E. Adar, D. S. Weld, B. N. Bershad, and S. S. Gribble, Why we search, Proceedings of the 16th international conference on World Wide Web , WWW '07, 2007.
DOI : 10.1145/1242572.1242595

R. Agrawal, T. Imieli´nskiimieli´nski, and A. Swami, Mining association rules between sets of items in large databases, SIGMOD, 1993.

R. Agrawal and R. Srikant, Fast algorithms for mining association rules in large databases, VLDB, 1994.

S. Agrawal, J. R. Haritsa, and B. A. Prakash, FRAPP: a framework for high-accuracy privacy-preserving mining, Data Mining and Knowledge Discovery, vol.60, issue.4, pp.101-139, 2009.
DOI : 10.1007/s10618-008-0119-9

A. Amir, R. Feldman, and R. Kashi, A new and versatile method for association generation, Information Systems, vol.22, issue.6-7, pp.333-347, 1997.
DOI : 10.1016/S0306-4379(97)00021-5

R. J. Bayardo and J. , Efficiently mining long patterns from databases, SIGMOD, 1998.

H. Cui, J. Wen, J. Nie, and W. Ma, Probabilistic query expansion using query logs, Proceedings of the eleventh international conference on World Wide Web , WWW '02, 2002.
DOI : 10.1145/511446.511489

E. Dasseni, V. S. Verykios, A. K. Elmagarmid, and E. Bertino, Hiding Association Rules by Using Confidence and Support, IHW, 2001.
DOI : 10.1007/3-540-45496-9_27

A. Evfimievski, J. Gehrke, and R. Srikant, Limiting privacy breaches in privacy preserving data mining, Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems , PODS '03, 2003.
DOI : 10.1145/773153.773174

A. Evfimievski, R. Srikant, R. Agrawal, and J. Gehrke, Privacy preserving mining of association rules, KDD, 2002.

G. Ghinita, P. Karras, P. Kalnis, and N. Mamoulis, A framework for efficient data anonymization under privacy and accuracy constraints, ACM Transactions on Database Systems, vol.34, issue.2, pp.1-47, 2009.
DOI : 10.1145/1538909.1538911

G. Ghinita, Y. Tao, and P. Kalnis, On the Anonymization of Sparse High-Dimensional Data, 2008 IEEE 24th International Conference on Data Engineering, 2008.
DOI : 10.1109/ICDE.2008.4497480

J. Han, J. Pei, and Y. Yin, Mining frequent patterns without candidate generation, SIGMOD, 2000.

Y. He and J. F. Naughton, Anonymization of set-valued data via top-down, local generalization, Proceedings of the VLDB Endowment, vol.2, issue.1, pp.934-945, 2009.
DOI : 10.14778/1687627.1687733

V. S. Iyengar, Transforming data to satisfy privacy constraints, Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining , KDD '02, 2002.
DOI : 10.1145/775047.775089

D. Kifer, Attacks on privacy and deFinetti's theorem, Proceedings of the 35th SIGMOD international conference on Management of data, SIGMOD '09, 2009.
DOI : 10.1145/1559845.1559861

A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam, -diversity, ACM Transactions on Knowledge Discovery from Data, vol.1, issue.1, p.3, 2007.
DOI : 10.1145/1217299.1217302

S. J. Rizvi and J. R. Haritsa, Maintaining Data Privacy in Association Rule Mining, VLDB, 2002.
DOI : 10.1016/B978-155860869-6/50066-4

P. Samarati, Protecting respondents identities in microdata release, IEEE Transactions on Knowledge and Data Engineering, vol.13, issue.6, pp.1010-1027, 2001.
DOI : 10.1109/69.971193

A. Savasere, E. Omiecinski, and S. B. Navathe, An efficient algorithm for mining association rules in large databases, VLDB, 1995.

Y. Saygin, V. S. Verykios, and C. Clifton, Using unknowns to prevent discovery of association rules, ACM SIGMOD Record, vol.30, issue.4, pp.45-54, 2001.
DOI : 10.1145/604264.604271

R. Srikant and R. Agrawal, Mining generalized association rules, VLDB, 1995.
DOI : 10.1016/S0167-739X(97)00019-8

M. Terrovitis, N. Mamoulis, and P. Kalnis, Privacy-preserving anonymization of set-valued data, Proceedings of the VLDB Endowment, vol.1, issue.1, pp.115-125, 2008.
DOI : 10.14778/1453856.1453874

V. S. Verykios, A. K. Elmagarmid, E. Bertino, Y. Saygin, and E. Dasseni, Association rule hiding, IEEE Transactions on Knowledge and Data Engineering, vol.16, issue.4, pp.434-447, 2004.
DOI : 10.1109/TKDE.2004.1269668

K. Wang, Y. Xu, A. W. Fu, and R. C. Wong, FF-Anonymity: When Quasi-identifiers Are Missing, 2009 IEEE 25th International Conference on Data Engineering, 2009.
DOI : 10.1109/ICDE.2009.184

R. C. Wong, A. W. Fu, K. Wang, and J. Pei, Minimality attack in privacy preserving data publishing, VLDB, 2007.

Y. Wu, C. Chiang, and A. L. Chen, Hiding Sensitive Association Rules with Limited Side Effects, IEEE Transactions on Knowledge and Data Engineering, vol.19, issue.1, pp.29-42, 2007.
DOI : 10.1109/TKDE.2007.250583

X. Xiao and Y. Tao, Anatomy: simple and effective privacy preservation, VLDB, 2006.

X. Xiao and Y. Tao, Personalized privacy preservation, Proceedings of the 2006 ACM SIGMOD international conference on Management of data , SIGMOD '06, 2006.
DOI : 10.1145/1142473.1142500

Y. Xu, K. Wang, A. W. Fu, and P. S. Yu, Anonymizing transaction databases for publication, Proceeding of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD 08, 2008.
DOI : 10.1145/1401890.1401982

G. Yang, The complexity of mining maximal frequent itemsets and maximal frequent patterns, Proceedings of the 2004 ACM SIGKDD international conference on Knowledge discovery and data mining , KDD '04, 2004.
DOI : 10.1145/1014052.1014091

M. J. Zaki, Scalable algorithms for association mining, IEEE Transactions on Knowledge and Data Engineering, vol.12, issue.3, pp.372-390, 2000.
DOI : 10.1109/69.846291

Z. Zheng, R. Kohavi, and L. Mason, Real world performance of association rule algorithms, Proceedings of the seventh ACM SIGKDD international conference on Knowledge discovery and data mining , KDD '01, 2001.
DOI : 10.1145/502512.502572