1. Agarwal, R., Srikant, R., 2000. Privacy-preserving data mining. In: Proceedings of the ACM SIGMOD Conference on Management of Data. ACM Press, New York, May 2000, pp. 439–450.
2. Atallah, M., Bertino, E., Elmagarmid, A., Ibrahim, M., Verykios, V., 1999. Disclosure limitation of sensitive rules. In: Proceedings of 1999 IEEE Knowledge and Data Engineering Exchange Workshop (KDEX’99). Chicago, IL, November 1999, pp. 45–52.
3. Babaoglu, O., Meling, H., Montresor, A., 2001. Anthill: a framework for the development of agent-based peer-to-peer systems. Technical Report 9. Department of Computer Science, University of Bologna, November 2001.
4. Babcock, B., Babu, S., Datar, M., Motwani, R., Widom, J., 2002. Models and issues in data stream systems. In: Proceedings of the 21st ACM SIGMOD-SIGACT-SIGART Symposium on Principals of Database Systems (PODS), pp. 1–16.
5. Using sample size to limit exposure to data mining;Clifton;Journal of Computer Security,2000