curriculum vitae dr. prokopios drogkarisknowledge and experience in the fields of it security and...
TRANSCRIPT
Page | 1
CURRICULUM VITAE
Dr. Prokopios Drogkaris
Adress : Lykourgou 105, Kallithea,
Greece Date of Birth: 9th October 1982
Contact Tel.
Number: 6979 -11- 31-98 Nationality: Greek
Email: [email protected]
[email protected] Marital Status: Married
Webpage: www.icsd.aegean.gr/pdrogk Military Obligations: Fulfilled
SKILLS
Knowledge and experience in the fields of IT Security and e-Government environments
through participation in research national and international projects (proposals, tenders and
projects’ implementation) along to strong academic background (research publications and
academic teaching). Deep understanding of Privacy Enhancing Technologies (PET), Digital
Identities and Identification Management (IdM) along to Information Security Management
System (ISMS) as specified in ISO/IEC 27001:2005, including security requirements
establishment, security risks assessment and management, security policies, access control,
security incidents and business continuity management.
EDUCATION
■ Postdoctoral Research
4/2014 - Today
University of Piraeus, Greece
Department of Digital Systems
Research Area:
Methodologies for the Protection of
Privacy in e-Government
Information Systems
Page | 2
■ Doctor of Philosophy
9/2007 – 12/2013
University of the Aegean, Greece, School of Science,
Department of Information and Communication Systems
Engineering
Research Area: Information and Communication
Systems Security
PhD Thesis Title: Security and Privacy in e-
Government Information Systems
■ Postgraduate Studies
9/2005 – 9/2007
City University Of London, UK, School Of Informatics
Master of Science in Information Systems
■ Undergraduate Studies
9/2000 – 6/2005
University of the Aegean, Greece, School of Science
Department of Information and Communication Systems
Engineering
Diploma in Information and Communication Systems
Engineering
PUBLICATIONS
■ Journal Publications*
i. P. Drogkaris, S. Gritzalis, C. Lambrinoudakis, “Employing Privacy Policies and
Preferences in Modern e-Government Environments”, Special Issue on "Security
and Privacy of E-Government Applications and Services" of the International
Journal of Electronic Governance, 2014, Inderscience
(0)
■ Conference Publications*
x. L. Mitrou, P. Drogkaris, G. Leventakis, Legal and Social Aspects of Surveillance
Technologies: CCTV in Greece, International Conference on Citizens’ (0)
* The numbers inside the parentheses indicate the citations of each publication.
Page | 3
Perspectives on Surveillance, Security and Privacy: Controversies, Alternatives
and Solutions, November 2014, Vienna, Austria, Conference Proceedings
xi. P. Drogkaris, A. Gritzalis, C. Lambrinoudakis, “Empowering Users to Specify and
Manage their Privacy Preferences in e-Government Environments”, 3rd
International Conference on Electronic Government and the Information Systems
Perspective (EGOVIS 2014), Andrea Kö, Enrico Francesconi, (eds), pp. 237 -
245, September 2014, Munich, Germany, Springer LNCS
(0)
x. P. Drogkaris, G. Leventakis, A. Sfetsos, Promoting Law Enforcement Capabilities
through Asynchronous Training and Serious Games in the Fight against
Cybercrime, International Conference, The Rule of Law in a era of change:
Security, Social Justice and Inclusive Governance, June 2014, Athens, Greece,
Conference Proceedings
(0)
ix. D. Kostopoulos, V. Tsoulkas, G. Leventakis, P. Drogkaris, V. Politopoulou, “Real
Time Threat Prediction, Identification and Mitigation for Critical Infrastructure
Protection using Semantics, Event Processing and Sequential Analysis“, 8th
International Workshop on Critical Information Infrastructures Security (CRITIS
2013), September 2013, Holland, Lecture Notes in Computer Science LNCS,
Springer
(0)
viii. D. Kostopoulos, V. Tsoulkas, G. Leventakis, P. Drogkaris, V. Politopoulou, “A
Blend of Semantic Monitoring and Intrusion Detection Systems for the Protection
of Critical Infrastructures: Research efforts within the Greek Cybercrime Center“
(Keynote Speech), Fifth International Conference on Computanional Intelligence,
Communication Systems and Networks (CICSYN 2013), G. Romero, A. Orsoni,
(eds), June 2013, Spain, IEEE CPS
(0)
vii. D. Kostopoulos, V. Tsoulkas, G. Leventakis, P. Drogkaris, V. Politopoulou,
"Semantic Systems Modeling and Monitoring for Real Time Decision Making:
Results and Next Steps within the Greek Cyber Security Center of Excellence
(Keynote Speech)“, AMSS 15th International Conference on Modelling and
Simulation (UK-SIM 2013), April 2013, Cambridge University , IEEE CPS
(0)
vi. D. Núñez, I. Agudo, P. Drogkaris, S. Gritzalis, “Identity Management Challenges
for Intercloud Applications“, 1st International Workshop on Security & Trust for
Applications in Virtualised Environments (STAVE 2011), June, 2011, Loutraki,
Greece, Communications in Computer and Information Science Series CCIS,
(5)
Page | 4
Springer
v. P. Drogkaris, S. Gritzalis, “Attaching Multiple Personal Identifiers in X.509 Digital
Certificates”, EuroPKI 2010 7th European Workshop on Public Key Services,
Applications and Infrastructures, J. Camenisch and C. Lambrinoudakis, (Eds.), pp.
