Costas Lambrinoudakis

According to our database1, Costas Lambrinoudakis authored at least 95 papers between 1991 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Security and Privacy Issues for Intelligent Cloud-Based Health Systems.
Proceedings of the Advanced Computational Intelligence in Healthcare - 7, 2020

Compatibility of a Security Policy for a Cloud-Based Healthcare System with the EU General Data Protection Regulation (GDPR).
Inf., 2020

Utilizing a privacy impact assessment method using metrics in the healthcare sector.
Inf. Comput. Secur., 2020

GDPR compliance: proposed technical and organizational measures for cloud provider.
Inf. Comput. Secur., 2020

Microtargeting or Microphishing? Phishing Unveiled.
Proceedings of the Trust, Privacy and Security in Digital Business, 2020

Cloud Computing Framework for e-Health Security Requirements and Security Policy Rules Case Study: A European Cloud-Based Health System.
Proceedings of the Trust, Privacy and Security in Digital Business, 2020

GDPR Compliance: Proposed Guidelines for Cloud-Based Health Organizations.
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020

Aligning the Concepts of Risk, Security and Privacy Towards the Design of Secure Intelligent Transport Systems.
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020

Testing And Hardening IoT Devices Against the Mirai Botnet.
Proceedings of the 2020 International Conference on Cyber Security and Protection of Digital Services, 2020

A NIS Directive Compliant Cybersecurity Maturity Assessment Framework.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

2019
Fault Prediction Model for Node Selection Function of Mobile Networks.
Proceedings of the 9th International Conference on Information Communication and Management, 2019

Towards the Creation of a Threat Intelligence Framework for Maritime Infrastructures.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

A Proposed Privacy Impact Assessment Method Using Metrics Based on Organizational Characteristics.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

GDPR Compliance: Proposed Technical and Organizational Measures for Cloud Providers.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

Standardizing Security Evaluation Criteria for Connected Vehicles: A Modular Protection Profile.
Proceedings of the 2019 IEEE Conference on Standards for Communications and Networking, 2019

2018
Dypermin: Dynamic permission mining framework for android platform.
Comput. Secur., 2018

Towards a Security Assurance Framework for Connected Vehicles.
Proceedings of the 19th IEEE International Symposium on "A World of Wireless, 2018

The General Data Protection Regulation (GDPR) Era: Ten Steps for Compliance of Data Processors and Data Controllers.
Proceedings of the Trust, Privacy and Security in Digital Business, 2018

2017
Transparency-Enabling Systems for Open Governance: Their Impact on Citizens' Trust and the Role of Information Privacy.
Proceedings of the E-Democracy - Privacy-Preserving, Secure, Intelligent E-Government Services, 2017

2016
The Far Side of Mobile Application Integrated Development Environments.
Proceedings of the Trust, Privacy and Security in Digital Business, 2016

Literature Review of Trust Models for Cloud Computing.
Proceedings of the 15th International Symposium on Parallel and Distributed Computing, 2016

2015
Behaviour reflects personality: detecting co-residence attacks on Xen-based cloud environments.
Int. J. Inf. Sec., 2015

A Hierarchical Multitier Approach for Privacy Policies in e-Government Environments.
Future Internet, 2015

Till All Are One: Towards a Unified Cloud IDS.
Proceedings of the Trust, Privacy and Security in Digital Business, 2015

Privacy Principles: Towards a Common Privacy Audit Methodology.
Proceedings of the Trust, Privacy and Security in Digital Business, 2015

Statistics-driven datacenter resources provisioning.
Proceedings of the 19th Panhellenic Conference on Informatics, 2015

Towards a Common Security and Privacy Requirements Elicitation Methodology.
Proceedings of the Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security, 2015

Cloud Computing Security Requirements and a Methodology for Their Auditing.
Proceedings of the E-Democracy - Citizen Rights in the World of the New Computing Paradigms, 2015

2014
If you want to know about a hunter, study his prey: detection of network based attacks on KVM based cloud environments.
J. Cloud Comput., 2014

Obscuring users' identity in VoIP/IMS environments.
Comput. Secur., 2014

Towards an augmented authenticator in the Cloud.
Proceedings of the 2014 IEEE International Symposium on Signal Processing and Information Technology, 2014

Empowering Users to Specify and Manage Their Privacy Preferences in e-Government Environments.
Proceedings of the Electronic Government and the Information Systems Perspective, 2014

2013
Guest editors' introduction.
Math. Comput. Model., 2013

Evaluating and enriching information and communication technologies compliance frameworks with regard to privacy.
Inf. Manag. Comput. Secur., 2013

An intrusion detection and prevention system for IMS and VoIP services.
Int. J. Inf. Sec., 2013

Evaluating the Security and Privacy Protection Level of IP Multimedia Subsystem Environments.
IEEE Commun. Surv. Tutorials, 2013

Special Issue on Advanced Information Security for Secure and Trust Computing.
Comput. Math. Appl., 2013

It's All in the Cloud: Reviewing Cloud Security.
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013

ProCAVE: Privacy-Preserving Collection and Authenticity Validation of Online Evidence.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2013

A Practical Steganographic Approach for Matroska Based High Quality Video Files.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

2012
Special issue on next generation communication and network security.
Secur. Commun. Networks, 2012

Special issue on security in cloud computing.
J. Cloud Comput., 2012

Privacy and Traceability in Social Networking Sites.
Proceedings of the 16th Panhellenic Conference on Informatics, PCI 2012, 2012

2011
Privacy preserving context transfer schemes for 4G networks.
Wirel. Commun. Mob. Comput., 2011

A Cross Layer Spoofing Detection Mechanism for Multimedia Communication Services.
Int. J. Inf. Technol. Syst. Approach, 2011

