Accepted articles here
Volume 18 Issue 2 Volume 18 Issue 1
Volume 17 Issue 3 Volume 17 Issue 2 Volume 17 Issue 1
Volume 16 Issue 3 Volume 16 Issue 2 Volume 16 Issue 1
Volume 15 Issue 3 Volume 15 Issue 2 Volume 15 Issue 1
Volume 14 Issue 3 Volume 14 Issue 2 Volume 14 Issue 1
Volume 13 Issue 3 Volume 13 Issue 2 Volume 13 Issue 1
Volume 12 Issue 3 Volume 12 Issue 2 Volume 12 Issue 1
Volume 11 Issue 3 Volume 11 Issue 2 Volume 11 Issue 1
Volume 10 Issue 3 Volume 10 Issue 2 Volume 10 Issue 1
Volume 9 Issue 3 Volume 9 Issue 2 Volume 9 Issue 1
Volume 8 Issue 3 Volume 8 Issue 2 Volume 8 Issue 1
Volume 7 Issue 3 Volume 7 Issue 2 Volume 7 Issue 1
Volume 6 Issue 3 Volume 6 Issue 2 Volume 6 Issue 1
Volume 5 Issue 3 Volume 5 Issue 2 Volume 5 Issue 1
Volume 4 Issue 3 Volume 4 Issue 2 Volume 4 Issue 1
Volume 3 Issue 3 Volume 3 Issue 2 Volume 3 Issue 1
Volume 2 Issue 3 Volume 2 Issue 2 Volume 2 Issue 1
Volume 1 Issue 3 Volume 1 Issue 2 Volume 1 Issue 1
Efficient Graph Based Approach to Large Scale Role Engineering
Dana Zhang, Kotagiri Ramamohanarao, Rui Zhang, Steven Versteeg
Transactions on Data Privacy 7:1 (2014) 1 - 26
Abstract, PDF
IdentiDroid: Android can finally Wear its Anonymous Suit
Bilal Shebaro, Oyindamola Oluwatimi, Daniele Midi, Elisa Bertino
Transactions on Data Privacy 7:1 (2014) 27 - 50
Combining Binary Classifiers for a Multiclass Problem with Differential Privacy
Vera Sazonova, Stan Matwin
Transactions on Data Privacy 7:1 (2014) 51 - 70