171-177, September 2010, Athens, Greece, Lecture Notes in Computer Science
LNCS, Springer
(1)
iv. P. Drogkaris, S. Gritzalis, C. Lambrinoudakis, "Transforming the Greek e-
Government Environment towards the e-Gov 2.0 Era", EGOVIS'10 International
Conference on Electronic Government and the Information Systems Perspective,
K. Andersen, E. Francesconi, A. Gronlund, T. M. Engers. (Eds.), pp. 142 -149,
September 2010, Bilbao, Spain, Lecture Notes in Computer Science LNCS,
Springer
(7)
iii. P. Drogkaris, C. Lambrinoudakis, S. Gritzalis, "Introducing Federated Identities to
One-Stop-Shop e-Government Environments: The Greek Case", eChallenges
2009 19th Conference, P. Cunningham, M. Cunningham (Eds.), pp 115 – 121,
October 2009, Istanbul, Turkey, eChallenges e-2009 Conference Proceedings
(0)
ii. P. Drogkaris, S. Gritzalis, C. Lambrinoudakis, "Enabling Secure Data
Management in e-Government Environments: The Greek Case", EGOV’09 8th
International Conference on Electronic Government, EGOV 2009, H. J. Scholl, M.
Janssen, R. Traunmüller, M. A. Wimmer (Eds.), pp. 138-145, September 2009,
Linz, Austria, Trauner Verlag Schriftenreihe Informatik
(0)
i. P. Drogkaris, D. Geneiatakis, S. Gritzalis, C. Lambrinoudakis, L. Mitrou, "Towards
an Enhanced Authentication Framework for eGovernment Services: The Greek
case", EGOV’08 7th International Conference on Electronic Government, E.
Ferro, J. Scholl, M. Wimmer (Eds.), pp. 189-196, September 2008, Torino, Italy,
Trauner Verlag Schriftenreihe Informatik
(6)
RESEARCH INTERESTS
■ e-Government Privacy, Security, Legal & Ethical Issues
■ Privacy Enhancing Technologies (PET)
■ Cloud Computing
■ Digital Authentication in e-Government Environments
■ Public Key Infrastructures
Page | 5
■ Federated Identities
■ Web 2.0
EDITING & CONFERENCE
ORGANIZATION ACTIVITIES
■ Member of Program Committee:
▪ The Ninth International Conference on Digital Society (ICDS 2015), (Lisbon : Portugal),
February 2015, IARIA XPS Press
▪ The Fourth International Conference on Social Eco-Informatics (SOTICS 2014), (Nice :
France), October 2014, IARIA XPS Press
▪ 11th International Conference on Trust, Privacy & Security in Digital Business
(TrustBus 2014), (Munich : Germany), September 2014, Springer LNCS
▪ European Conference on Social Media (ECSM 2014), (Brighton : United Kingdom),
July 2014, Academic Publishing International API
▪ 9th International Conference on Cyber Warfare and Security (ICCWS 2014), (West
Lafayette : USA), March 2014, Academic Publishing International API
▪ The Eighth International Conference on Digital Society (ICDS 2014), (Barcelona :
Spain), March 2014, IARIA XPS Press
▪ International Conference on Cloud Security Management (ICCSM-2013), (Seattle :
USA), October 2013, Academic Publishing International API
▪ 12th European Conference on Research Methodology for Business and Management
Studies (ECRM 2013), (Minho : Portugal), July 2013, Academic Publishing International
API
▪ 13th European Conference on eGovernment (ECEG 2013), (Como : Italy), June 2013,
Academic Publishing International API
▪ 8th International Conference on Information Warfare and Security (ICIW-2013),
(Denver : USA), March 2013, Academic Publishing International API
▪ The Seventh International Conference on Digital Society (ICDS 2013), (Nice : France),
February 2013, XPS (Xpert Publishing Services)
▪ The Second International Conference on Social Eco-Informatics (SOTICS 2012),
Page | 6
(Venice : Italy), October 2012, XPS (Xpert Publishing Services)
▪ 12th European Conference on eGovernment (ECEG 2012), (Barcelona : Spain), June
2012, Academic Publishing International API
▪ 11th European Conference on Research Methodology for Business and Management
Studies (ECRM 2012), (Bolton : United Kingdom), June 2012, Academic Publishing
International API
▪ 7th International Conference on Information Warfare and Security (ICIW 2012), (Seattle
: USA), March 2012, Thomson Reuters ISI Web of Science (WOS)
▪ The Sixth International Conference on Digital Society (ICDS 2012), (Valencia : Spain),
February 2012, XPS (Xpert Publishing Services)
▪ 11th European Conference on eGovernment (ECEG 2011), (Ljubljana : Slovenia), June
2011, Academic Publishing International API
▪ 6th International Conference on Information Warfare and Security (ICIW 2011)
(Washington: USA), March 2011, Thomson Reuters ISI Web of Science (WOS)
▪ The Fifth International Conference on Digital Society (ICDS 2011) (Gosier,
Guadeloupe: France), February 2011, XPS (Xpert Publishing Services)
■ Member of Organization Committee:
▪ 3rd IEEE International Conference on Cloud Computing Technology and Science
(CloudCom 2011), (Athens : Greece), November 2011, IEEE
▪ 2nd Annual Workshop on Digital Forensics and Incident Analysis (Greece: Samos),
August 2007, IEEE Computer Society Press
■ International Journals Editorial Board Member:
▪ International Journal On Advances in Internet Technology, IARIA
■ International Journals Reviewer:
▪ Computer Standards & Interfaces, Elsevier
▪ Transactions on Information Technology in BioMedicine, IEEE
