E. Parliament and . Council, Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and on the free movement of such data, 1995.

U. Dept, of HHS: Standards for privacy of individually identifiable health information; final rule, 2002.

F. News, GA hospital health data breach due to outsourcing error, 2008.

D. Agrawal and C. C. Aggarwal, On the design and quantification of privacy preserving data mining algorithms, Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems , PODS '01, 2001.
DOI : 10.1145/375551.375602

R. Agrawal and R. Srikant, Privacy-preserving data mining, SIGMOD Rec, vol.29, issue.2, 2000.

J. Brickell and V. Shmatikov, Efficient anonymity-preserving data collection, Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining , KDD '06, 2006.
DOI : 10.1145/1150402.1150415

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.132.2228

R. Dingledine, N. Mathewson, and P. Syverson, Tor: The second-generation onion router, USENIX Security Symp, 2004.

J. Domingo-ferrer and V. Torra, A Critique of k-Anonymity and Some of Its Enhancements, 2008 Third International Conference on Availability, Reliability and Security, 2008.
DOI : 10.1109/ARES.2008.97

W. Du and Z. Zhan, Using randomized response techniques for privacy-preserving data mining, Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining , KDD '03, 2003.
DOI : 10.1145/956750.956810

B. C. Fung, K. Wang, R. Chen, and P. S. Yu, Privacy-preserving data publishing, ACM Computing Surveys, vol.42, issue.4, 2010.
DOI : 10.1145/1749603.1749605

B. C. Fung, K. Wang, A. W. Fu, and J. Pei, Anonymity for continuous data publishing, Proceedings of the 11th international conference on Extending database technology Advances in database technology, EDBT '08, 2008.
DOI : 10.1145/1353343.1353378

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.113.537

O. Goldreich, Foundations of Cryptography, 2004.

O. Goldreich, S. Micali, and A. Wigderson, How to play ANY mental game, Proceedings of the nineteenth annual ACM conference on Theory of computing , STOC '87, 1987.
DOI : 10.1145/28395.28420

D. Goldschlag, M. Reed, and P. Syverson, Onion routing for anonymous and private internet connections, Communications of the ACM, vol.42, 1999.

L. A. Gordon, M. P. Loeb, W. Lucyshin, and R. Richardson, CSI/FBI Computer Crime and Security Survey, 2006.

L. C. Guillou, M. Ugon, and J. Quisquater, Cryptographic authentication protocols for smart cards, Computer Networks, vol.36, issue.4, 2001.
DOI : 10.1016/S1389-1286(01)00165-7

B. Ji-won, S. Yonglak, B. Elisa, and L. Ninghui, Secure anonymization for incremental datasets, VLDB Workshop on Secure Data Management, 2006.

P. Jurczyk and L. Xiong, Privacy-preserving data publishing for horizontally partitioned databases, Proceeding of the 17th ACM conference on Information and knowledge mining, CIKM '08, 2008.
DOI : 10.1145/1458082.1458257

M. Kantarcioglu, Privacy-preserving distributed mining of association rules on horizontally partitioned data, IEEE Transactions on Knowledge and Data Engineering, vol.16, issue.9, 2004.
DOI : 10.1109/TKDE.2004.45

K. Lefevre, D. J. Dewitt, and R. Ramakrishnan, Incognito, Proceedings of the 2005 ACM SIGMOD international conference on Management of data , SIGMOD '05, 2005.
DOI : 10.1145/1066157.1066164

K. Lefevre, D. J. Dewitt, and R. Ramakrishnan, Mondrian Multidimensional K-Anonymity, 22nd International Conference on Data Engineering (ICDE'06), 2006.
DOI : 10.1109/ICDE.2006.101

N. Li and T. Li, t-Closeness: Privacy Beyond k-Anonymity and l-Diversity, 2007 IEEE 23rd International Conference on Data Engineering, 2007.
DOI : 10.1109/ICDE.2007.367856

A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam, -diversity, ICDE, 2006.
DOI : 10.1145/1217299.1217302

D. Praca, Next Generation Smart Card: New Features, New Architecture and System Integration. Deliverable of the Inspired IST project, 2005.

P. Samarati, Protecting respondents identities in microdata release, IEEE Transactions on Knowledge and Data Engineering, vol.13, issue.6, 2001.
DOI : 10.1109/69.971193

L. Sweeney, k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, issue.05, 2002.
DOI : 10.1142/S0218488502001648

J. Vaidya and C. Clifton, Privacy preserving association rule mining in vertically partitioned data, Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining , KDD '02, 2002.
DOI : 10.1145/775047.775142

J. Vaidya and C. Clifton, Privacy-preserving data mining: why, how, and when, IEEE Security and Privacy Magazine, vol.2, issue.6, pp.19-27, 2004.
DOI : 10.1109/MSP.2004.108

K. Wang, P. S. Yu, and S. Chakraborty, Bottom-Up Generalization: A Data Mining Solution to Privacy Protection, Fourth IEEE International Conference on Data Mining (ICDM'04), 2004.
DOI : 10.1109/ICDM.2004.10110

J. Xu, W. Wang, J. Pei, X. Wang, B. Shi et al., Utility-based anonymization using local recoding, Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining , KDD '06, 2006.
DOI : 10.1145/1150402.1150504

Z. Yang, S. Zhong, and R. N. Wright, Anonymity-preserving data collection, Proceeding of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining , KDD '05, 2005.
DOI : 10.1145/1081870.1081909

A. C. Yao, Protocols for secure computations, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982), 1982.
DOI : 10.1109/SFCS.1982.38

L. Yehuda and P. Benny, Secure multiparty computation for privacy-preserving data mining, J. of Privacy and Confidentiality, vol.1, issue.1, 2009.

N. Zhang and W. Zhao, Distributed privacy preserving information sharing, VLDB, 2005.