Attack Models and Privacy Models