1. Krzysztof R. Apt (2003): Principles of constraint programming. Cambridge University Press.
  2. Alan Beaulieu (2009): Learning SQL - Master SQL Fundamentals (2. ed.). O'Reilly.
  3. Marco Stronati Catuscia Palamidessi (2012): Differential Privacy for Relational Algebra: improving the sensitivity bound via constraints systems.. Available at Full Version..
  4. E. F. Codd (1970): A Relational Model of Data for Large Shared Data Banks. Communications of the ACM 13(6), pp. 377–387.
  5. E. F. Codd (1972): Relational Completeness of Database Sublanguages. In: R. Rustin: Data Base Systems. Prentice-Hall, New Jersey.
  6. Cynthia Dwork (2006): Differential Privacy. In: Proc. of ICALP, LNCS 4052. Springer, pp. 1–12. Available at
  7. Cynthia Dwork (2008): Differential Privacy: A Survey of Results.. In: TAMC, pp. 1–19. Available at
  8. Cynthia Dwork (2011): A Firm Foundation for Private Data Analysis. Communications of the ACM 54(1), pp. 86–96. Available at
  9. Cynthia Dwork & Jing Lei (2009): Differential Privacy and Robust Statistics. In: Proc. of STOC. ACM, pp. 371–380. Available at
  10. Cynthia Dwork, Frank McSherry, Kobbi Nissim & Adam Smith (2006): Calibrating Noise to Sensitivity in Private Data Analysis.. In: TCC, pp. 265–284. Available at
  11. Frank McSherry (2009): Privacy integrated queries: an extensible platform for privacy-preserving data analysis.. In: SIGMOD Conference, pp. 19–30. Available at
  12. Jason Reed & Benjamin C. Pierce (2010): Distance makes the types grow stronger: a calculus for differential privacy.. In: ICFP, pp. 157–168. Available at

Comments and questions to:
For website issues: