1Blake C,Merz C.UCI Repository of Machine Learning Databases[EB/OL].(1998-11-15).http://www.ics.uci.edu/-mlearn/M1-Repository.html..
2Iyengar V.Transforming Data to Satisfy Privacy Constraints[C]//Proc.of the ACM SIGKDD.USA:[s.n.],2002:279-287.
3Willenborg L,DeWaal T.Elements of Statistical Disclosure Control[M].NT:Springer Verlag,2000.
4Sweeney L.Achieving K-anonymity Privacy Protection Using Generalization snd Suppression[J].Journal on Uncertainty,Fuzziness,and Knowledge-based Systems,2002,10(5):571-588.
5LeFevre K,DeWitt D,Ramakrishnan R.Mondrian Multidimensional K-anonymity[C]//Proc.of the 22nd International Symposium on Data Engineering.USA:[s.n.],2006
6Guttman A R.R-trees:A Dynamic Index Structure for Spatial Searching[C]//Proc.of ACM SIGMOD.USA:[s.n.],1984:47-57.