Match!
Stefanos Gritzalis
University of the Aegean
Information privacyComputer networkComputer securityComputer sciencePrivacy software
312Publications
31H-index
3,581Citations
What is this?
Publications 318
Newest
#1Katsikas SH-Index: 3
#2Frédéric CuppensH-Index: 1
view all 14 authors...
Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2019) -- Security and Privacy Requirements Engineering (SECPRE 2019) -- Security, Privacy, Organizations, and Systems Engineering (SPOSE 2019) -- Attacks and Defenses for Internet-of-Things (ADIoT 2019).
The application of the General Data Protection Regulation (GDPR) 2016/679/EC, the Regulation for the protection of personal data, is a challenge and must be seen as an opportunity for the redesign of the systems that are being used for the processing of personal data. An unexplored area where systems are being used to collect and process personal data are the e-Participation environment. The latest generations of such environments refer to sociotechnical systems based on the exploitation of the ...
Source
#1Angeliki Kitsiou (University of the Aegean)H-Index: 1
#2Eleni Tzortzaki (University of the Aegean)H-Index: 1
Last. Stefanos Gritzalis (University of the Aegean)H-Index: 31
view all 4 authors...
Abstract Adaptive privacy and its preservation within Cloud Computing Environments is an emerging issue in contemporary societies. However, the inability of the existing privacy systems in Cloud to provide an adequate adaptive privacy framework associated with users' social and technological boundaries has been highlighted in previous literature. In order to address that issue, this chapter aims at highlighting the Adaptive Privacy Aware Cloud-based Systems (APACS) as an emerging interdisciplina...
Source
#1Maria Sideri (University of the Aegean)H-Index: 1
Last. Stefanos Gritzalis (UniPi: University of Piraeus)H-Index: 31
view all 3 authors...
Technological developments have led to tools for collecting personal data in a volume and form that in the past would have been difficult to gather. This creates new opportunities for public and private sector agencies to store and process personal data for a variety of purposes, while it also produces risks for data subjects regarding data protection and privacy. In this frame, the General Data Protection Regulation (GDPR) focuses on enhancing data subjects’ rights in order to increase their co...
Source
#1Stavros Simou (University of the Aegean)H-Index: 3
#2Christos Kalloniatis (University of the Aegean)H-Index: 13
Last. Vasilis Katos (BU: Bournemouth University)H-Index: 1
view all 4 authors...
The design and implementation of cloud services, without taking under consideration the forensic requirements and the investigation process, makes the acquisition and examination of data, complex and demanding. The evidence gathered from the cloud may not become acceptable and admissible in the court. A literature gap in supporting software engineers so as to elicit and model forensic-related requirements exists. In order to fill the gap, software engineers should develop cloud services in a for...
Source
#1Panagiotis Rizomiliotis (UoA: National and Kapodistrian University of Athens)H-Index: 11
#2Stefanos Gritzalis (UniPi: University of Piraeus)H-Index: 31
Searchable Symmetric Encryption (SSE) is a mechanism that facilitates search over encrypted data that is outsourced to an untrusted Server. SSE schemes offer practicality at the expense of some information leakage. The last two years, the first dynamic SSE (DSSE) schemes, i.e. schemes that support updates, that are both forward and backward private, were introduced. Two lines of design have been proposed. The first one contains the schemes that use an oblivious data structure, i.e. the Client hi...
Source
#2Angeliki KitsiouH-Index: 1
Last. Stefanos GritzalisH-Index: 31
view all 5 authors...
Nowadays, location-sharing applications (LSA) within social media enable users to share their location information at different levels of precision. Users on their side are willing to disclose this kind of information in order to represent themselves in a socially acceptable online way. However, they express privacy concerns regarding potential malware location-sharing applications, since users’ geolocation information can provide affiliations with their social identity attributes that enable th...
Source
#1Athanasia Routzouni (University of the Aegean)
#2Athanasios P. Deligiannis (International Hellenic University)
Last. Stefanos Gritzalis (University of the Aegean)H-Index: 31
view all 4 authors...
This paper maps the participatory process applied during the development of open government commitments by twenty-nine Open Government Partnership countries. It investigates the role and perceived value of e-participation practices and their relationship to inclusive interaction with stakeholders. The insights of the paper on the perceived value of the tools and methods used and the main impediments to the open government commitment creation process may help governments more effectively design t...
Source
#1Stavros Simou (University of the Aegean)H-Index: 3
#2Christos Kalloniatis (University of the Aegean)H-Index: 13
Last. Vasilios Katos (BU: Bournemouth University)H-Index: 11
view all 4 authors...
Cloud computing is used by consumers to access cloud services. Malicious actors exploit vulnerabilities of cloud services to attack consumers. The link between these two assumptions is the cloud service. Although cloud forensics assists in the direction of investigating and solving cloud-based cyber-crimes, in many cases the design and implementation of cloud services fall back. Software designers and engineers should focus their attention on the design and implementation of cloud services that ...
1 CitationsSource
#1Maria SideriH-Index: 1
#2Angeliki KitsiouH-Index: 1
Last. Stefanos GritzalisH-Index: 31
view all 5 authors...
Purpose Even though social media are nowadays used in the frame of public governance to ensure citizens’ major participation, enhance e-dialogue and e-democracy consequently, this utilization has not been expanded yet in the field of education, whose key role focuses on the cultivation of active citizenship, as it is promoted through participation. The purpose of this paper is to examine leadership’s views of Greek Secondary and Tertiary Education on the potential use of social media for partici...
Source
12345678910