Page | 7
■ External Reviewer:
▪ 47th Hawaiian International Conference on System Sciences (HICSS-47), (Big Island :
Hawaii), January 2014, IEEE
▪ 15th International Conference on Information & Communications Security (ICICS 2013),
(Beijing : China), November 2013, Springer LNCS
▪ 2nd International Conference on Advances in Computing, Communications and
Informatics (ICACCI-2013), (Mysore : India), August 2013, IEEE
▪ 10th International Conference on Security and Cryptography (SECRYPT 2013),
(Reykjavic : Iceland), July 2013, Springer CCIS
▪ 7th IFIP WG 11.11 International Conference on Trust Management, (Malaga : Spain),
June 2013, Springer LNCS
▪ The 7th International Conference on Network and System Security (NSS 2013),
(Madrid : Spain), June 2013, Springer LNCS
▪ 21st Euromicro International Conference on Parallel, Distributed, and Network-Based
Processing (PDP 2013), (Belfast : Ireland), February 2013, IEEE CPS
▪ 46th Hawaiian International Conference on System Sciences (HICSS-46),( Maui :
Hawaii), January 2013, IEEE
▪ The 4th International Symposium on Cyberspace Safety and Security (CSS 2012),
(Melbourne : Australia), December 2012, Springer LNCS
▪ 6th International Conference on Network and System Security (NSS 2012), (Fujian :
China), November 2012, Springer LNCS
▪ The 7th International Conference on Frontier of Computer Science and Technology
(FCST-12), (Suzhou : China), November 2012, FCST Conference Proceedings
▪ 9th European PKI Workshop: Research and Applications (EuroPKI 2012), (Pisa : Italy),
September 2012, Springer LNCS
▪ 11th IEEE International Conference on Trust, Security and Privacy in Computing and
Communications (IEEE TrustCom-12), (Liverpool : United Kingdom), June 2012, IEEE
▪ International Conference on Security and Cryptography (SECRYPT 2012), (Rome :
Page | 8
Italy), July 2012, Springer CCIS
▪ The 10th IEEE International Conference on Trust, Security and Privacy in Computing
and Communications (IEEE TrustCom-11), (Changsha : China), November 2011, IEEE
▪ 9th Annual IEEE Consumer Communications and Networking Conference, (Las Vegas :
USA), January 2012, IEEE
▪ 3rd IEEE International Conference on Cloud Computing Technology and Science
(CloudCom 2011), (Athens : Greece), November 2011, IEEE
▪ 2nd International Conference on Computer and Communication Technology (ICCCT
2011), (Allahabad : India), September 2011, IEEE Xplore
▪ 5th International Conference on Network and System Security (NSS 2011), (Milan :
Italy), September 2011, IEEE
▪ International Conference on Security and Cryptography (SECRYPT 2011), (Seville :
Spain), July 2011, SECRYPT Proceedings
▪ International Conference e-Commerce 2011 (EC 2011), (Rome : Italy), July 2011,
IADIS Conference Proceedings
▪ 7th International Workshop on Security and Trust Management (STM'11) in conjunction
with 5th IFIP WG 11.11 International Conference on Trust Management, (Copenhagen :
Denmark), July 2011, Springer LNCS
▪ 9th Annual Conference on Privacy, Security and Trust (PST 2011), (Montreal :
Canada), July 2011, IEEE Xplore
▪ 9th International Conference on Applied Cryptography and Network Security (ACNS
'11) , (Malaga : Spain), June 2011, Springer LNCS Series
▪ The 2010 International Conference on Multimedia Information NEtworking and Security
(MINES 2010), (Nanjing : China), November 2010, IEEE
▪ 5th International Conference on Critical Information Infrastructure Security (CRITIS 10),
(Athens : Greece), September 2010, Springer LNCS
▪ 15th European Symposium on Research in Computer Security (ESORICS 2010),
(Athens : Greece), September 2010, Springer LNCS series
▪ 6th International ICST Conference on Security and Privacy in Communication Networks
(SecureComm 2010), (Singapore : Singapore), September 2010, Springer's LNICST
Page | 9
▪ International Conference on Security and Cryptography (SECRYPT 2010) , (Athens :
Greece), July 2010, Springer-Verlag
▪ IADIS e-Commerce 2010 (EC 2010), (Freiburg : Germany), July 2010, InderScience
▪ IEEE Communications and Information Security Symposium (Globecom 2009), (Hawai
: USA), November 2009, IEEE Press
▪ 6th International Conference on Trust, Privacy & Security in Digital Business (Trustbus
2009) in conjunction with 20th International Conference on Database and Expert
Systems Applications (DEXA 2009) , (Linz : Austria), September 2009, Springer LNCS
series
▪ 13th Panhellenic Conference on Informatics (PCI' 09), (Corfu : Greece), September
2009, IEEE
▪ International Conference on e-Business (ICE-B 2009) in conjunction with International
Joint Conference on e-Business and Telecommunications, ICETE, (Milan : Italy), July
2009, ICE-B 2009 Proceedings
▪ 7th International Conference on Computing, Communications and Control Technologies
(CCCT 2009) in conjunction with 2nd International Multi-Conference on Engineering
and Technological Innovation (IMETI 2009), (Orlando : USA ), July 2009, Conference
Proceedings
▪ 8th Annual ISSA Conference (ISSA 2009), (Johannesburg : South Africa), July 2009,
ISSA proceedings
▪ 4th International Annual Workshop on Digital Forensics & Incident Analysis (WDFIA
2009), (Athens : Greece), June 2009, WDFIA Proceedings
▪ Third International Symposium on Human Aspects of Information Security & Assurance
(HAISA 2009), (Athens : Greece), June 2009, HAISA Proceedings
▪ 24th Annual ACM Symposium on Applied Computing, (Hawaii : USA), March 2009,
ACM Press
▪ The Fourth International Conference on Signal-Image Technology & Internet, (Bali :
Indonesia), December 2008, IEEE Conference Publishing Services (IEEE CSP)
▪ 3rd International Workshop on Critical Information Infrastructures Security, (Frascati
(Rome) : Italy), October 2008, Springer Lecture Notes in Computer Science
Page | 10
▪ 5th International Conference on Trust, Privacy and Security in Digital Business
(Trustbus 2008) in conjunction with DEXA 2008: 19th International Conference on
Database and Expert Systems Applications, (Torino : Italy), September 2008, Springer
▪ 7th Annual ISSA Information Security Conference, (Johannesburg : South Africa), July
2008, University of Johannensurg
▪ Fifth European PKI Workshop (EuroPKI 2008), (Trondheim : Norway), June 2008,
Springer in the Lecture Notes in Computer Science (LNCS)
▪ 2nd International Conference on Multimedia and Ubiquitous Engineering, (Busan :
Korea), April 2008, IEEE Computer Society
▪ 23rd Annual ACM Symposium on Applied Computing, (Ceará : Brasil), March 2008,
ACM Press
TEACHING ACTIVITIES
■ 03/2014 - 08/2014 University of Piraeus, Department of Digital Systems
Postgraduate Programme “Techno-economic Management &
Security of Digital Systems”
Advanced Security Technologies, Information Systems Security
and Information Systems Security Management Courses
■ 10/2010 – 6/2013 Technological Educational Institute of Piraeus, General
Department of Mathematics
Laboratory Associate
Teaching Structured Programming (Laboratory)
Introduction to Computer Programming I
(Laboratory)
Computer Programming I (Laboratory)
Computer Programming III (Laboratory)
■ 10/2012 – 1/2013 New York College Athens - School of Computing
▪ Instructor «Database Systems» and «Data Communications &
Networking» at BS. in Computer Science, State University of
Page | 11
New York -Empire State College
■ 10/2011 – 2/2013 Mediterranean College – School of Computing
▪ Instructor «Systems Analysis», «Introduction to Database
Systems», «Databases» and «Operating Systems» at BSc
(Hons) Computing and BSc (Hons) Computer Science,
University of Derby UK
▪ Instructor «Web Development Issues» at BSc (Hons)
Computing, University of Teeside UK
▪ Instructor «IT Applications – Project Management» at HND
Civil Engineering, Edexcel
■ 10/2010 – 2/2012 Technological Educational Institute of Kalamata, Department of
Technology of Informatics & Telecommunications.
Laboratory Associate
Teaching Databases II (Theory, Tutorial and
Laboratory)
Algorithms and Data Structures (Laboratory)
Software Engineering (Theory and
Laboratory)
Systems Analysis (Laboratory)
■ 2/2010 – 6/2010 University of the Aegean, Greece, School of Science,
Department of Information and Communication Systems
Engineering
Auxiliary Laboratory Teaching at “Information and
Communication Systems Security” Undergraduate Course
■ 2/2009 – 6/2009 University of the Aegean, Greece, School of Science,
Department of Information and Communication Systems
Engineering
Auxiliary Laboratory Teaching at “Information and
Communication Systems Security” Undergraduate Course
Page | 12
■ 23/1/2009 University of the Aegean, Greece, School of Science
Department of Information and Communication Systems
Engineering
Postgraduate Program in “Technologies and management of
information and communication systems”
Invited Lecture on «Security and Digital Authentication in e-
Government Environments»
R&D ACTIVITIES
■ 8/2014 - Today Center for Security Studies, Cyprus Neuroscience &
Technology Institute, Centre of Excellence in Terrorism,
Resilience, Intelligence & Organised Crime Research,
University of Piraeus, Advanced Integrated Technology
Solutions & Services Ltd, Mezza Group
Project Manager and Researcher: “Engaging Users in
Preventing and Fighting Cyber Crime (UINFC2)”
(www.uinfc2.eu)
■ 4/2014 - Today Vicomtech Vicom, Kinesense, Aditess, FINT, ITI, Center for
Secutity Studies, SRM ICOMTECH VICOM
Ethical Manager and Researcher: “Petty criminality diminution
through search and analysis in multi-source video Capturing
and archiving platform (P-REACT)”
(www.p-react.eu)
■ 9/2013 - Today Ministry of Interior Spain, ISDEFE, Center for Security Studies
Project Manager at Partner’s Level and Researcher: “Critical
Infrastructure Improvement of Security Control against the
Terrorist Threat (CIISC-T2)”
(www.ciisct2.eu)
Page | 13
■ 7/2013 – 8/2014 THALES Communications S.A., National Centre for Scientific
Research (NCSR) “Demokritos”, Center For Security Studies,
TELETEL, S.A., AMPER SISTEMAS, S.A., Cluster TIC
Seguridad y Confianza, Empresa de Serviços e
Desenvolvimento de Software, S.A., Rohill Technologies B.V.,
THYIA TEHNOLOGIJE D.O.O., Rinicom Ltd.
Ethical Committee Member – Researcher: “Heterogeneous
Interoperable Transportable GATEway for First-Responders
(HIT-GATE)”
(www.hit-gate.eu)
■ 4/2013 - Today Vitamib, Atos Spain S.A., Centre for Irish and European
Security, Market & Opinion Research International, Center for
Security Studies, The Hebrew University of Jerusalem, National
Center for Scientific Research "DEMOKRITOS", Rand Europe,
Institutt for Fredsforsking Stiftelse, University of Westminster,
Centre for Science, Society and Citizenship
Project Manager at Partner’s Level and Researcher: “Public
Perception of Security and Privacy: Assessing Knowledge,
Collecting Evidence, Translating Research into Action (PACT)”
(www.projectpact.eu)
■ 2/2013 - Today FORTH-ICS, SafeNet, AUTH-LEPS, Center for Security Studies
Project Manager at Partner’s Level and Researcher:
“A CyberCrime Center of Excellence for
Training, Research and Education in Greece (GCC)”
(www.cybercc.gr)
■ 8/2012 – 11/2013 Ministry of Development, Competiveness, Infrastructure,
Transport and Networks, Interreg III, Cyprus University of
Technology, Technical University of Crete, University of the
Aegean, Cyprus Police
Researcher on international project “Development of Intelligent
Sea Space surveillance system with the application of Array
Page | 14
Camera and Sensor Networks (POSEIDON)”
(www.poseidonproject.eu)
■ 11/2012 – 12/2012 National and Kapodistrian University of Athens, Administrative
Reform 2007-2013, Ministry of Administrative Reform & e-
Government
Researcher on national project “Comparative study of the
European Union and Greece for a) e-Government, b) Trust and
Security, and c) Fast and Ultra-Fast internet access. Deviations,
performance indicators and recommendations for national
actions”.
■ 11/2012 – 2/2013 PAU Education & European Commision - Digital Agenda for
Europe - Going Local 2012 (http://www.digitalagenda12.eu)
Cyprus and Greece Animator
■ 4/2012 – 12/2012 PAU Education & European Commision - Digital Agenda for
Europe - Digital Agenda Assembly 2012
(http://www.digitalagenda12.eu)
Security Group Animator and Moderator
■ 11/2010 – 10/2011 Ministry of Transportations, Structures and Networks
Digital Greece 2020 Forum (www.digitalgreece2020.gr)
Privacy and Security Group Rapporteur
■ 1/2007 – 12/2008 KTP ΑΕ – Ministry of the Interior, Public Administration and
Decentralization - PLANET AE, NTUA
Researcher on national project «eGIF: Greek e-Government
Interoperability Framework: Digital Authentication Framework»
EMPLOYMENT ACTIVITIES
Page | 15
■ 2/2013 - Today Center for Security Studies (KEMEA)
Research Associate on EU-funded and National Research
Projects and Studies
■ 1/2009 – 7/2009 Unisystems Α.Ε.Ε
User Training and Software Support at Samos Prefecture
Information Systems
■ 1/2005 – 8/2005 Laboratory of Information and Communication Systems
Security (Info-Sec-Lab), University of the Aegean
Researcher on project « Design and development of a
department database for maintaining all students personal and
educational data »
■ 10/2004 – 2/2005 Laboratory of Information and Communication Systems
Security (Info-Sec-Lab), University of the Aegean
Researcher on project « Development and Deployment of a
smart card based PKI infrastructure for authentication and
authorization mechanisms for all University users (students
and faculty)»
LANGUAGES
■ English
Excellent
Knowledge
6/1999 Certificate of Proficiency in English,
University Of Cambridge
■ German
Good
Knowledge
9/1998 Grundstuffe Zertifikat
Goethe-Institut
Page | 16
COMPUTER SKILLS
■ Methodologies & Standards CRAMM, Octave, ISO/IEC 27001:2005 Certified ISMS
Auditor
■ Programming Languages: Visual Basic, C, C WinAPI, C++, Java, SQL
■ Databases: MS SQL, MySQL, PostgreSQL, MS Access
■ Modeling and Analysis Tools: UML, SSADM
■ Web Programming: HTML, PHP, ASP, VBscript, JavaScript, XML, CSS
■ Operating Systems: Linux (Ubuntu), Windows (NT/200/Server
2003/XP/Vista/7)
MEMBER
■ 12/2006 - Today : Technical Chamber of Greece (T.E.E.)
■ 9/2006 - Today : Laboratory of Information and Communication Systems
Security (Info-Sec-Lab), University of the Aegean
■ 5/2005 - Today : Greek Computer Society (E.P.Y.)
■ 10/2012 – Today: Open Web Application Security Project (OWASP)
■ 8/2013 – Today: EC NIS Platform - WG1 (Risk Management) Member
RECCOMENDATION LETTERS
Furnished upon request
Page | 17
CITATIONS
■ Publication
P. Drogkaris, D. Geneiatakis, S. Gritzalis, C. Lambrinoudakis, L. Mitrou, "Towards an
Enhanced Authentication Framework for eGovernment Services: The Greek case",
EGOV’08 7th International Conference on Electronic Government, E. Ferro, J. Scholl, M.
