1 Ninghui Li, "t-closeness:Privacy beyond k-anonymity and l-diversity" 106-115, 2007
2 Latanya Sweeney, "k-anonymity: A model for protecting privacy" 10 (10): 557-570, 2002
3 Bhavani Thuraisingham, "Security and privacy for multimedia database management systems" 33 (33): 13-29, 2007
4 Gábor Bergmann, "Querybased access control for secure collaborative modeling using bidirectional transformations" ACM 351-361, 2016
5 Anand Kumar, "Query monitoring and analysis for database privacy-a security automata model approach" Springer 458-472, 2015
6 Cándido Caballero-Gil, "Providing k-anonymity and revocation in ubiquitous vanets" 36 : 482-494, 2016
7 P. Samarati, "Protecting respondents identities in microdata release" Institute of Electrical and Electronics Engineers (IEEE) 13 (13): 1010-1027, 2001
8 Pierangela Samarati, "PrOtecting Privacy When Disclosing Information: K-Anonymity and Its Enforcement Through Generalization and Suppression" SRI International 1998
9 Wei Wang, "Outsourcing high-dimensional healthcare data to cloud with personalized privacy preservation" 88 : 136-148, 2015
10 Salman Iqbal, "On cloud security attacks : a taxonomy and intrusion detection and prevention as a service" 74 : 98-120, 2016
1 Ninghui Li, "t-closeness:Privacy beyond k-anonymity and l-diversity" 106-115, 2007
2 Latanya Sweeney, "k-anonymity: A model for protecting privacy" 10 (10): 557-570, 2002
3 Bhavani Thuraisingham, "Security and privacy for multimedia database management systems" 33 (33): 13-29, 2007
4 Gábor Bergmann, "Querybased access control for secure collaborative modeling using bidirectional transformations" ACM 351-361, 2016
5 Anand Kumar, "Query monitoring and analysis for database privacy-a security automata model approach" Springer 458-472, 2015
6 Cándido Caballero-Gil, "Providing k-anonymity and revocation in ubiquitous vanets" 36 : 482-494, 2016
7 P. Samarati, "Protecting respondents identities in microdata release" Institute of Electrical and Electronics Engineers (IEEE) 13 (13): 1010-1027, 2001
8 Pierangela Samarati, "PrOtecting Privacy When Disclosing Information: K-Anonymity and Its Enforcement Through Generalization and Suppression" SRI International 1998
9 Wei Wang, "Outsourcing high-dimensional healthcare data to cloud with personalized privacy preservation" 88 : 136-148, 2015
10 Salman Iqbal, "On cloud security attacks : a taxonomy and intrusion detection and prevention as a service" 74 : 98-120, 2016
11 Y Kumar Jain, "Min max normalization based data perturbation method for privacy protection" 2 (2): 45-50, 2011
12 Ashwin Machanavajjhala, "L-diversity: privacy beyond k-anonymity" 1 (1): 2007
13 Pierangela Samarati, "International School on Foundations of Security Analysis and Design" Springer 137-196, 2000
14 Muhamed Turkanovic, "Inference attacks and control on database structures" 4 (4): 3-, 2015
15 Mohammad Saiful Islam, "Inference attack against encrypted range queries on outsourced databases" ACM 235-246, 2014
16 Jordi Soria-Comas, "Enhancing data utility in differential privacy via microaggregation-based k k-anonymity" 23 (23): 771-794, 2014
17 Tamer E Abuelsaad, "Data perturbation and anonymization using one way hash"
18 Raymond W Yip, "Data level inference detection in database systems" IEEE 179-189, 1998
19 Zhipeng Cai, "Collective datasanitization for preventing sensitive information inference attacks in social networks" 2016
20 Tania Basso, "Challenges on anonymity, privacy, and big data" IEEE 164-171, 2016
21 Ben Niu, "Achieving kanonymity in privacy-aware location-based services" IEEE 754-762, 2014
22 Zahid Pervaiz, "Accuracy-constrained privacy-preserving access control mechanism for relational data" 26 (26): 795-807, 2014
23 Khaled El Emam, "A globally optimal k-anonymity method for the de-identification of health data" 16 (16): 670-682, 2009
24 Adeela Waqar, "A framework for preservation of cloud users data privacy using dynamic reconstruction of metadata" 36 (36): 235-248, 2013