0810.5578/ga.bbl
1: \begin{thebibliography}{10}
2: 
3: \bibitem{aggarwal}
4: G.~Aggarwal, T.~Feder, K.~Kenthapadi, R.~Motwani, R.~Panigrahy, D.~Thomas, and
5:   A.~Zhu.
6: \newblock {Anonymizing Tables}.
7: \newblock In {\em Proceedings of the International Conference on Database
8:   Theory}, 2005.
9: 
10: \bibitem{dilys}
11: R.~Agrawal, R.~Srikant, and D.~Thomas.
12: \newblock {Privacy Preserving OLAP}.
13: \newblock In {\em Proceedings of the ACM International Conference on Management
14:   of Data}, 2005.
15: 
16: \bibitem{haritsa}
17: S.~Agrawal and J.~Haritsa.
18: \newblock {A Framework for High-Accuracy Privacy-Preserving Mining}.
19: \newblock In {\em Proceedings of the International Conference on Data
20:   Engineering}, 2005.
21: 
22: \bibitem{backstrom}
23: L.~Backstrom, C.~Dwork, and J.~Kleinberg.
24: \newblock {Wherefore Art Thou R3579X? Anonymized Social Networks, Hidden
25:   Patterns, and Structural Steganography}.
26: \newblock In {\em Proceedings of the International World Wide Web Conference},
27:   2007.
28: 
29: \bibitem{srikant}
30: A.~Evfimievski, J.~Gehrke, and R.~Srikant.
31: \newblock {Limiting Privacy Breaches in Privacy Preserving Data Mining}.
32: \newblock In {\em Proceedings of the ACM Symposium on Principles of Database
33:   Systems}, 2003.
34: 
35: \bibitem{Frikken:06}
36: K.~B. Frikken and P.~Golle.
37: \newblock Private social network analysis: How to assemble pieces of a graph
38:   privately.
39: \newblock In {\em Proceedings of the 5th ACM Workshop on Privacy in Electronic
40:   Society}, pages 89--98, Alexandria, VA, 2006.
41: 
42: \bibitem{miklau}
43: M.~Hay, G.~Miklau, D.~Jensen, D.~Towsley, and P.~Weis.
44: \newblock {Resisting Structural Identification in Anonymized Social Networks}.
45: \newblock In {\em Proceedings of the International Conference on Very Large
46:   Data Bases}, 2008.
47: 
48: \bibitem{korolova}
49: A.~Korolova, R.~Motwani, S.~U. Nabar, and Y.~Xu.
50: \newblock {Link Privacy in Social Networks}.
51: \newblock In {\em Proceedings of the International Conference on Data
52:   Engineering}, 2008.
53: 
54: \bibitem{lefevre}
55: K.~LeFevre, D.~J. DeWitt, and R.~Ramakrishnan.
56: \newblock Mondrian multidimensional k-anonymity.
57: \newblock In {\em Proceedings of the International Conference on Data
58:   Engineering}, page~25, 2006.
59: 
60: \bibitem{tclose}
61: N.~Li, T.~Li, and S.~Venkatasubramanian.
62: \newblock {$t$-Closeness: Privacy Beyond $k$-Anonymity and $l$-Diversity}.
63: \newblock In {\em Proceedings of the International Conference on Data
64:   Engineering}, 2007.
65: 
66: \bibitem{gehrke}
67: A.~Machanavajjhala, J.~Gehrke, D.~Kifer, and M.~Venkitasubramaniam.
68: \newblock {$l$-Diversity: Privacy Beyond $k$-Anonymity}.
69: \newblock In {\em Proceedings of the International Conference on Data
70:   Engineering}, 2006.
71: 
72: \bibitem{meyerson}
73: A.~Meyerson and R.~Williams.
74: \newblock On the complexity of optimal k-anonymity.
75: \newblock In {\em Proceedings of the ACM Symposium on Principles of Database
76:   Systems}, 2004.
77: 
78: \bibitem{papadimitrioucombinatorial}
79: C.~Papadimitriou and K.~Steiglitz.
80: \newblock {Combinatorial Optimization: Algorithms and Complexity}.
81: \newblock In {\em {Prentice-Hall}}, 1982.
82: 
83: \bibitem{sweeney}
84: P.~Samarati and L.~Sweeney.
85: \newblock {Generalizing Data to Provide Anonymity when Disclosing Information}.
86: \newblock In {\em Proceedings of the ACM Symposium on Principles of Database
87:   Systems}, 1998.
88: 
89: \bibitem{schaefer78complexity}
90: T.~J. Schaefer.
91: \newblock {The Complexity of Satisfiability Problems}.
92: \newblock In {\em Proceedings of the Annual ACM Symposium on Theory of
93:   Computing}, pages 216--226, 1978.
94: 
95: \bibitem{xintao}
96: X.~Ying and X.~Wu.
97: \newblock Randomizing social networks: a spectrum preserving approach.
98: \newblock In {\em Proceedings of the SIAM Conference on Data Mining}, 2008.
99: 
100: \bibitem{Zheleva:07}
101: E.~Zheleva and L.~Getoor.
102: \newblock Preserving the privacy of sensitive relationships in graph data.
103: \newblock In {\em Proceedings of the International Workshop on Privacy,
104:   Security, and Trust in KDD}, San Jose, CA, August 2007.
105: 
106: \bibitem{zhou08preserving}
107: B.~Zhou and J.~Pei.
108: \newblock {Preserving Privacy in Social Networks Against Neighborhood Attacks}.
109: \newblock In {\em Proceedings of the International Conference on Data
110:   Engineering}, 2008.
111: 
112: \end{thebibliography}
113: