Stelios Dritsas

According to our database1, Stelios Dritsas authored at least 20 papers between 2003 and 2011.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.



In proceedings 
PhD thesis 




Secure Cloud Storage: Available Infrastructures and Architectures Review and Evaluation.
Proceedings of the Trust, Privacy and Security in Digital Business, 2011

A Secure Smartphone Applications Roll-out Scheme.
Proceedings of the Trust, Privacy and Security in Digital Business, 2011

Smartphone Security Evaluation - The Malware Attack Case .
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

On the Feasibility of Malware Attacks in Smartphone Platforms.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2011

A Cloud Provider-Agnostic Secure Storage Protocol.
Proceedings of the Critical Information Infrastructures Security, 2010

OntoSPIT: SPIT management through ontologies.
Computer Communications, 2009

An Ontology-Driven antiSPIT Architecture.
Proceedings of the Next Generation Society. Technological and Legal Issues, 2009

SPIT Identification Criteria Implementation: Effectiveness and Lessons Learned.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

An Adaptive Policy-Based Approach to SPIT Management.
Proceedings of the Computer Security, 2008

Threat Analysis of the Session Initiation Protocol Regarding Spam.
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007

SIP Vulnerabilities and Anti-SPIT Mechanisms Assessment.
Proceedings of the 16th International Conference on Computer Communications and Networks, 2007

Attack Modeling of SIP-Oriented SPIT.
Proceedings of the Critical Information Infrastructures Security, 2007

Protecting privacy and anonymity in pervasive computing: trends and perspectives.
Telematics and Informatics, 2006

A Generic Privacy Enhancing Technology for Pervasive Computing Environments.
Proceedings of the Trust and Privacy in Digital Business, Third International Conference, 2006

Security-by-Ontology: A Knowledge-Centric Approach.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

An ontology for secure e-government applications.
Proceedings of the The First International Conference on Availability, 2006

An Ontology-Based Approach to Information Systems Security Management.
Proceedings of the Computer Network Security, 2005

Employing Ontologies for the Development of Security Critical Applications.
Proceedings of the Challenges of Expanding Internet: E-Commerce, 2005

Incorporating Security Requirements Into the Software Development Process.
Proceedings of the 4th European Conference on Information Warfare and Security, 2005

GRID Security Review.
Proceedings of the Computer Network Security, 2003