\newcommand{\etalchar}[1]{$^{#1}$} \begin{thebibliography}{WMJH08} \bibitem[ABGP08]{Atzori08} Maurizio Atzori, Francesco Bonchi, Fosca Giannotti, and Dino Pedreschi. \newblock {Anonymity preserving pattern discovery}. \newblock {\em {VLDB JOURNAL}}, {17}({4}):{703--727}, {JUL} {2008}. \bibitem[BS08]{Brickell08} Justin Brickell and Vitaly Shmatikov. \newblock The cost of privacy: destruction of data-mining utility in anonymized data publishing. \newblock In {\em Proceeding of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining}, KDD '08, pages 70--78, New York, NY, USA, 2008. ACM. \bibitem[Dal77]{Dalenius77} T~Dalenius. \newblock {Towards a methodology for statistical disclosure control}. \newblock {\em {Statistik Tidskrift}}, {1977}. \bibitem[DFGN10]{Domingo10} Josep Domingo-Ferrer and Ursula Gonzalez-Nicolas. \newblock {Hybrid microdata using microaggregation}. \newblock {\em {INFORMATION SCIENCES}}, {180}({15}):{2834--2844}, {AUG 1} {2010}. \bibitem[FWCY10]{Fung10} Benjamin C.~M. Fung, Ke~Wang, Rui Chen, and Philip~S. Yu. \newblock {Privacy-Preserving Data Publishing: A Survey of Recent Developments}. \newblock {\em {ACM COMPUTING SURVEYS}}, {42}({4}), {JUN} {2010}. \bibitem[GT09]{Gionis09} Aristides Gionis and Tamir Tassa. \newblock {k-Anonymization with Minimal Loss of Information}. \newblock {\em {IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING}}, {21}({2}):{206--219}, {FEB} {2009}. \bibitem[Han06]{Hand06} DJ~Hand. \newblock {Protection or privacy? Data mining and personal data}. \newblock In {Ng, WK and Kitsuregawa, M and Li, J and Chang, K}, editor, {\em {ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS}}, volume {3918} of {\em {LECTURE NOTES IN ARTIFICIAL INTELLIGENCE}}, pages {1--10}. {2006}. \bibitem[HS10]{Hintogdlu10} Ayca~Azgin Hintogdlu and Yuecel Saygin. \newblock {Suppressing microdata to prevent classification based inference}. \newblock {\em {VLDB JOURNAL}}, {19}({3}):{385--410}, {JUN} {2010}. \bibitem[LDR08]{LeFevre08} Kristen LeFevre, David~J. DeWitt, and Raghu Ramakrishnan. \newblock {Workload-aware anonymization techniques for large-scale datasets}. \newblock {\em {ACM TRANSACTIONS ON DATABASE SYSTEMS}}, {33}({3}), {AUG} {2008}. \bibitem[LS09]{Li09} Xiao-Bai Li and Sumit Sarkar. \newblock {Against Classification Attacks: A Decision Tree Pruning Approach to Privacy Protection in Data Mining}. \newblock {\em {OPERATIONS RESEARCH}}, {57}({6}):{1496--1509}, {NOV-DEC} {2009}. \bibitem[MRM10]{Matatov10} Nissim Matatov, Lior Rokach, and Oded Maimon. \newblock {Privacy-preserving data mining: A feature set partitioning approach}. \newblock {\em {INFORMATION SCIENCES}}, {180}({14}):{2696--2720}, {JUL 15} {2010}. \bibitem[PS10]{Park10} Hyoungmin Park and Kyuseok Shim. \newblock {Approximate algorithms with generalizing attribute values for k-anonymity}. \newblock {\em {INFORMATION SYSTEMS}}, {35}({8}):{933--955}, {DEC} {2010}. \bibitem[TEM09]{Torra09} Vicenc Torra, Yasunori Endo, and Sadaaki Miyamoto. \newblock {ON THE COMPARISON OF SOME FUZZY CLUSTERING METHODS FOR PRIVACY PRESERVING DATA MINING: TOWARDS THE DEVELOPMENT OF SPECIFIC INFORMATION LOSS MEASURES}. \newblock {\em {KYBERNETIKA}}, {45}({3}):{548--560}, {2009}. \bibitem[VBF{\etalchar{+}}04]{Verykios04} VS~Verykios, E~Bertino, IN~Fovin, LP~Provenza, Y~Saygin, and Y~Theodoridis. \newblock {State-of-the-art in privacy preserving data mining}. \newblock {\em {SIGMOD RECORD}}, {33}({1}):{50--57}, {MAR} {2004}. \bibitem[WMJH08]{Wang08} Shyue-Liang Wang, Rajeev Maskey, Ayat Jafari, and Tzung-Pei Hong. \newblock {Efficient sanitization of informative association rules}. \newblock {\em {EXPERT SYSTEMS WITH APPLICATIONS}}, {35}({1-2}):{442--450}, {JUL-AUG} {2008}. \bibitem[WPJ07]{Wang07} Shyue-Liang Wang, Bhavesh Parikh, and Ayat Jafarl. \newblock {Hiding informative association rule sets}. \newblock {\em {EXPERT SYSTEMS WITH APPLICATIONS}}, {33}({2}):{316--323}, {AUG} {2007}. \bibitem[XZHW06]{Xu06} Shuting Xu, Jun Zhang, Dianwei Han, and Jie Wang. \newblock {Singular value decomposition based data distortion strategy for privacy protection}. \newblock {\em {KNOWLEDGE AND INFORMATION SYSTEMS}}, {10}({3}):{383--397}, {OCT} {2006}. \bibitem[ZLW09]{Zhu09} Dan Zhu, Xiao-Bai Li, and Shuning Wu. \newblock {Identity disclosure protection: A data reconstruction approach for privacy-preserving data mining}. \newblock {\em {DECISION SUPPORT SYSTEMS}}, {48}({1, Sp. Iss. SI}):{133--140}, {DEC} {2009}. \bibitem[ZZ07]{Zhang07} Nan Zhang and Wei Zhao. \newblock {Privacy-preserving data mining systems}. \newblock {\em {COMPUTER}}, {40}({4}):{52+}, {APR} {2007}. \end{thebibliography}