2Bhavani Thuraisingham. Data Mining,National Security, Privacy and Civil Liberties[J]. SIGKDD Exploration, 2002, 4(2): 1-5.
3R Agrawal,R Srikant. Privacy Preserving Data Mining[A].Proc of the ACM SIGMOD Conf on Management of Data [C]. 2000.
4Y Lindell, B Pinkas. Privacy Preserving Data Mining[A].CRYPTO[C]. 2000.
5S J Rizvi,J R Haritsa. Maintaining Data Privacy in Association Rule Mining[A]. Proc of the 28th Int'l Conf on Very Large Data Bases[C]. 2002.
6林瑜.八成网民安装防火墙软件保护隐私[N].通信信息报,200212.5.
7Abdehnounaam Rezgui, Athman Bouguettaya, Mohamed Y Eltoweissy. Privacy on the Web: Facts,Challenges, and Solutions[J]. IEEE Security & Privacy, 2003,40-49.
8Ian Goldberg. Privacy-Enhancing Technologies for the Internet Ⅱ:Five Years Later[C]. LNCS 2482, 2003.1-12.
9Vanja Senicar, Borka Jerman-Blazic, Tomaz Klobuear. Privacy-Enhancing Technologies Approaches and Development [J]. Computer Standards & Interfaces, 2003,25:147-158.
10D M Kristol. HTTP Cookies: Standards, Privacy, and Politics [J].ACM Trans. Internet Technology, 2001,1(2):151-198.