Wimmer (Eds.), pp. 189-196, September 2008, Torino, Italy, Trauner Verlag Schriftenreihe
Informatik
■ Citations
1. Lampathaki F., Tsiakaliaris C., Stasis A., Charalabidis Y., "National Interoperability
Frameworks: The Way Forward", Interoperability in Digital Public Services and
Administration: Bridging E-Government and E-Business, pp. 1-24, IGI Global, 2011
2. lomp M., Grijpink J., "Combating Identity Fraud in the Public Domain: Information
Strategies for Healthcare and Criminal Justice", Proceedings of the 11th European
Conference on e-Government, Klun M., Decman M., Jukić T. (Eds), pp.481-488, 2011,
Ljubljana, Slovenia, Academic Publishing Limited
3. Z. Kardasiadou, E. Chatziliasi and K. Limniotis, "E-Government in Greece: Serving
State’s Economic Needs – Respecting the Fundamental Right to Data Protection", in
the 7th International Conference in Global Security, Safety and Sustainability (ICGS3)
/ 4th e-Democracy Joint Conferences, R. Bashroush, et al. (Eds.), Springer, 2011
4. Al-Hujra, O, Al-dalahmeh,M and Aloudat, A. “The Role of National Culture on Citizen
Adoption of eGovernment Services: An Empirical Study” Electronic Journal of e-
Government Volume 9 Issue 2, pp. 93 – 106, 2011
5. Z. Kardasiadou, E. Chatziliasi, K. Limniotis. “E-Government in Greece: Serving State’s
Economic Needs – Respecting the Fundamental Right to Data Protection” Global
Security, Safety and Sustainability & e-Democracy, pp. 179-185, Springer, 2012,
ISBN: 978-3-642-33448-1
6. Plomp, M and Grijpink, J. “Towards an Information Strategy for Combating Identity
Page | 18
Fraud in the Public Domain: Cases from Healthcare and Criminal Justice” Electronic
Journal of e-Government Volume 9 Issue 2 2011, (pp. 214 - 222)
■ Publications
D. Nunez , I. Agudo, P. Drogkaris, S. Gritzalis, “Identity Management Challenges for
Intercloud Applications”, 1st International Workshop on Security & Trust for
Applications in Virtualised Environments (STAVE 2011), C. Skianis, (Ed.), pp. 198-
204, June 2011, Loutraki, Greece, Springer CCIS
▪ Citations
1. P.G. Dorey, A. Leite, "Commentary : Cloud computing – A security problem or
solution?", Information Security Technical Report, ISSN 1363-4127,
10.1016/j.istr.2011.08.004., 2011, Elsevier
2. R. Roman, M. R. Felipe, P. E. Gene, and J. Zhou, ‘Analysis of security components in
cloud storage systems’, APMRC, 2012 Digest, pp. 1–4, Nov. 2012.
3. Yung-Feng Lu and Chin-Fu Kuo. “Robust and flexible tunnel management for secure
private cloud”. SIGAPP Appl. Comput. Rev. 13, pp. 41-50, 2013, ACM
4. S. Bendoukha, D. Moldt, T. Wagner : Enabling Cooperation in an Inter-cloud
Environment: An Agent-Based Approach, , 2013 24th International Workshop on
Database and Expert Systems Applications (DEXA), pp. 217 – 221, 2013, Springer
5. A. Toosi, R. Calheiros, R. Buyys, “Interconnected Cloud Computing Environments:
Challenges,Taxonomy and Survey”, ACM Computing Surveys, 2014 , Volume 47,
Issue 1, ACM
■ Publication
P. Drogkaris, S. Gritzalis, C. Lambrinoudakis, "Transforming the Greek e-Government
Environment towards the e-Gov 2.0 Era", EGOVIS'10 International Conference on
Electronic Government and the Information Systems Perspective, K. Andersen, E.
