1. Bayardo RJ, Agrawal R (2005) Data privacy through optimal k-anonymization. In: Proceedings of ICDE 2005, Tokyo, April 2005
2. Bezzi M, De Capitani di Vimercati S, Foresti S, Livraga G, Samarati P, Sassi R (2012) Modeling and preventing inferences from sensitive value distributions in data release. J Comput Secur 20(4):393–436
3. Ciriani V, De Capitani di Vimercati S, Foresti S, Samarati P (2007) k-anonymity. In: Yu T, Jajodia S (eds) Secure data management in decentralized systems. Springer, Berlin
4. Ciriani V, De Capitani di Vimercati S, Foresti S, Samarati P (2007) Microdata protection. In: Yu T, Jajodia S (eds) Secure data management in decentralized systems. Springer, Berlin
5. Ciriani V, De Capitani di Vimercati S, Foresti S, Samarati P (2008) k-Anonymous data mining: a survey. In: Aggarwal C, Yu P (eds) Privacy-preserving data mining: models and algorithms. Springer, Berlin