curriculum vitae dr. prokopios drogkarisknowledge and experience in the fields of it security and...

25
Page | 1 CURRICULUM VITAE Dr. Prokopios Drogkaris Adress : Lykourgou 105, Kallithea, Greece Date of Birth: 9 th October 1982 Contact Tel. Number: 6979 -11- 31-98 Nationality: Greek Email: [email protected] [email protected] Marital Status: Married Webpage: www.icsd.aegean.gr/pdrogk Military Obligations: Fulfilled SKILLS Knowledge and experience in the fields of IT Security and e-Government environments through participation in research national and international projects (proposals, tenders and projects’ implementation) along to strong academic background (research publications and academic teaching). Deep understanding of Privacy Enhancing Technologies (PET), Digital Identities and Identification Management (IdM) along to Information Security Management System (ISMS) as specified in ISO/IEC 27001:2005, including security requirements establishment, security risks assessment and management, security policies, access control, security incidents and business continuity management. EDUCATION Postdoctoral Research 4/2014 - Today University of Piraeus, Greece Department of Digital Systems Research Area: Methodologies for the Protection of Privacy in e-Government Information Systems

Upload: others

Post on 18-Nov-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: CURRICULUM VITAE Dr. Prokopios DrogkarisKnowledge and experience in the fields of IT Security and e-Government environments through participation in research national and international

Page | 1

CURRICULUM VITAE

Dr. Prokopios Drogkaris

Adress : Lykourgou 105, Kallithea,

Greece Date of Birth: 9th October 1982

Contact Tel.

Number: 6979 -11- 31-98 Nationality: Greek

Email: [email protected]

[email protected] Marital Status: Married

Webpage: www.icsd.aegean.gr/pdrogk Military Obligations: Fulfilled

SKILLS

Knowledge and experience in the fields of IT Security and e-Government environments

through participation in research national and international projects (proposals, tenders and

projects’ implementation) along to strong academic background (research publications and

academic teaching). Deep understanding of Privacy Enhancing Technologies (PET), Digital

Identities and Identification Management (IdM) along to Information Security Management

System (ISMS) as specified in ISO/IEC 27001:2005, including security requirements

establishment, security risks assessment and management, security policies, access control,

security incidents and business continuity management.

EDUCATION

■ Postdoctoral Research

4/2014 - Today

University of Piraeus, Greece

Department of Digital Systems

Research Area:

Methodologies for the Protection of

Privacy in e-Government

Information Systems

Page 2: CURRICULUM VITAE Dr. Prokopios DrogkarisKnowledge and experience in the fields of IT Security and e-Government environments through participation in research national and international

Page | 2

■ Doctor of Philosophy

9/2007 – 12/2013

University of the Aegean, Greece, School of Science,

Department of Information and Communication Systems

Engineering

Research Area: Information and Communication

Systems Security

PhD Thesis Title: Security and Privacy in e-

Government Information Systems

■ Postgraduate Studies

9/2005 – 9/2007

City University Of London, UK, School Of Informatics

Master of Science in Information Systems

■ Undergraduate Studies

9/2000 – 6/2005

University of the Aegean, Greece, School of Science

Department of Information and Communication Systems

Engineering

Diploma in Information and Communication Systems

Engineering

PUBLICATIONS

■ Journal Publications*

i. P. Drogkaris, S. Gritzalis, C. Lambrinoudakis, “Employing Privacy Policies and

Preferences in Modern e-Government Environments”, Special Issue on "Security

and Privacy of E-Government Applications and Services" of the International

Journal of Electronic Governance, 2014, Inderscience

(0)

■ Conference Publications*

x. L. Mitrou, P. Drogkaris, G. Leventakis, Legal and Social Aspects of Surveillance

Technologies: CCTV in Greece, International Conference on Citizens’ (0)

* The numbers inside the parentheses indicate the citations of each publication.

Page 3: CURRICULUM VITAE Dr. Prokopios DrogkarisKnowledge and experience in the fields of IT Security and e-Government environments through participation in research national and international

Page | 3

Perspectives on Surveillance, Security and Privacy: Controversies, Alternatives

and Solutions, November 2014, Vienna, Austria, Conference Proceedings

xi. P. Drogkaris, A. Gritzalis, C. Lambrinoudakis, “Empowering Users to Specify and

Manage their Privacy Preferences in e-Government Environments”, 3rd

International Conference on Electronic Government and the Information Systems

Perspective (EGOVIS 2014), Andrea Kö, Enrico Francesconi, (eds), pp. 237 -

245, September 2014, Munich, Germany, Springer LNCS

(0)

x. P. Drogkaris, G. Leventakis, A. Sfetsos, Promoting Law Enforcement Capabilities

through Asynchronous Training and Serious Games in the Fight against

Cybercrime, International Conference, The Rule of Law in a era of change:

Security, Social Justice and Inclusive Governance, June 2014, Athens, Greece,

Conference Proceedings

(0)

ix. D. Kostopoulos, V. Tsoulkas, G. Leventakis, P. Drogkaris, V. Politopoulou, “Real

Time Threat Prediction, Identification and Mitigation for Critical Infrastructure

Protection using Semantics, Event Processing and Sequential Analysis“, 8th

International Workshop on Critical Information Infrastructures Security (CRITIS

2013), September 2013, Holland, Lecture Notes in Computer Science LNCS,

Springer

(0)

viii. D. Kostopoulos, V. Tsoulkas, G. Leventakis, P. Drogkaris, V. Politopoulou, “A

Blend of Semantic Monitoring and Intrusion Detection Systems for the Protection

of Critical Infrastructures: Research efforts within the Greek Cybercrime Center“

(Keynote Speech), Fifth International Conference on Computanional Intelligence,

Communication Systems and Networks (CICSYN 2013), G. Romero, A. Orsoni,

(eds), June 2013, Spain, IEEE CPS

(0)

vii. D. Kostopoulos, V. Tsoulkas, G. Leventakis, P. Drogkaris, V. Politopoulou,

"Semantic Systems Modeling and Monitoring for Real Time Decision Making:

Results and Next Steps within the Greek Cyber Security Center of Excellence

(Keynote Speech)“, AMSS 15th International Conference on Modelling and

Simulation (UK-SIM 2013), April 2013, Cambridge University , IEEE CPS

(0)

vi. D. Núñez, I. Agudo, P. Drogkaris, S. Gritzalis, “Identity Management Challenges

for Intercloud Applications“, 1st International Workshop on Security & Trust for

Applications in Virtualised Environments (STAVE 2011), June, 2011, Loutraki,

Greece, Communications in Computer and Information Science Series CCIS,

(5)

Page 4: CURRICULUM VITAE Dr. Prokopios DrogkarisKnowledge and experience in the fields of IT Security and e-Government environments through participation in research national and international

Page | 4

Springer

v. P. Drogkaris, S. Gritzalis, “Attaching Multiple Personal Identifiers in X.509 Digital

Certificates”, EuroPKI 2010 7th European Workshop on Public Key Services,

Applications and Infrastructures, J. Camenisch and C. Lambrinoudakis, (Eds.), pp.

171-177, September 2010, Athens, Greece, Lecture Notes in Computer Science

LNCS, Springer

(1)

iv. P. Drogkaris, S. Gritzalis, C. Lambrinoudakis, "Transforming the Greek e-

Government Environment towards the e-Gov 2.0 Era", EGOVIS'10 International

Conference on Electronic Government and the Information Systems Perspective,

K. Andersen, E. Francesconi, A. Gronlund, T. M. Engers. (Eds.), pp. 142 -149,

September 2010, Bilbao, Spain, Lecture Notes in Computer Science LNCS,

Springer

(7)

iii. P. Drogkaris, C. Lambrinoudakis, S. Gritzalis, "Introducing Federated Identities to

One-Stop-Shop e-Government Environments: The Greek Case", eChallenges

2009 19th Conference, P. Cunningham, M. Cunningham (Eds.), pp 115 – 121,

October 2009, Istanbul, Turkey, eChallenges e-2009 Conference Proceedings

(0)

ii. P. Drogkaris, S. Gritzalis, C. Lambrinoudakis, "Enabling Secure Data

Management in e-Government Environments: The Greek Case", EGOV’09 8th

International Conference on Electronic Government, EGOV 2009, H. J. Scholl, M.

Janssen, R. Traunmüller, M. A. Wimmer (Eds.), pp. 138-145, September 2009,

Linz, Austria, Trauner Verlag Schriftenreihe Informatik

(0)

i. P. Drogkaris, D. Geneiatakis, S. Gritzalis, C. Lambrinoudakis, L. Mitrou, "Towards

an Enhanced Authentication Framework for eGovernment Services: The Greek

case", EGOV’08 7th International Conference on Electronic Government, E.