Francesconi, A. Gronlund, T. M. Engers. (Eds.), pp. 142 -149, September 2010, Bilbao,
Spain, Lecture Notes in Computer Science LNCS, Springer
Page | 19
▪ Citations
1. M. Prandini, M. Ramilli, “Security considerations about the adoption of web 2.0
technologies in sensitive e-government processes”, ICEGOV '11 5th International
Conference on Theory and Practice of Electronic Governance, Ed(s) E. Estevez,
M.Janssen and N. Leosk pp. 285-288, September 2011, Tallinn Estonia, ACM Press
2. Gil-Garcia, J. Ramon, “Electronic Government Success: Definition, Measures, and
Factors”, Enacting Electronic Government Success, Springer US, 2012, ISBN: 978-1-
4614-2015-6
3. U. Sivarajah, Z. Irani, “Exploring the Application of web 2.0 in e-Government: A United
Kingdom Context”, tGov 2012, May 2012, Brunel, United Kingdom, ISEing Group
Brunel University
4. M. Prandini, M. Ramilli, “Raising Risk Awareness on the Adoption of Web 2.0
Technologies in Decision Making Processes”, Future Internet 2012, 4(3), pp. 700-718,
ISSN 1999-5903, MDPI Publications
5. R. T. Khasawneh, E. A. Abu, “E-Government and Social Media Sites: The Role and
Impact”, World Journal of Computer Application and Technology, Vol. 1, pp. 10 - 17,
2013
6. U, Sivarajah, Z. Irani, “A Theoretical Model For The Application Of Web 2.0 In E-
Government”. European, Mediterranean & Middle Eastern Conference on Information
Systems 2013 (EMCIS2013), October 17-18, 2013, Windsor, UK
7. K, Zafiropoulos, K. Antoniadis, V. Vrana, “Sharing Followers in e-Government Twitter
Accounts: The Case of Greece”, Future Internet Journal, Volume 6, Issue 2, 2014,
MDPI
■ Publications
P. Drogkaris, S. Gritzalis, “Attaching Multiple Personal Identifiers in X.509 Digital
Certificates”, EuroPKI 2010 7th European Workshop on Public Key Services, Applications
and Infrastructures, J. Camenisch and C. Lambrinoudakis, (eds), pp. 171-177, September
2010, Athens, Greece, Springer LNCS
Page | 20
▪ Citations
1. M. Schmidt, M. Ramilli, “Vertrauenswürdige Identitäten mit dem neuen
Personalausweis”, Diplomarbeit am Institut fur Informatik der Freien Universit at Berlin,
July 2012
SCIENTIFIC PUBLICATIONS ANATYLIC MEMO
■ Journal Publications
Authors: P. Drogkaris, S. Gritzalis, C. Lambrinoudakis
Publication
Data:
“Exploring the Incorporation of Privacy Policies and Preferences in Modern e-
Government Environments”, special issue on "Security and Privacy of E-
Government Applications and Services" of the International Journal of Electronic
Governance, pp. 101-116 , 2013, Inderscience
Abstract: The evolvement of e-Government has increased users’ concerns on personal
data disclosure and privacy threats as more and more information is released to
a rising number of governmental service providers. This paper addresses the
consideration of users retaining control over their personal information while
relishing advanced governmental electronic services. Additionally, it proposes a
simple, yet effective, architecture which promotes the embodiment of Privacy
Policies and Preferences in modern e-Government environments that aim to
simplify the provision of electronic services while preserving users’ personal
data and information privacy.
■ Conference Publications
Page | 21
Authors: P. Drogkaris, D. Geneiatakis, S. Gritzalis, C. Lambrinoudakis, L. Mitrou
Publication
Data:
"Towards an Enhanced Authentication Framework for eGovernment Services:
The Greek case", EGOV’08 7th International Conference on Electronic
Government, E. Ferro, J. Scholl, M. Wimmer (Eds.), pp. 189 – 196, September
2008, Torino, Italy, Trauner Verlag Schriftenreihe Informatik
Abstract: It is widely accepted that electronic Government environments have caused a
complete transformation of the way individuals, businesses and governmental
agencies interact with central government. However, the acceptance and
success of e-Government services largely depend on the level of trust and
confidence developed by the users to the provided services and the overall
system security. Thus the employment of the appropriate authentication
framework is a crucial factor. This paper focuses on the way to determine the
appropriate trust level of an electronic service. Specifically, it provides
guidelines according to the data required for a transaction, as well as to the
available authentication and registration mechanisms. Moreover, a Single
SignOn architecture is proposed, supporting a uniform authentication procedure
that depends on the level of trust required by the service. In the aforementioned
research work specific requirements and limitations for Greece have been taken
into account.
Authors: P. Drogkaris, S. Gritzalis, C. Lambrinoudakis,
Publication
Data:
"Enabling Secure Data Management in e-Government Environments: The
Greek Case", EGOV’09 8th International Conference on Electronic
Government, EGOV 2009, H. J. Scholl, M. Janssen, R. Traunmüller, M. A.
Wimmer (Eds.), pp. 138-144, September 2009, Linz, Austria, Trauner Verlag
Schriftenreihe Informatik
Abstract: Modern e-Government environments adopt technologies that can support
interoperability across the entire “electronic” public sector and thus new
improved electronic services. At the same time new requirements are raised
from the users. This paper presents ongoing research on a secure user data
Page | 22
management architecture for e-Government environments. More specifically
the utilization of Privacy Preferences and Privacy Policies along with the
introduction of two entities responsible for administrating user documents and
data management is proposed. The research work presented has been based
on the Greek Interoperability Framework and it’s specific requirements and
limitations.
Authors: P. Drogkaris. C. Lambrinoudakis, S. Gritzalis
Publication
Data:
"Introducing Federated Identities to One-Stop-Shop e-Government
Environments: The Greek Case", eChallenges 2009 19th Conference, P.
Cunningham, M. Cunningham (Eds.), pp 115 – 121, October 2009, Istanbul,
Turkey, eChallenges e-2009 Conference Proceedings
Abstract: Even though e-Government environments have achieved a certain
interoperability level and coherence across public sector, there are several
approaches, technologies and mechanisms that could aid these environments
towards delivering more user-centric electronic services. This paper focuses on
the aspect of identity management. More specifically it presents a framework
that incorporates the notion of federation and federated identities in order to
overcome the impediment of per-sector identifiers. Moreover, it provides Single
Sign-On access to electronic services through the utilization of a linking
mechanism. This framework has been based on the Greek Interoperability
Framework and its specific requirements and limitations.
