1. Security-control methods for statistical databases: a comparative study;Adam;ACM Computing Surveys,1989
2. Approximation algorithm for k-anonymity;Aggarwal;Journal of Privacy Technology,2005
3. Atallah, M., Bertino, E., Elmagarmid, A., Ibrahim, M., Verykios, V., 1999. Disclosure limitation of sensitive rules. In: Proceedings of 1999 Workshop on Knowledge and Data Engineering Exchange, Chicage, IL, November 1999, pp. 45–52.
4. An improvement of the minimum distortion encoding algorithm for vector quantization;Bei;IEEE Transactions on Communications,1985
5. Brand, R., Domingo-Ferrer, J., Mateo-Sanz, J.M., 2006. Reference data sets to test and compare SDC methods for protection of numerical microdata, European Project IST-2000-25069 CASC, 2002. Available at: (accessed 28.06.06).