Workshop on Privacy and Security Aspects of Data Mining, 2004.
<http://chacs.nrl.navy.mil/projects/psdm04/>
[Agrawal 2000] Rakesh Agrawal and Ramakrishnan Srikant. "Privacy-preserving data mining," SIGMOD '00: Proceedings of the 2000 ACM SIGMOD international conference on Management of data, Dallas, Texas, United States, 2000.
<http://doi.acm.org/10.1145/342009.335438>
[Deutsch 2005] Alin Deutsch and Yannis Papakonstantinou. "Privacy in Database Publishing." 10th International Conference on Database Theory, Edinburgh, UK, 2005.
<http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3363&spage=230>
[Dobra 2003] Adrian Dobra, Alan F. Karr and Ashish P. Sanil. "Preserving Confidentiality of High-Dimensional Tabulated Data: Statistical and Computational Issues," Statistics and Computing 13(4), pp 363-370, 2003.
<http://www.stat.duke.edu/~adobra/proof200307.pdf; http://www.niss.org/dg/TR/statcomp200211-final.pdf>
[Domingo-Ferrer 2004] Josep Domingo-Ferrer and Vicenc Torra. Proceedings of International Workshop on Privacy in Statistical Databases (PSD), 2004.
<http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=3050&issue=preprint>
[Domingo-Ferrer 2003] Josep Domingo-Ferrer and Vicenc Torra. "On the Connections between Statistical Disclosure Control for Microdata and some Artificial Intelligence Tools," Information Sciences 151, pp 153-170, 2003.
<http://dx.doi.org/10.1016/S0020-0255(03)00064-1>
[Domingo-Ferrer 2003] Josep Domingo-Ferrer and Vicenc Torra. "Disclosure Risk Assessment in Statistical Microdata Protection Via Advanced Record Linkage," Statistics and Computing 13, pp 343-354, 2003.
<http://vneumann.etse.urv.es/publications/>
[Domingo-Ferrer 2002] Josep Domingo-Ferrer. Inference Control in Statistical Databases : From Theory to Practice, 2002.
<http://link.springer.de/link/service/series/0558/tocs/t2316.htm>
[Domingo-Ferrer 2002] Josep Domingo-Ferrer and J. M. Mateo-Sanz. "Practical Data-Oriented Microaggregation for Statistical Disclosure Control," IEEE Transactions on Knowledge and Data Engineering 14(1), pp 189-201, 2002.
<http://dx.doi.org/10.1109/69.979982>
[Duncan 2001] George T. Duncan, Sallie A. Keller-McNulty and S. L. Stokes. "Disclosure Risk Vs. Data Utility: The R-U Confidentiality Map," Digital Government: Technical Reports, National Institute of Statistical Sciences, 2001.
<http://www.niss.org/dg/technicalreports.html>
Cynthia Dwork, Nina Mishra and Kobbi Nissim. CS 369: A Study of Perturbation Techniques for Data Privacy, 2004.
<http://theory.stanford.edu/~nmishra/cs369-2004.html>
[Evfimievski 2003] Alexandre Evfimievski, Johannes Gehrke and Ramakrishnan Srikant. "Limiting Privacy Breaches in Privacy Preserving Data Mining," PODS '03: Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, San Diego, California, 2003.
<http://doi.acm.org/10.1145/773153.773174>
[Fienberg 2004] Stephen E. Fienberg. "Datamining and Disclosure Limitation for Categorical Statistical Databases," Workshop on Privacy and Security Aspects of Data Mining (held in Conjunction with ICDM 2004), Brighton, UK, 2004.
<http://chacs.nrl.navy.mil/projects/psdm04/>
[Fung 2005] Benjamin C. M. Fung, Ke Wang and Philip S. Yu. "Top-Down Specialization for Information and Privacy Preservation," International Conference on Data Engineering, Tokyo, Japan, 2005.
<http://www.cs.sfu.ca/~wangk/pub/TDS_ICDE05.pdf>
[Miklau 2004] Gerome Miklau and Dan Suciu. "A Formal Analysis of Information Disclosure in Data Exchange," SIGMOD '04: Proceedings of the 2004 ACM SIGMOD international conference on Management of data, Paris, France, 2004.
<http://doi.acm.org/10.1145/1007568.1007633>
[Samarati 1998] P. Samarati and L. Sweeney. "Protecting Privacy when Disclosing Information: K-Anonymity and its Enforcement through Generalization and Suppression," SRI Computer Science Laboratory Technical Report SRI-CSL-98-04, 1998.
<http://citeseer.ist.psu.edu/samarati98protecting.html>
[Slavkovic 2004] Aleksandra B. Slavkovic. "Statistical Disclosure Limitation with Released Marginal and Conditionals for Contingency Tables," Proceedings of Workshop on Privacy and Security Aspects of Data Mining ICDM '04, 2004.
<http://www.stat.psu.edu/~sesa/research.html>
[Sweeney 2002] Latanya Sweeney. "K-Anonymity: A Model for Protecting Privacy," International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 10(5), pp 557-570, 2002.
<http://dx.doi.org/10.1142/S0218488502001648; http://privacy.cs.cmu.edu/people/sweeney/kanonymity.pdf>
[Torra 2004] Vicenc Torra. "OWA Operators in Data Modeling and Reidentification," IEEE Transactions on Fuzzy Systems 12(5), pp 652-660, 2004.
<http://ieeexplore.ieee.org/iel5/91/29553/01341432.pdf?arnumber=1341432>
[Trottini 2002] Mario Trottini and Stephen E. Fienberg. "Modelling User Uncertainty for Disclosure Risk and Data Utility," International Journal on Uncertainty, Fuzziness and Knowledge-Based Systems 10, pp 511-528, 2002.
<http://www.stat.cmu.edu/~fienberg/DLindex.html>
[Trottini 2001] Mario Trottini. "A Decision-Theoretic Approach to Data Disclosure Problems," Research in Official Statistics 4, pp 7-22, 2001.
<http://www.niss.org/dg/ROS/trottini.pdf>
[Verykios 2004] Vassilios S. Verykios, Elisa Bertino, Igor N. Fovino, Loredana P. Provenza, Yucel Saygin and Yannis Theodoridis. "State-of-the-Art in Privacy Preserving Data Mining," SIGMOD Rec. 33(1), pp 50-57, 2004.
<http://doi.acm.org/10.1145/974121.974131>
[Wang 2004] Ke Wang, Philip S. Yu and Sourav Chakraborty. "Bottom-Up Generalization: A Data Mining Solution to Privacy Protection." Proceedings of the 4th IEEE International Conference on Data Mining, Brighton, UK, 2004.
<http://www.cs.sfu.ca/~wangk/pub/icdm04.pdf; http://csdl.computer.org/comp/proceedings/icdm/2004/2142/00/21420249abs.htm>