A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam, Ldiversity: Privacy beyond k-anonymity, ICDE'06, 2006.
DOI : 10.1109/icde.2006.1

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.147.2134

A. Meyerson and R. Williams, On the complexity of optimal kanonymity, PODS'04, 2004.

D. Hillyard and M. Gauen, Issues Around the Protection or Revelation of Personal Information, Knowledge, Technology & Policy, vol.20, issue.2, 2007.
DOI : 10.1007/s12130-007-9013-9

R. J. Hilderman, H. J. Hamilton, and N. Cercone, Data Mining in Large Databases Using Domain Generalization Graphs, J. Intell. Inf Syst, vol.13, issue.3, 1999.

J. W. Byun and E. Bertino, Micro-views, or on how to protect privacy while enhancing data usability, ACM SIGMOD Record, vol.35, issue.1, 2006.
DOI : 10.1145/1121995.1121997

L. Sweeney, k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, issue.05, 2002.
DOI : 10.1142/S0218488502001648

P. Stahlberg, G. Miklau, and B. N. Levine, Threats to privacy in the forensic analysis of database systems, Proceedings of the 2007 ACM SIGMOD international conference on Management of data , SIGMOD '07, 2007.
DOI : 10.1145/1247480.1247492

R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, Hippocratic Databases, VLDB'02, 2002.
DOI : 10.1016/B978-155860869-6/50021-4

S. Chawla, C. Dwork, F. Mcsherry, A. Smith, and . Wee, Toward Privacy in Public Databases, Theory of Cryptography Conference, 2005.
DOI : 10.1007/978-3-540-30576-7_20

X. Xiao and Y. Tao, Personalized privacy preservation, Proceedings of the 2006 ACM SIGMOD international conference on Management of data , SIGMOD '06, 2006.
DOI : 10.1145/1142473.1142500