4ARRAWAL R, BAYARDO R, FALOUTSOS C, et al. Auditing compliance with a Hippocratic database[ C ]//Proc of International Conference on Very Large Data Bases. San Fransisco:Morgan Kaufmann, 2004:516- 527.
5LEFEVRE K, AGRAWAL R. Limiting disclosure in Hippocratic databases [ C ]//Proc of International Conference on Very Large Data Bases. San Fransisco : Morgan Kaufmann, 2004 : 108- 119.
6MACHANAVAJJHALA A, GEHRKE J. On the efficiency of checking perfect privacy[ C ]//Proc of ACM Symposium on Principles Database Systems. New York : ACM Press, 2006 : 163- 172.
7MOTWANI R, NABHA S, THOMAS D. Auditing batches of SQL queries[ C ]//Proc of PDM Workshop with ICDE. Washington DC : IEEE Computer Society, 2007 : 186- 191.
8NABAR S, MARTHI B, KENTHAPADI K, et al. Towards robustness in query auditing[C]//Proc of VLDB. New York: ACM Press, 2006:151- 126.
9THOMAS D. Algorithms and architectures for data privacy [ D ]. Standford : Department of Computer Science, Stanford University, 2007.
10CHAWLA S, DWORK C, MCSHERRY F, et al. Toward privacy in public databases [ C ]//Proc of the 2nd Theory of Cryptography Conference. Berlin : Springer, 2005:363- 385.