Closeness: Privacy Beyond k-Anonymity and l-Diversity, 2007 IEEE 23rd International Conference on Data Engineering, pp.106-115, 2007. ,
DOI : 10.1109/ICDE.2007.367856
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.157.824
-diversity, ACM Transactions on Knowledge Discovery from Data, vol.1, issue.1, 2007. ,
DOI : 10.1145/1217299.1217302
Ontology-Based Anonymization of Categorical Values, Proc. of the 7 th Int. Conf. on Modeling Decisions for Artificial Intelligence (MDAI). LNCS, pp.243-254, 2010. ,
DOI : 10.1145/1233321.1233324
A semantic framework to protect the privacy of electronic health records with non-numerical attributes, Journal of Biomedical Informatics, vol.46, issue.2, pp.294-303, 2013. ,
DOI : 10.1016/j.jbi.2012.11.005
Protected Health Information in Accordance with the Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule http://www.hhs.gov/sites A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability , pseudonymity, and identity management, Office for Civil Rights, p.http, 2010. ,
PriSN, Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems, RACS '14, pp.66-71, 2014. ,
DOI : 10.1007/BF02344719
k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.2, issue.3, pp.557-570, 2002. ,
DOI : 10.1109/RISP.1993.287632
Context Obfuscation for Privacy via Ontological Descriptions, WP29: Opinion 05/2014 on anonymisation techniques, pp.276-288, 2005. ,
DOI : 10.1007/11426646_26