1. Security-control methods for statistical databases: a comparison study;Adam;ACM Comput. Surv.,1989
2. Data Mining: The Textbook;Aggarwal,2015
3. Agrawal, R., Srikant, R., 2000. Privacy-Preserving Data Mining. In: Proc. of the 2000 ACM SIGMOD International Conference on Management of Data, pages 439–450, Dallas, Texas.
4. Dare to share: protecting sensitive knowledge with data sanitization;Amiri;Decision Support Sys.,2007
5. Atallah, M., Bertino, E., Elmagarmid, A., Ibrahim, M., Verykios, V., 1999. Disclosure limitation of sensitive rules. In Proc. Workshop Knowl. Data Eng. Exchange (KDEX), pp. 45–52.