
372
Big Data: Storage, Sharing, and Security
6. Craig Gentry et al. Fully homomorphic encryption using ideal lattices. In STOC, Bethesda,
MD, volume 9, pp. 169–178, 2009.
7. D Kifer, J Gehrke, A Machanavajjhala, and M Venkitasubramaniam. -diversity: Privacy
beyond k-anonymity. In ACM Transactions on Knowledge Discovery from Data, volume 1,
article no.3. ACM, New York, 2007.
8. Kristen LeFevre, David J. DeWitt, and Raghu Ramakrishnan. Incognito: Efficient full-
domain k-anonymity In Proceedings of the 2005 ACM SIGMOD International Conference
on Management of Data, pp. 49–60. ACM, New York, 2005.
9. Yehuda Lindell and Benny Pinkas. Privacy preserving ...