Ferro, J. Scholl, M. Wimmer (Eds.), pp. 189-196, September 2008, Torino, Italy,

Trauner Verlag Schriftenreihe Informatik

(6)

RESEARCH INTERESTS

■ e-Government Privacy, Security, Legal & Ethical Issues

■ Privacy Enhancing Technologies (PET)

■ Cloud Computing

■ Digital Authentication in e-Government Environments

■ Public Key Infrastructures

Page 5: CURRICULUM VITAE Dr. Prokopios DrogkarisKnowledge and experience in the fields of IT Security and e-Government environments through participation in research national and international

Page | 5

■ Federated Identities

■ Web 2.0

EDITING & CONFERENCE

ORGANIZATION ACTIVITIES

■ Member of Program Committee:

▪ The Ninth International Conference on Digital Society (ICDS 2015), (Lisbon : Portugal),

February 2015, IARIA XPS Press

▪ The Fourth International Conference on Social Eco-Informatics (SOTICS 2014), (Nice :

France), October 2014, IARIA XPS Press

▪ 11th International Conference on Trust, Privacy & Security in Digital Business

(TrustBus 2014), (Munich : Germany), September 2014, Springer LNCS

▪ European Conference on Social Media (ECSM 2014), (Brighton : United Kingdom),

July 2014, Academic Publishing International API

▪ 9th International Conference on Cyber Warfare and Security (ICCWS 2014), (West

Lafayette : USA), March 2014, Academic Publishing International API

▪ The Eighth International Conference on Digital Society (ICDS 2014), (Barcelona :

Spain), March 2014, IARIA XPS Press

▪ International Conference on Cloud Security Management (ICCSM-2013), (Seattle :

USA), October 2013, Academic Publishing International API

▪ 12th European Conference on Research Methodology for Business and Management

Studies (ECRM 2013), (Minho : Portugal), July 2013, Academic Publishing International

API

▪ 13th European Conference on eGovernment (ECEG 2013), (Como : Italy), June 2013,

Academic Publishing International API

▪ 8th International Conference on Information Warfare and Security (ICIW-2013),

(Denver : USA), March 2013, Academic Publishing International API

▪ The Seventh International Conference on Digital Society (ICDS 2013), (Nice : France),

February 2013, XPS (Xpert Publishing Services)

▪ The Second International Conference on Social Eco-Informatics (SOTICS 2012),

Page 6: CURRICULUM VITAE Dr. Prokopios DrogkarisKnowledge and experience in the fields of IT Security and e-Government environments through participation in research national and international

Page | 6

(Venice : Italy), October 2012, XPS (Xpert Publishing Services)

▪ 12th European Conference on eGovernment (ECEG 2012), (Barcelona : Spain), June

2012, Academic Publishing International API

▪ 11th European Conference on Research Methodology for Business and Management

Studies (ECRM 2012), (Bolton : United Kingdom), June 2012, Academic Publishing

International API

▪ 7th International Conference on Information Warfare and Security (ICIW 2012), (Seattle

: USA), March 2012, Thomson Reuters ISI Web of Science (WOS)

▪ The Sixth International Conference on Digital Society (ICDS 2012), (Valencia : Spain),

February 2012, XPS (Xpert Publishing Services)

▪ 11th European Conference on eGovernment (ECEG 2011), (Ljubljana : Slovenia), June

2011, Academic Publishing International API

▪ 6th International Conference on Information Warfare and Security (ICIW 2011)

(Washington: USA), March 2011, Thomson Reuters ISI Web of Science (WOS)

▪ The Fifth International Conference on Digital Society (ICDS 2011) (Gosier,

Guadeloupe: France), February 2011, XPS (Xpert Publishing Services)

■ Member of Organization Committee:

▪ 3rd IEEE International Conference on Cloud Computing Technology and Science

(CloudCom 2011), (Athens : Greece), November 2011, IEEE

▪ 2nd Annual Workshop on Digital Forensics and Incident Analysis (Greece: Samos),

August 2007, IEEE Computer Society Press

■ International Journals Editorial Board Member:

▪ International Journal On Advances in Internet Technology, IARIA

■ International Journals Reviewer:

▪ Computer Standards & Interfaces, Elsevier

▪ Transactions on Information Technology in BioMedicine, IEEE

Page 7: CURRICULUM VITAE Dr. Prokopios DrogkarisKnowledge and experience in the fields of IT Security and e-Government environments through participation in research national and international

Page | 7

■ External Reviewer:

▪ 47th Hawaiian International Conference on System Sciences (HICSS-47), (Big Island :

