1: \begin{thebibliography}{10}
2:
3: \bibitem{aggarwal}
4: G.~Aggarwal, T.~Feder, K.~Kenthapadi, R.~Motwani, R.~Panigrahy, D.~Thomas, and
5: A.~Zhu.
6: \newblock {Anonymizing Tables}.
7: \newblock In {\em Proceedings of the International Conference on Database
8: Theory}, 2005.
9:
10: \bibitem{dilys}
11: R.~Agrawal, R.~Srikant, and D.~Thomas.
12: \newblock {Privacy Preserving OLAP}.
13: \newblock In {\em Proceedings of the ACM International Conference on Management
14: of Data}, 2005.
15:
16: \bibitem{haritsa}
17: S.~Agrawal and J.~Haritsa.
18: \newblock {A Framework for High-Accuracy Privacy-Preserving Mining}.
19: \newblock In {\em Proceedings of the International Conference on Data
20: Engineering}, 2005.
21:
22: \bibitem{backstrom}
23: L.~Backstrom, C.~Dwork, and J.~Kleinberg.
24: \newblock {Wherefore Art Thou R3579X? Anonymized Social Networks, Hidden
25: Patterns, and Structural Steganography}.
26: \newblock In {\em Proceedings of the International World Wide Web Conference},
27: 2007.
28:
29: \bibitem{srikant}
30: A.~Evfimievski, J.~Gehrke, and R.~Srikant.
31: \newblock {Limiting Privacy Breaches in Privacy Preserving Data Mining}.
32: \newblock In {\em Proceedings of the ACM Symposium on Principles of Database
33: Systems}, 2003.
34:
35: \bibitem{Frikken:06}
36: K.~B. Frikken and P.~Golle.
37: \newblock Private social network analysis: How to assemble pieces of a graph
38: privately.
39: \newblock In {\em Proceedings of the 5th ACM Workshop on Privacy in Electronic
40: Society}, pages 89--98, Alexandria, VA, 2006.
41:
42: \bibitem{miklau}
43: M.~Hay, G.~Miklau, D.~Jensen, D.~Towsley, and P.~Weis.
44: \newblock {Resisting Structural Identification in Anonymized Social Networks}.
45: \newblock In {\em Proceedings of the International Conference on Very Large
46: Data Bases}, 2008.
47:
48: \bibitem{korolova}
49: A.~Korolova, R.~Motwani, S.~U. Nabar, and Y.~Xu.
50: \newblock {Link Privacy in Social Networks}.
51: \newblock In {\em Proceedings of the International Conference on Data
52: Engineering}, 2008.
53:
54: \bibitem{lefevre}
55: K.~LeFevre, D.~J. DeWitt, and R.~Ramakrishnan.
56: \newblock Mondrian multidimensional k-anonymity.
57: \newblock In {\em Proceedings of the International Conference on Data
58: Engineering}, page~25, 2006.
59:
60: \bibitem{tclose}
61: N.~Li, T.~Li, and S.~Venkatasubramanian.
62: \newblock {$t$-Closeness: Privacy Beyond $k$-Anonymity and $l$-Diversity}.
63: \newblock In {\em Proceedings of the International Conference on Data
64: Engineering}, 2007.
65:
66: \bibitem{gehrke}
67: A.~Machanavajjhala, J.~Gehrke, D.~Kifer, and M.~Venkitasubramaniam.
68: \newblock {$l$-Diversity: Privacy Beyond $k$-Anonymity}.
69: \newblock In {\em Proceedings of the International Conference on Data
70: Engineering}, 2006.
71:
72: \bibitem{meyerson}
73: A.~Meyerson and R.~Williams.
74: \newblock On the complexity of optimal k-anonymity.
75: \newblock In {\em Proceedings of the ACM Symposium on Principles of Database
76: Systems}, 2004.
77:
78: \bibitem{papadimitrioucombinatorial}
79: C.~Papadimitriou and K.~Steiglitz.
80: \newblock {Combinatorial Optimization: Algorithms and Complexity}.
81: \newblock In {\em {Prentice-Hall}}, 1982.
82:
83: \bibitem{sweeney}
84: P.~Samarati and L.~Sweeney.
85: \newblock {Generalizing Data to Provide Anonymity when Disclosing Information}.
86: \newblock In {\em Proceedings of the ACM Symposium on Principles of Database
87: Systems}, 1998.
88:
89: \bibitem{schaefer78complexity}
90: T.~J. Schaefer.
91: \newblock {The Complexity of Satisfiability Problems}.
92: \newblock In {\em Proceedings of the Annual ACM Symposium on Theory of
93: Computing}, pages 216--226, 1978.
94:
95: \bibitem{xintao}
96: X.~Ying and X.~Wu.
97: \newblock Randomizing social networks: a spectrum preserving approach.
98: \newblock In {\em Proceedings of the SIAM Conference on Data Mining}, 2008.
99:
100: \bibitem{Zheleva:07}
101: E.~Zheleva and L.~Getoor.
102: \newblock Preserving the privacy of sensitive relationships in graph data.
103: \newblock In {\em Proceedings of the International Workshop on Privacy,
104: Security, and Trust in KDD}, San Jose, CA, August 2007.
105:
106: \bibitem{zhou08preserving}
107: B.~Zhou and J.~Pei.
108: \newblock {Preserving Privacy in Social Networks Against Neighborhood Attacks}.
109: \newblock In {\em Proceedings of the International Conference on Data
110: Engineering}, 2008.
111:
112: \end{thebibliography}
113: