Summary
Describes the privacy modeling mechanisms to be provided, how to use them and also the techniques and tools to apply protection techniques that can enforce these models.
More information & hyperlinks