Hawaii), January 2014, IEEE

▪ 15th International Conference on Information & Communications Security (ICICS 2013),

(Beijing : China), November 2013, Springer LNCS

▪ 2nd International Conference on Advances in Computing, Communications and

Informatics (ICACCI-2013), (Mysore : India), August 2013, IEEE

▪ 10th International Conference on Security and Cryptography (SECRYPT 2013),

(Reykjavic : Iceland), July 2013, Springer CCIS

▪ 7th IFIP WG 11.11 International Conference on Trust Management, (Malaga : Spain),

June 2013, Springer LNCS

▪ The 7th International Conference on Network and System Security (NSS 2013),

(Madrid : Spain), June 2013, Springer LNCS

▪ 21st Euromicro International Conference on Parallel, Distributed, and Network-Based

Processing (PDP 2013), (Belfast : Ireland), February 2013, IEEE CPS

▪ 46th Hawaiian International Conference on System Sciences (HICSS-46),( Maui :

Hawaii), January 2013, IEEE

▪ The 4th International Symposium on Cyberspace Safety and Security (CSS 2012),

(Melbourne : Australia), December 2012, Springer LNCS

▪ 6th International Conference on Network and System Security (NSS 2012), (Fujian :

China), November 2012, Springer LNCS

▪ The 7th International Conference on Frontier of Computer Science and Technology

(FCST-12), (Suzhou : China), November 2012, FCST Conference Proceedings

▪ 9th European PKI Workshop: Research and Applications (EuroPKI 2012), (Pisa : Italy),

September 2012, Springer LNCS

▪ 11th IEEE International Conference on Trust, Security and Privacy in Computing and

Communications (IEEE TrustCom-12), (Liverpool : United Kingdom), June 2012, IEEE

▪ International Conference on Security and Cryptography (SECRYPT 2012), (Rome :

Page 8: CURRICULUM VITAE Dr. Prokopios DrogkarisKnowledge and experience in the fields of IT Security and e-Government environments through participation in research national and international

Page | 8

Italy), July 2012, Springer CCIS

▪ The 10th IEEE International Conference on Trust, Security and Privacy in Computing

and Communications (IEEE TrustCom-11), (Changsha : China), November 2011, IEEE

▪ 9th Annual IEEE Consumer Communications and Networking Conference, (Las Vegas :

USA), January 2012, IEEE

▪ 3rd IEEE International Conference on Cloud Computing Technology and Science

(CloudCom 2011), (Athens : Greece), November 2011, IEEE

▪ 2nd International Conference on Computer and Communication Technology (ICCCT

2011), (Allahabad : India), September 2011, IEEE Xplore

▪ 5th International Conference on Network and System Security (NSS 2011), (Milan :

Italy), September 2011, IEEE

▪ International Conference on Security and Cryptography (SECRYPT 2011), (Seville :

Spain), July 2011, SECRYPT Proceedings

▪ International Conference e-Commerce 2011 (EC 2011), (Rome : Italy), July 2011,

IADIS Conference Proceedings

▪ 7th International Workshop on Security and Trust Management (STM'11) in conjunction

with 5th IFIP WG 11.11 International Conference on Trust Management, (Copenhagen :

Denmark), July 2011, Springer LNCS

▪ 9th Annual Conference on Privacy, Security and Trust (PST 2011), (Montreal :

Canada), July 2011, IEEE Xplore

▪ 9th International Conference on Applied Cryptography and Network Security (ACNS

'11) , (Malaga : Spain), June 2011, Springer LNCS Series

▪ The 2010 International Conference on Multimedia Information NEtworking and Security

(MINES 2010), (Nanjing : China), November 2010, IEEE

▪ 5th International Conference on Critical Information Infrastructure Security (CRITIS 10),

(Athens : Greece), September 2010, Springer LNCS

▪ 15th European Symposium on Research in Computer Security (ESORICS 2010),

(Athens : Greece), September 2010, Springer LNCS series

▪ 6th International ICST Conference on Security and Privacy in Communication Networks

(SecureComm 2010), (Singapore : Singapore), September 2010, Springer's LNICST

Page 9: CURRICULUM VITAE Dr. Prokopios DrogkarisKnowledge and experience in the fields of IT Security and e-Government environments through participation in research national and international

Page | 9

▪ International Conference on Security and Cryptography (SECRYPT 2010) , (Athens :

