Privacy and identity management -- Security and risk management -- Security requirements and development -- Privacy enhancing technologies and privacy management -- Access control models -- Trust and reputation -- Security protocols -- Security and privacy in mobile environments