212 Applied Data Mining
[5] R. J. Bayardo and R. Agrawal. Data privacy through optimal k-anonymization. In:
Proceedings of the 21st International Conference on Data Engineering, pp. 217–228, 2005.
[6] V. Ciriani, S. D. C. di Vimercati, S. Foresti and P. Samarati. Anonymity, Vol. 33 of Advances
in Information Security. Springer, 2007.
[7] C. Clifton. Using sample size to limit exposure to data mining. J. Comput. Secur., 8:
281–307, December 2000.
[8] J. Domingo-Ferrer and J. M. Mateo-Sanz. Practical data-oriented microaggregation for
statistical disclosure control. IEEE Trans. on Knowl. and Data Eng., 14: 189–201, January
2002.
[9] J. Domingo-Ferrer and V. Torra. A critique of k-anonymity and some of its enhancements.
In: Proceedings of the 2008 Third International Conference on Availability, Reliability and
Security, pp. 990–993, 2008.
[10] B. C. M. Fung, K. Wang and P. S. Yu. Top-down specialization for information and privacy
preservation. In: Proceedings of the 21st International Conference on Data Engineering, pp.
205–216, 2005.
[11] V. S. Iyengar. Transforming data to satisfy privacy constraints. In: Proceedings of the
eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining,
pp. 279–288, 2002.
[12] L. V. S. Lakshmanan, R. T. Ng and G. Ramesh. To do or not to do: the dilemma of
disclosing anonymized data. In: Proceedings of the 2005 ACM SIGMOD International
Conference on Management of Data, pp. 61–72, 2005.
[13] K. LeFevre, D. J. DeWitt and R. Ramakrishnan. Incognito: efficient full-domain
kanonymity. In: Proceedings of the 2005 ACM SIGMOD international conference on Man-
agement of data, pp. 49–60, 2005.
[14] K. LeFevre, D. J. DeWitt and R. Ramakrishnan. Mondrian multidimensional k-anonymity.
In: Proceedings of the 22nd International Conference on Data Engineering, 2006.
[15] J. Li, Y. Tao and X. Xiao. Preservation of proximity privacy in publishing numerical
sensitive data. In: Proceedings of the 2008 ACM SIGMOD International Conference on
Management of Data, pp. 473–486, 2008.
[16] N. Li, T. Li and S. Venkatasubramanian. t-closeness: Privacy beyond k-anonymity
and l-diversity. In: Proceedings of the 21st International Conference on Data Engineering,
pp. 106–115, 2007.
[17] A. Machanavajjhala, D. Kifer, J. Gehrke and M. Venkitasubramaniam. ?-diversity: Privacy
beyond k-anonymity. In: Proceedings of International Conference on Data Engineering, 2006.
[18] A. Machanavajjhala, D. Kifer, J. Gehrke and M. Venkitasubramaniam. L-diversity: Privacy
beyond k-anonymity. ACM Trans. Knowl. Discov. Data, 1, March 2007.
[19] D. J. Martin, D. Kifer, A. Machanavajjhala, J. Gehrke and J. Y. Halpern. Worst-case
background knowledge in privacy. In: Proceedings of International Conference on Data
Engineering, pp. 126–135, 2007.
[20] A. Meyerson and R. Williams. On the complexity of optimal k-anonymity. In: Pr
oceedings
of the twenty-third ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database
Systems, pp. 223–228, 2004.
[21] P. Samarati. Protecting respondents’ identities in microdata release. IEEE Trans. on Knowl.
and Data Eng., 13: 1010–1027, November 2001.
[22] T. M. Truta and B. Vinay. Privacy protection: p-sensitive k-anonymity property. In:
Proceedings of the 22nd International Conference on Data Engineering Workshops, 2006.
[23] K. Wang, P. S. Yu and S. Chakraborty. Bottom-up generalization: A data mining solution
to privacy protection. In: Proceedings of the Fourth IEEE International Conference on Data
Mining, pages 249–256, 2004.
[24] W. E. Winkler. Using simulated annealing for k-anonymity, 2002.
[25] X. Xiao and Y. Tao. Anatomy: simple and effective privacy preservation. In: Proceedings
of the 32nd International Conference on Very Large Data Bases, pp. 139–150, 2006.
[26] C. Yao, X. S. Wang and S. Jajodia. Checking for k-anonymity violation by views. In:
Proceedings of the 31st international conference on Very large data bases, pp. 910–921, 2005.