Greece), July 2010, Springer-Verlag

▪ IADIS e-Commerce 2010 (EC 2010), (Freiburg : Germany), July 2010, InderScience

▪ IEEE Communications and Information Security Symposium (Globecom 2009), (Hawai

: USA), November 2009, IEEE Press

▪ 6th International Conference on Trust, Privacy & Security in Digital Business (Trustbus

2009) in conjunction with 20th International Conference on Database and Expert

Systems Applications (DEXA 2009) , (Linz : Austria), September 2009, Springer LNCS

series

▪ 13th Panhellenic Conference on Informatics (PCI' 09), (Corfu : Greece), September

2009, IEEE

▪ International Conference on e-Business (ICE-B 2009) in conjunction with International

Joint Conference on e-Business and Telecommunications, ICETE, (Milan : Italy), July

2009, ICE-B 2009 Proceedings

▪ 7th International Conference on Computing, Communications and Control Technologies

(CCCT 2009) in conjunction with 2nd International Multi-Conference on Engineering

and Technological Innovation (IMETI 2009), (Orlando : USA ), July 2009, Conference

Proceedings

▪ 8th Annual ISSA Conference (ISSA 2009), (Johannesburg : South Africa), July 2009,

ISSA proceedings

▪ 4th International Annual Workshop on Digital Forensics & Incident Analysis (WDFIA

2009), (Athens : Greece), June 2009, WDFIA Proceedings

▪ Third International Symposium on Human Aspects of Information Security & Assurance

(HAISA 2009), (Athens : Greece), June 2009, HAISA Proceedings

▪ 24th Annual ACM Symposium on Applied Computing, (Hawaii : USA), March 2009,

ACM Press

▪ The Fourth International Conference on Signal-Image Technology & Internet, (Bali :

Indonesia), December 2008, IEEE Conference Publishing Services (IEEE CSP)

▪ 3rd International Workshop on Critical Information Infrastructures Security, (Frascati

(Rome) : Italy), October 2008, Springer Lecture Notes in Computer Science

Page 10: CURRICULUM VITAE Dr. Prokopios DrogkarisKnowledge and experience in the fields of IT Security and e-Government environments through participation in research national and international

Page | 10

▪ 5th International Conference on Trust, Privacy and Security in Digital Business

(Trustbus 2008) in conjunction with DEXA 2008: 19th International Conference on

Database and Expert Systems Applications, (Torino : Italy), September 2008, Springer

▪ 7th Annual ISSA Information Security Conference, (Johannesburg : South Africa), July

2008, University of Johannensurg

▪ Fifth European PKI Workshop (EuroPKI 2008), (Trondheim : Norway), June 2008,

Springer in the Lecture Notes in Computer Science (LNCS)

▪ 2nd International Conference on Multimedia and Ubiquitous Engineering, (Busan :

Korea), April 2008, IEEE Computer Society

▪ 23rd Annual ACM Symposium on Applied Computing, (Ceará : Brasil), March 2008,

ACM Press

TEACHING ACTIVITIES

■ 03/2014 - 08/2014 University of Piraeus, Department of Digital Systems

Postgraduate Programme “Techno-economic Management &

Security of Digital Systems”

Advanced Security Technologies, Information Systems Security

and Information Systems Security Management Courses

■ 10/2010 – 6/2013 Technological Educational Institute of Piraeus, General

Department of Mathematics

Laboratory Associate

Teaching Structured Programming (Laboratory)

Introduction to Computer Programming I

(Laboratory)

Computer Programming I (Laboratory)

Computer Programming III (Laboratory)

■ 10/2012 – 1/2013 New York College Athens - School of Computing

▪ Instructor «Database Systems» and «Data Communications &

Networking» at BS. in Computer Science, State University of

Page 11: CURRICULUM VITAE Dr. Prokopios DrogkarisKnowledge and experience in the fields of IT Security and e-Government environments through participation in research national and international

Page | 11

New York -Empire State College

■ 10/2011 – 2/2013 Mediterranean College – School of Computing

▪ Instructor «Systems Analysis», «Introduction to Database

Systems», «Databases» and «Operating Systems» at BSc

(Hons) Computing and BSc (Hons) Computer Science,

University of Derby UK

▪ Instructor «Web Development Issues» at BSc (Hons)

Computing, University of Teeside UK

▪ Instructor «IT Applications – Project Management» at HND

Civil Engineering, Edexcel

■ 10/2010 – 2/2012 Technological Educational Institute of Kalamata, Department of

Technology of Informatics & Telecommunications.

