Ldiversity: Privacy beyond k-anonymity, ICDE'06, 2006. ,
DOI : 10.1109/icde.2006.1
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.147.2134
On the complexity of optimal kanonymity, PODS'04, 2004. ,
Issues Around the Protection or Revelation of Personal Information, Knowledge, Technology & Policy, vol.20, issue.2, 2007. ,
DOI : 10.1007/s12130-007-9013-9
Data Mining in Large Databases Using Domain Generalization Graphs, J. Intell. Inf Syst, vol.13, issue.3, 1999. ,
Micro-views, or on how to protect privacy while enhancing data usability, ACM SIGMOD Record, vol.35, issue.1, 2006. ,
DOI : 10.1145/1121995.1121997
k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, issue.05, 2002. ,
DOI : 10.1142/S0218488502001648
Threats to privacy in the forensic analysis of database systems, Proceedings of the 2007 ACM SIGMOD international conference on Management of data , SIGMOD '07, 2007. ,
DOI : 10.1145/1247480.1247492
Hippocratic Databases, VLDB'02, 2002. ,
DOI : 10.1016/B978-155860869-6/50021-4
Toward Privacy in Public Databases, Theory of Cryptography Conference, 2005. ,
DOI : 10.1007/978-3-540-30576-7_20
Personalized privacy preservation, Proceedings of the 2006 ACM SIGMOD international conference on Management of data , SIGMOD '06, 2006. ,
DOI : 10.1145/1142473.1142500