• access and query privacy
  • anonymization and transparency
  • crowdsourcing for privacy and security
  • data correlation and leakage attacks
  • data and computations integrity in emerging scenarios
  • electronic communication privacy
  • electronic communication privacy
  • information dissemination control
  • insider-threat protection
  • models, languages, and techniques for big data protection
  • anonymization of text, unstructured data and multimedia
  • anonymization of longitudinal data and streams
  • statistical disclosure control
  • theory of data anonymization
  • privacy models
  • network privacy
  • personally identifiable information
  • privacy-aware access control
  • privacy and anonymity on the Web
  • privacy in big data
  • privacy in biometric systems
  • privacy in cloud and grid systems
  • privacy and data mining
  • privacy in the digital business
  • privacy in the Internet of Things
  • privacy enhancing technologies
  • privacy in health care and public administration
  • privacy and human rights
  • privacy metrics
  • privacy in mobile systems
  • privacy in outsourced scenarios
  • privacy in sensor networks
  • privacy in surveillance systems
  • privacy policies
  • privacy of provenance data
  • privacy in social networks
  • privacy threats
  • privacy and virtual identity
  • user privacy
  • wireless privacy