Laboratory Associate

Teaching Databases II (Theory, Tutorial and

Laboratory)

Algorithms and Data Structures (Laboratory)

Software Engineering (Theory and

Laboratory)

Systems Analysis (Laboratory)

■ 2/2010 – 6/2010 University of the Aegean, Greece, School of Science,

Department of Information and Communication Systems

Engineering

Auxiliary Laboratory Teaching at “Information and

Communication Systems Security” Undergraduate Course

■ 2/2009 – 6/2009 University of the Aegean, Greece, School of Science,

Department of Information and Communication Systems

Engineering

Auxiliary Laboratory Teaching at “Information and

Communication Systems Security” Undergraduate Course

Page 12: CURRICULUM VITAE Dr. Prokopios DrogkarisKnowledge and experience in the fields of IT Security and e-Government environments through participation in research national and international

Page | 12

■ 23/1/2009 University of the Aegean, Greece, School of Science

Department of Information and Communication Systems

Engineering

Postgraduate Program in “Technologies and management of

information and communication systems”

Invited Lecture on «Security and Digital Authentication in e-

Government Environments»

R&D ACTIVITIES

■ 8/2014 - Today Center for Security Studies, Cyprus Neuroscience &

Technology Institute, Centre of Excellence in Terrorism,

Resilience, Intelligence & Organised Crime Research,

University of Piraeus, Advanced Integrated Technology

Solutions & Services Ltd, Mezza Group

Project Manager and Researcher: “Engaging Users in

Preventing and Fighting Cyber Crime (UINFC2)”

(www.uinfc2.eu)

■ 4/2014 - Today Vicomtech Vicom, Kinesense, Aditess, FINT, ITI, Center for

Secutity Studies, SRM ICOMTECH VICOM

Ethical Manager and Researcher: “Petty criminality diminution

through search and analysis in multi-source video Capturing

and archiving platform (P-REACT)”

(www.p-react.eu)

■ 9/2013 - Today Ministry of Interior Spain, ISDEFE, Center for Security Studies

Project Manager at Partner’s Level and Researcher: “Critical

Infrastructure Improvement of Security Control against the

Terrorist Threat (CIISC-T2)”

(www.ciisct2.eu)

Page 13: CURRICULUM VITAE Dr. Prokopios DrogkarisKnowledge and experience in the fields of IT Security and e-Government environments through participation in research national and international

Page | 13

■ 7/2013 – 8/2014 THALES Communications S.A., National Centre for Scientific

Research (NCSR) “Demokritos”, Center For Security Studies,

TELETEL, S.A., AMPER SISTEMAS, S.A., Cluster TIC

Seguridad y Confianza, Empresa de Serviços e

Desenvolvimento de Software, S.A., Rohill Technologies B.V.,

THYIA TEHNOLOGIJE D.O.O., Rinicom Ltd.

Ethical Committee Member – Researcher: “Heterogeneous

Interoperable Transportable GATEway for First-Responders

(HIT-GATE)”

(www.hit-gate.eu)

■ 4/2013 - Today Vitamib, Atos Spain S.A., Centre for Irish and European

Security, Market & Opinion Research International, Center for

Security Studies, The Hebrew University of Jerusalem, National

Center for Scientific Research "DEMOKRITOS", Rand Europe,

Institutt for Fredsforsking Stiftelse, University of Westminster,

Centre for Science, Society and Citizenship

Project Manager at Partner’s Level and Researcher: “Public

Perception of Security and Privacy: Assessing Knowledge,

Collecting Evidence, Translating Research into Action (PACT)”

(www.projectpact.eu)

■ 2/2013 - Today FORTH-ICS, SafeNet, AUTH-LEPS, Center for Security Studies

Project Manager at Partner’s Level and Researcher:

“A CyberCrime Center of Excellence for

Training, Research and Education in Greece (GCC)”

(www.cybercc.gr)

■ 8/2012 – 11/2013 Ministry of Development, Competiveness, Infrastructure,

Transport and Networks, Interreg III, Cyprus University of

Technology, Technical University of Crete, University of the

Aegean, Cyprus Police

Researcher on international project “Development of Intelligent

Sea Space surveillance system with the application of Array

Page 14: CURRICULUM VITAE Dr. Prokopios DrogkarisKnowledge and experience in the fields of IT Security and e-Government environments through participation in research national and international

Page | 14

Camera and Sensor Networks (POSEIDON)”

(www.poseidonproject.eu)

■ 11/2012 – 12/2012 National and Kapodistrian University of Athens, Administrative

Reform 2007-2013, Ministry of Administrative Reform & e-

Government

Researcher on national project “Comparative study of the

European Union and Greece for a) e-Government, b) Trust and

Security, and c) Fast and Ultra-Fast internet access. Deviations,

performance indicators and recommendations for national

actions”.

