1. Security-control methods for statistical databases: A comparative study;Adam;ACM Comput. Surv.,1989
2. Hippocratic databases;Agrawal,2002
3. Privacy-preserving data mining;Agrawal,2000
4. Studying genotype-phenotype attack on k-anonymised medical and genomic data;Baig,2009
5. Privacy, accuracy, and consistency too: A holistic solution to contingency table release;Barak,2007