Authors: P. Drogkaris, S. Gritzalis, C. Lambrinoudakis
Publication
Data:
“Transforming the Greek e-Government Environment towards the e-Gov 2.0
Era”, EGOVIS'10 International Conference on Electronic Government and the
Information Systems Perspective, K. N. Andersedn, E. Francesconi, Å.
Grönlund, T. M. Engers (Eds.), pp. 142 -149, September 2010, Bilbao, Spain,
Lecture Notes in Computer Science LNCS, Springer
Abstract: Modern e-Government environments across the public sector have achieved
Page | 23
significant interoperability and coherence but are now in front of the next leap
forward, which is the adaptation of Web 2.0 technologies. This transition
towards e-Government 2.0 will not only improve participation, transparency and
integration but it will also speed up the pace of innovation through collaboration
and consultation. This paper presents an enhanced Greek e-Government
Framework that fully incorporates Web 2.0 technologies along with an
identification mechanism that retains compliance with existing authentication
sub-framework taking into account the specific needs and requirements of the
Greek Governmental Agencies.
Authors: P. Drogkaris, S. Gritzalis
Publication
Data:
"Attaching Multiple Personal Identifiers in X.509 Digital Certificates",
EuroPKI'10 7th European Workshop on Public Key Services, Applications and
Infrastructures, J. Camenisch and C. Lambrinoudakis, (Eds.), pp. 171-177,
September 2010, Athens, Greece, Springer LNCS
Abstract: The appeals for interoperable and decentralized Electronic Identity
Management are rapidly increasing, especially since their contribution towards
interoperability across the entire “electronic” public sector, effective information
sharing and simplified access to electronic services, is unquestioned. This
paper presents an efficient and user-centric method for storing multiple users’
identifiers in X.509 digital certificates while preserving their confidentiality,
allowing for interoperable user identification in environments where users
cannot be identified by an all embracing unique identifier.
Authors: D. Núñez, I. Agudo, P. Drogkaris, S. Gritzalis
Publication
Data:
“Identity Management Challenges for Intercloud Applications“, 1st International
Workshop on Security & Trust for Applications in Virtualised Environments
(STAVE 2011), pp. 198-204, June, 2011, Loutraki, Greece, Communications in
Computer and Information Science Series CCIS, Springer
Page | 24
Abstract: Intercloud notion is gaining a lot of attention lately from both enterprise and
academia, not only because of its benefits and expected results but also due to
the challenges that it introduces regarding interoperability and standardisation.
Identity management services are one of the main candidates to be outsourced
into the Intercloud, since they are one of the most common services needed by
companies and organisations. This paper addresses emerging identity
management challenges that arise in intercloud formations, such as naming,
identification, interoperability, identity life cycle management and single sign-
on.
Authors: D. Kostopoulos, V. Tsoulkas, G. Leventakis, P. Drogkaris, V.Politopoulou
Publication
Data:
“Real Time Threat Prediction, Identification and Mitigation for Critical
Infrastructure Protection using Semantics, Event Processing and Sequential
Analysis”, 8th International Workshop on Critical Information Infrastructures
Security (CRITIS 2013), September 2013, Holland, Lecture Notes in Computer
Science LNCS, Springer
Abstract: Seamless and faultless operational conditions of multi stakeholder Critical
Infrastructures (CIs) are of high importance for today’s societies on a global
scale. Due to their population impact, attacks against their interconnected
components can create serious damages and performance degradation which
eventually can result in a societal crisis. Therefore it is crucial to effectively and
timely protect these high performance - critical systems against any type of
malicious cyber-physical intrusions. This can be realized by protecting CIs
against threat consequences or by blocking threats to take place at an early
stage and preventing further escalation or predicting threat occurrences and
have the ability to rapidly react by eliminating its roots. In this paper a novel
architecture is proposed in which these three ways of confronting with cyber –
physical threats are combined using a novel semantics based risk methodology
that relies on real time behavioral analysis. The final prototype provides the CI
operator with a decision tool (DST) that imprints the proposed approach and
which is capable of alerting on new unknown threats, generate suggestions of
Page | 25
the required counter-actions and alert of probable threat existence. The
implemented architecture has been tested and validated in a proof of concept
scenario of an airport CI with simulated monitoring data.
Authors: P. Drogkaris, S. Gritzalis, C. Lambrinoudakis
Publication
Data:
Empowering Users to Specify and Manage their Privacy Preferences in e-
Government Environments”, 3rd International Conference on Electronic
Government and the Information Systems Perspective (EGOVIS 2014), Andrea
Kö, Enrico Francesconi, (eds), (to appear), September 2014, Munich,
Germany, Springer LNCS
Abstract: The provision of advanced e-Government services has raised users’ concerns
on personal data disclosure and privacy threats as more and more information
is released to various governmental service providers. Towards this direction,
the employment of Privacy Policies and Preferences has been proposed in an
attempt to simplify the provision of electronic services while preserving users’
personal data and information privacy This paper addresses the consideration
of users to create, manage and fine-tune their privacy preferences in a user
friendly, yet efficient way. It presents a Graphical User Interface (GUI) which
empowers them to articulate their preferences in machine readable format and
resolve possible conflicts with Service Provider’s (SP) policy, without being
obliged to go through complex and nuanced XML documents or being familiar
with privacy terminology. Users can now be confident that their personal data
will be accessed, processed and transmitted according to their actual
preferences while being aware of their privacy-related consequences of their
selections.