■ 11/2012 – 2/2013 PAU Education & European Commision - Digital Agenda for

Europe - Going Local 2012 (http://www.digitalagenda12.eu)

Cyprus and Greece Animator

■ 4/2012 – 12/2012 PAU Education & European Commision - Digital Agenda for

Europe - Digital Agenda Assembly 2012

(http://www.digitalagenda12.eu)

Security Group Animator and Moderator

■ 11/2010 – 10/2011 Ministry of Transportations, Structures and Networks

Digital Greece 2020 Forum (www.digitalgreece2020.gr)

Privacy and Security Group Rapporteur

■ 1/2007 – 12/2008 KTP ΑΕ – Ministry of the Interior, Public Administration and

Decentralization - PLANET AE, NTUA

Researcher on national project «eGIF: Greek e-Government

Interoperability Framework: Digital Authentication Framework»

EMPLOYMENT ACTIVITIES

Page 15: CURRICULUM VITAE Dr. Prokopios DrogkarisKnowledge and experience in the fields of IT Security and e-Government environments through participation in research national and international

Page | 15

■ 2/2013 - Today Center for Security Studies (KEMEA)

Research Associate on EU-funded and National Research

Projects and Studies

■ 1/2009 – 7/2009 Unisystems Α.Ε.Ε

User Training and Software Support at Samos Prefecture

Information Systems

■ 1/2005 – 8/2005 Laboratory of Information and Communication Systems

Security (Info-Sec-Lab), University of the Aegean

Researcher on project « Design and development of a

department database for maintaining all students personal and

educational data »

■ 10/2004 – 2/2005 Laboratory of Information and Communication Systems

Security (Info-Sec-Lab), University of the Aegean

Researcher on project « Development and Deployment of a

smart card based PKI infrastructure for authentication and

authorization mechanisms for all University users (students

and faculty)»

LANGUAGES

■ English

Excellent

Knowledge

6/1999 Certificate of Proficiency in English,

University Of Cambridge

■ German

Good

Knowledge

9/1998 Grundstuffe Zertifikat

Goethe-Institut

Page 16: CURRICULUM VITAE Dr. Prokopios DrogkarisKnowledge and experience in the fields of IT Security and e-Government environments through participation in research national and international

Page | 16

COMPUTER SKILLS

■ Methodologies & Standards CRAMM, Octave, ISO/IEC 27001:2005 Certified ISMS

Auditor

■ Programming Languages: Visual Basic, C, C WinAPI, C++, Java, SQL

■ Databases: MS SQL, MySQL, PostgreSQL, MS Access

■ Modeling and Analysis Tools: UML, SSADM

■ Web Programming: HTML, PHP, ASP, VBscript, JavaScript, XML, CSS

■ Operating Systems: Linux (Ubuntu), Windows (NT/200/Server

2003/XP/Vista/7)

MEMBER

■ 12/2006 - Today : Technical Chamber of Greece (T.E.E.)

■ 9/2006 - Today : Laboratory of Information and Communication Systems

Security (Info-Sec-Lab), University of the Aegean

■ 5/2005 - Today : Greek Computer Society (E.P.Y.)

■ 10/2012 – Today: Open Web Application Security Project (OWASP)

■ 8/2013 – Today: EC NIS Platform - WG1 (Risk Management) Member

RECCOMENDATION LETTERS

Furnished upon request

Page 17: CURRICULUM VITAE Dr. Prokopios DrogkarisKnowledge and experience in the fields of IT Security and e-Government environments through participation in research national and international

Page | 17

CITATIONS

■ Publication

P. Drogkaris, D. Geneiatakis, S. Gritzalis, C. Lambrinoudakis, L. Mitrou, "Towards an

Enhanced Authentication Framework for eGovernment Services: The Greek case",

EGOV’08 7th International Conference on Electronic Government, E. Ferro, J. Scholl, M.

