5Samarati P, Sweency L.Generalizing data to provide anonymity when disclosing information(abstract)[C]//Proc of the 17th ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems.New York:ACM Press, 1998.
6Sweeney L.K-anonymity:a model for protecting privacy[J].International Journal of Uncertainty, Fuzziness and Knowledge-based Systems, 2002,10 (5) : 557-570.
7Sweeney L.Achieving k-anonymity privacy protection using generalization and suppression[J].Intemational Journal on Uncertainty,Fuzziness and Knowledge-based Systems,2002,10(5) :571-588.
8Lefevre K,Dewittd J,Ramakrishnan R.Incognito:efficient full-domain k-anonymity[C]//Proc of the 2005 ACM SIGMOD International Conference on Management of Data.New York: ACM Press, 2005 :49-60.
9Fung B,Wang Ke,Yu ETop-down specialization for information and privacy preservation[C]//Proc of the 21st IEEE International Conference on Data Engineering.Washington DC: IEEE Computer Society, 2005 : 205-216.
10Wang Ke,Yu P,Chakraborty S.Bottom-up generalization:a data mining solution to privacy protection[C]//Proc of the 4th IEEE International Conference on Data Mining.Washington DC: 1EEE Computer Society, 2004: 249-256.