\relax \citation{Wang08} \citation{Zhang07} \citation{Hintogdlu10,Li09,Atzori08,Hand06} \@writefile{toc}{\contentsline {section}{\numberline {1}Introduction}{1}} \newlabel{introduction}{{1}{1}} \citation{Fung10} \citation{Domingo10} \citation{LeFevre08} \@writefile{toc}{\contentsline {section}{\numberline {2}What is PPDP?}{2}} \citation{Fung10} \citation{Dalenius77} \citation{Fung10} \citation{Fung10} \@writefile{toc}{\contentsline {section}{\numberline {3}Why is PPDP important?}{3}} \@writefile{toc}{\contentsline {section}{\numberline {4}What is considered a breach of privacy?}{3}} \citation{Brickell08} \citation{Wang07} \citation{Fung10} \citation{Fung10} \@writefile{toc}{\contentsline {section}{\numberline {5}What are the methods used to avoid privacy breaches?}{4}} \citation{Fung10} \citation{Verykios04} \citation{Park10} \citation{Brickell08} \citation{Park10,Matatov10,Zhu09} \citation{Fung10} \citation{Zhang07} \@writefile{toc}{\contentsline {subsection}{\numberline {5.1}Generalization and suppression}{5}} \@writefile{toc}{\contentsline {subsection}{\numberline {5.2}Anatomization and permutation}{5}} \citation{Fung10} \citation{Torra09} \citation{Torra09} \citation{Torra09} \@writefile{toc}{\contentsline {subsection}{\numberline {5.3}Perturbation}{6}} \@writefile{toc}{\contentsline {section}{\numberline {6}How are privacy preserving algorithms evaluated?}{6}} \@writefile{toc}{\contentsline {section}{\numberline {7}Conclusions and Future Work}{7}} \newlabel{conclusion}{{7}{7}} \bibstyle{alpha} \bibdata{myrefs.bib} \bibcite{Atzori08}{ABGP08} \bibcite{Brickell08}{BS08} \bibcite{Dalenius77}{Dal77} \bibcite{Domingo10}{DFGN10} \bibcite{Fung10}{FWCY10} \bibcite{Gionis09}{GT09} \bibcite{Hand06}{Han06} \bibcite{Hintogdlu10}{HS10} \bibcite{LeFevre08}{LDR08} \bibcite{Li09}{LS09} \bibcite{Matatov10}{MRM10} \bibcite{Park10}{PS10} \bibcite{Torra09}{TEM09} \bibcite{Verykios04}{VBF{$^{+}$}04} \bibcite{Wang08}{WMJH08} \bibcite{Wang07}{WPJ07} \bibcite{Xu06}{XZHW06} \bibcite{Zhu09}{ZLW09} \bibcite{Zhang07}{ZZ07}