Cryptography Goes to the Cloud.
Proceedings of the Secure and Trust Computing, Data Management, and Applications, 2011

IS IP Multimedia Subsystem Affected by ‘Malformed Message' Attacks? - An Evaluation of OpenIMS.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

2010
A Call Conference Room Interception Attack and Its Detection.
Proceedings of the Trust, 2010

Privacy Requirements Engineering for Trustworthy e-Government Services.
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010

Unifying ISO Security Standards Practices into a Single Security Framework.
Proceedings of the South African Information Security Multi-Conference, 2010

Transforming the Greek e-Government Environment towards the e-Gov 2.0 Era.
Proceedings of the Electronic Government and the Information Systems Perspective, 2010

2009
Exploring Trust, Security and Privacy in Digital Business.
Trans. Large Scale Data Knowl. Centered Syst., 2009

Utilizing bloom filters for detecting flooding attacks against SIP based services.
Comput. Secur., 2009

A Hierarchical Model for Cross-Domain Communication of Health Care Units.
Proceedings of the Third International Conference on Network and System Security, 2009

A First Order Logic Security Verification Model for SIP.
Proceedings of IEEE International Conference on Communications, 2009

Information Systems Security Management: A Review and a Classification of the ISO Standards.
Proceedings of the Next Generation Society. Technological and Legal Issues, 2009

2008
IEEE 802.11 Wireless LANs (WLANs): Security.
Encyclopedia of Wireless and Mobile Communications, 2008

An ontology-based policy for deploying secure SIP-based VoIP services.
Comput. Secur., 2008

Message from the SecPri Workshop Organizing Technical Co-chairs.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

A Mechanism for Ensuring the Validity and Accuracy of the Billing Services in IP Telephony.
Proceedings of the Trust, 2008

A Cost-Effective Mechanism for Protecting SIP Based Internet Telephony Services Against Signaling Attacks.
Proceedings of the 4th International ICST Mobile Multimedia Communications Conference, 2008

Modeling Privacy Insurance Contracts and Their Utilization in Risk Management for ICT Firms.
Proceedings of the Computer Security, 2008

2007
A lightweight protection mechanism against signaling attacks in a SIP-based VoIP environment.
Telecommun. Syst., 2007

A probabilistic model for optimal insurance contracts against security risks and privacy violation in IT outsourcing environments.
Int. J. Inf. Sec., 2007

Special issue: TrustBus 2006.
Comput. Syst. Sci. Eng., 2007

An ontology description for SIP security flaws.
Comput. Commun., 2007

A framework for protecting a SIP-based infrastructure against malformed message attacks.
Comput. Networks, 2007

2006
Protecting privacy and anonymity in pervasive computing: trends and perspectives.
Telematics Informatics, 2006

Risk analysis of a patient monitoring system using Bayesian Network modeling.
J. Biomed. Informatics, 2006

Outsourcing digital signatures: a solution to key management burden.
Inf. Manag. Comput. Secur., 2006

Survey of security vulnerabilities in session initiation protocol.
IEEE Commun. Surv. Tutorials, 2006

An ontology for secure e-government applications.
Proceedings of the The First International Conference on Availability, 2006

2005
Technical guidelines for enhancing privacy and data protection in modern electronic medical environments.
IEEE Trans. Inf. Technol. Biomed., 2005

A formal model for pricing information systems insurance contracts.
Comput. Stand. Interfaces, 2005

A framework for detecting malformed messages in SIP networks.
Proceedings of the 14th IEEE Workshop on Local and Metropolitan Area Networks, 2005

Employing Ontologies for the Development of Security Critical Applications.
Proceedings of the Challenges of Expanding Internet: E-Commerce, 2005

2004
Mechanisms for controlling access in the global grid environment.
Internet Res., 2004

A security architecture for interconnecting health information systems.
Int. J. Medical Informatics, 2004

How Much Should We Pay for Security? (Invited Paper).
Proceedings of the Security Management, Integrity, and Internal Control in Information Systems, 2004

A Probabilistic Model for Evaluating the Operational Cost of PKI-based Financial Transactions.
Proceedings of the Public Key Infrastructure, 2004

2003
Secure Electronic Voting: the Current Landscape.
Proceedings of the Secure Electronic Voting, 2003

Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy.
Comput. Commun., 2003

Security Policy Configuration Issues in Grid Computing Environments.
Proceedings of the Computer Safety, 2003

A Knowledge-Based Repository Model for Security Policies Management.
Proceedings of the Computer Network Security, 2003

GRID Security Review.
Proceedings of the Computer Network Security, 2003

Electronic Voting Systems: Security Implications of the Administrative Workflow.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

2002
Functional Requirements for a Secure Electronic Voting System.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002

Security Requirements of e-Government Services: An Organizational Framework.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2002

Building a Reliable e-Voting System: Functional Requirements and Legal Constraints.
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002

2001
Pythia: Towards Anonymity in Authentication.
Proceedings of the Trusted Information: The New Decade Challenge, 2001

2000
Smart card technology for deploying a secure information management framework.
Inf. Manag. Comput. Secur., 2000

Using Smart Cards in an Educational Environment: Services and Security Features.
Proceedings of the Information Security for Global Information Infrastructures, 2000

1995
Design of a Processor Element for a High Performance Massively Parallel SIMD System.
Int. J. High Speed Comput., 1995

1991
GPFP: A SIMD PE for Higher VLSI Densities.
Proceedings of the VLSI 91, 1991

GPFP: an array processing element for the next generation of massively parallel supercomputer architectures.
Proceedings of the Proceedings Supercomputing '91, 1991


  Loading...