|
[1]M. Atallah, E. Bertino, A. Elmagarmid, M. Ibrahim, and V. Verykios, “Disclosure limitation of sensitive rules,” Proceedings of 1999 IEEE Knowledge and Data Engineering Exchange Workshop (KDEX''99), 1999, pp. 45-52. [2]J. Domingo-Ferrer, A. Martínez-Ballesté, J.M. Mateo-Sanz, and F. Sebé, “Efficient multivariate data-oriented microaggregation,” VLDB Journal, vol. 15, no. 4, 2006, pp. 355-369. [3]P. Doyle, Confidentiality, Disclosure, and Data Access : Theory and Practical Application for Statistical Agencies, North Holland, 2001. [4]L. Willenborg, and T.D. Waal, “Elements of statistical disclosure control,” Lecture Notes in Statistics, vol. 155, 2001. [5]L. Sweeney, “K-anonymity: A model for protecting privacy,” International Journal of Uncertainty, Fuzziness and Knowlege-Based Systems, vol. 10, no. 5, 2002, pp. 557-570. [6]J. Domingo-Ferrer, and J.M. Mateo-Sanz, “Practical data-oriented microaggregation for statistical disclosure control,” IEEE Transactions on Knowledge and Data Engineering, vol. 14, no. 1, 2002, pp. 189-201. [7]J. Domingo-Ferrer, and V. Torra, “Ordinal, continuous and heterogeneous k-anonymity through microaggregation,” Data Mining and Knowledge Discovery, vol. 11, no. 2, 2005, pp. 195-212. [8]A. Solanas, F. Sebé, and J. Domingo-Ferrer, “Micro-aggregation-based heuristics for p-sensitive k-anonymity: One step beyond,” International Workshop on Privacy and Anonymity in the Information Society (PAIS), 2008. [9]S.L. Hansen, and S. Mukherjee, “A polynomial algorithm for optimal univariate microaggregation,” IEEE Transactions on Knowledge and Data Engineering, vol. 15, no. 4, 2003, pp. 1043-1044. [10]A. Oganian, and J. Domingo-Ferrer, “On the complexity of optimal microaggregation for statistical disclosure control,” Statistical J, vol. 18, no. 4, 2000, pp. 345-354. [11]C.C. Chang, Y.C. Li, and W.H. Huang, “TFRP: An efficient microaggregation algorithm for statistical disclosure control,” Journal of Systems and Software, vol. 80, no. 11, 2007, pp. 1866-1878. [12]M. Laszlo, and S. Mukherjee, “Minimum spanning tree partitioning algorithm for microaggregation,” IEEE Transactions on Knowledge and Data Engineering, vol. 17, no. 7, 2005, pp. 902-911. [13]E.H. Ruspini, “Hierarchical grouping to optimize an objective function,” J Am Statist Assoc, vol. 58, 1969, pp. 236-244. [14]J. Domingo-Ferrer, and V. Torra, “Fuzzy microaggregation for microdata protection,” Journal of Advanced Computational Intelligence and Intelligent Informatics, vol. 7, no. 2, 2003, pp. 153-159. [15]J. Bezdek, Pattern Recognition with Fuzzy Objective Function Algorithm, Kluwer Academic Publishers, 1981. [16]C.T. Zahn, “Graph-theoretical methods for detecting and describing gestalt clusters,” IEEE Transactions on Computers, vol. C-20, no. 1, 1971, pp. 68-86. [17]A. Solanas, A. Martínez-Ballesté, J.M. Mateo-Sanz, and J. Domingo-Ferrer, “Multivariate microaggregation based genetic algorithms,” IEEE Intelligent Systems, 2006, pp. 65-70. [18]A. Martínez-Ballesté, A. Solanas, J. Domingo-Ferrer, and J.M. Mateo-Sanz, “A genetic approach to multivariate microaggregation for database privacy,” Proceedings - International Conference on Data Engineering, 2007, pp. 180-185. [19]J. Domingo-Ferrer, “Advances in inference control in statistical database: an overview,” Lecture Notes in Computer Sciences 3050 - CASC Project Intl. Workshop on Privacy in Statistical Database (PSD 2004), 2004, pp. 1-7. [20]C.C. Chiu, and C.Y. Tsai, “A k-anonymity clustering method for effective data privacy preservation,” Lecture Notes in Artificial Intelligence, Vol. 4632, 2007, pp. 89-99. [21]A. Asuncion, and D.J. Newman, “UCI Repository of machine learning databases,” 2007, available at http://www.ics.uci.edu/~mlearn/MLRepository.html. [22]I.H. Witten, and E. Frank, Data Mining: Practical Machine Learning Tools and Techniques, Morgan Kaufmann, 2005. [23]A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam, “l-diversity: Privacy beyond k-anonymity,” Proceedings of the 22nd IEEE International Conference on Data Engineering, 2006. [24]L. Ninghui, L. Tiancheng, and S. Venkatasubramanian, “t-Closeness: Privacy beyond k-anonymity and l-diversity,” Proceedings - International Conference on Data Engineering, 2007, pp. 106-115. [25]R.C.W. Wong, J. Li, A.W.C. Fu, and K. Wang, “(?, k)-anonymity: An enhanced k-anonymity model for privacy-preserving data publishing,” Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2006, pp. 754-759.
|