Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and on the free movement of such data, 1995. ,
of HHS: Standards for privacy of individually identifiable health information; final rule, 2002. ,
GA hospital health data breach due to outsourcing error, 2008. ,
On the design and quantification of privacy preserving data mining algorithms, Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems , PODS '01, 2001. ,
DOI : 10.1145/375551.375602
Privacy-preserving data mining, SIGMOD Rec, vol.29, issue.2, 2000. ,
Efficient anonymity-preserving data collection, Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining , KDD '06, 2006. ,
DOI : 10.1145/1150402.1150415
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.132.2228
Tor: The second-generation onion router, USENIX Security Symp, 2004. ,
A Critique of k-Anonymity and Some of Its Enhancements, 2008 Third International Conference on Availability, Reliability and Security, 2008. ,
DOI : 10.1109/ARES.2008.97
Using randomized response techniques for privacy-preserving data mining, Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining , KDD '03, 2003. ,
DOI : 10.1145/956750.956810
Privacy-preserving data publishing, ACM Computing Surveys, vol.42, issue.4, 2010. ,
DOI : 10.1145/1749603.1749605
Anonymity for continuous data publishing, Proceedings of the 11th international conference on Extending database technology Advances in database technology, EDBT '08, 2008. ,
DOI : 10.1145/1353343.1353378
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.113.537
Foundations of Cryptography, 2004. ,
How to play ANY mental game, Proceedings of the nineteenth annual ACM conference on Theory of computing , STOC '87, 1987. ,
DOI : 10.1145/28395.28420
Onion routing for anonymous and private internet connections, Communications of the ACM, vol.42, 1999. ,
CSI/FBI Computer Crime and Security Survey, 2006. ,
Cryptographic authentication protocols for smart cards, Computer Networks, vol.36, issue.4, 2001. ,
DOI : 10.1016/S1389-1286(01)00165-7
Secure anonymization for incremental datasets, VLDB Workshop on Secure Data Management, 2006. ,
Privacy-preserving data publishing for horizontally partitioned databases, Proceeding of the 17th ACM conference on Information and knowledge mining, CIKM '08, 2008. ,
DOI : 10.1145/1458082.1458257
Privacy-preserving distributed mining of association rules on horizontally partitioned data, IEEE Transactions on Knowledge and Data Engineering, vol.16, issue.9, 2004. ,
DOI : 10.1109/TKDE.2004.45
Incognito, Proceedings of the 2005 ACM SIGMOD international conference on Management of data , SIGMOD '05, 2005. ,
DOI : 10.1145/1066157.1066164
Mondrian Multidimensional K-Anonymity, 22nd International Conference on Data Engineering (ICDE'06), 2006. ,
DOI : 10.1109/ICDE.2006.101
t-Closeness: Privacy Beyond k-Anonymity and l-Diversity, 2007 IEEE 23rd International Conference on Data Engineering, 2007. ,
DOI : 10.1109/ICDE.2007.367856
-diversity, ICDE, 2006. ,
DOI : 10.1145/1217299.1217302
Next Generation Smart Card: New Features, New Architecture and System Integration. Deliverable of the Inspired IST project, 2005. ,
Protecting respondents identities in microdata release, IEEE Transactions on Knowledge and Data Engineering, vol.13, issue.6, 2001. ,
DOI : 10.1109/69.971193
k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, issue.05, 2002. ,
DOI : 10.1142/S0218488502001648
Privacy preserving association rule mining in vertically partitioned data, Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining , KDD '02, 2002. ,
DOI : 10.1145/775047.775142
Privacy-preserving data mining: why, how, and when, IEEE Security and Privacy Magazine, vol.2, issue.6, pp.19-27, 2004. ,
DOI : 10.1109/MSP.2004.108
Bottom-Up Generalization: A Data Mining Solution to Privacy Protection, Fourth IEEE International Conference on Data Mining (ICDM'04), 2004. ,
DOI : 10.1109/ICDM.2004.10110
Utility-based anonymization using local recoding, Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining , KDD '06, 2006. ,
DOI : 10.1145/1150402.1150504
Anonymity-preserving data collection, Proceeding of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining , KDD '05, 2005. ,
DOI : 10.1145/1081870.1081909
Protocols for secure computations, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982), 1982. ,
DOI : 10.1109/SFCS.1982.38
Secure multiparty computation for privacy-preserving data mining, J. of Privacy and Confidentiality, vol.1, issue.1, 2009. ,
Distributed privacy preserving information sharing, VLDB, 2005. ,