Wimmer (Eds.), pp. 189-196, September 2008, Torino, Italy, Trauner Verlag Schriftenreihe

Informatik

■ Citations

1. Lampathaki F., Tsiakaliaris C., Stasis A., Charalabidis Y., "National Interoperability

Frameworks: The Way Forward", Interoperability in Digital Public Services and

Administration: Bridging E-Government and E-Business, pp. 1-24, IGI Global, 2011

2. lomp M., Grijpink J., "Combating Identity Fraud in the Public Domain: Information

Strategies for Healthcare and Criminal Justice", Proceedings of the 11th European

Conference on e-Government, Klun M., Decman M., Jukić T. (Eds), pp.481-488, 2011,

Ljubljana, Slovenia, Academic Publishing Limited

3. Z. Kardasiadou, E. Chatziliasi and K. Limniotis, "E-Government in Greece: Serving

State’s Economic Needs – Respecting the Fundamental Right to Data Protection", in

the 7th International Conference in Global Security, Safety and Sustainability (ICGS3)

/ 4th e-Democracy Joint Conferences, R. Bashroush, et al. (Eds.), Springer, 2011

4. Al-Hujra, O, Al-dalahmeh,M and Aloudat, A. “The Role of National Culture on Citizen

Adoption of eGovernment Services: An Empirical Study” Electronic Journal of e-

Government Volume 9 Issue 2, pp. 93 – 106, 2011

5. Z. Kardasiadou, E. Chatziliasi, K. Limniotis. “E-Government in Greece: Serving State’s

Economic Needs – Respecting the Fundamental Right to Data Protection” Global

Security, Safety and Sustainability & e-Democracy, pp. 179-185, Springer, 2012,

ISBN: 978-3-642-33448-1

6. Plomp, M and Grijpink, J. “Towards an Information Strategy for Combating Identity

Page 18: CURRICULUM VITAE Dr. Prokopios DrogkarisKnowledge and experience in the fields of IT Security and e-Government environments through participation in research national and international

Page | 18

Fraud in the Public Domain: Cases from Healthcare and Criminal Justice” Electronic

Journal of e-Government Volume 9 Issue 2 2011, (pp. 214 - 222)

■ Publications

D. Nunez , I. Agudo, P. Drogkaris, S. Gritzalis, “Identity Management Challenges for

Intercloud Applications”, 1st International Workshop on Security & Trust for

Applications in Virtualised Environments (STAVE 2011), C. Skianis, (Ed.), pp. 198-

204, June 2011, Loutraki, Greece, Springer CCIS

▪ Citations

1. P.G. Dorey, A. Leite, "Commentary : Cloud computing – A security problem or

solution?", Information Security Technical Report, ISSN 1363-4127,

10.1016/j.istr.2011.08.004., 2011, Elsevier

2. R. Roman, M. R. Felipe, P. E. Gene, and J. Zhou, ‘Analysis of security components in

cloud storage systems’, APMRC, 2012 Digest, pp. 1–4, Nov. 2012.

3. Yung-Feng Lu and Chin-Fu Kuo. “Robust and flexible tunnel management for secure

private cloud”. SIGAPP Appl. Comput. Rev. 13, pp. 41-50, 2013, ACM

4. S. Bendoukha, D. Moldt, T. Wagner : Enabling Cooperation in an Inter-cloud

Environment: An Agent-Based Approach, , 2013 24th International Workshop on

Database and Expert Systems Applications (DEXA), pp. 217 – 221, 2013, Springer

5. A. Toosi, R. Calheiros, R. Buyys, “Interconnected Cloud Computing Environments:

Challenges,Taxonomy and Survey”, ACM Computing Surveys, 2014 , Volume 47,

Issue 1, ACM

■ Publication

P. Drogkaris, S. Gritzalis, C. Lambrinoudakis, "Transforming the Greek e-Government

Environment towards the e-Gov 2.0 Era", EGOVIS'10 International Conference on

Electronic Government and the Information Systems Perspective, K. Andersen, E.

Francesconi, A. Gronlund, T. M. Engers. (Eds.), pp. 142 -149, September 2010, Bilbao,

Spain, Lecture Notes in Computer Science LNCS, Springer

Page 19: CURRICULUM VITAE Dr. Prokopios DrogkarisKnowledge and experience in the fields of IT Security and e-Government environments through participation in research national and international

Page | 19

▪ Citations

1. M. Prandini, M. Ramilli, “Security considerations about the adoption of web 2.0

technologies in sensitive e-government processes”, ICEGOV '11 5th International

Conference on Theory and Practice of Electronic Governance, Ed(s) E. Estevez,

M.Janssen and N. Leosk pp. 285-288, September 2011, Tallinn Estonia, ACM Press

2. Gil-Garcia, J. Ramon, “Electronic Government Success: Definition, Measures, and

Factors”, Enacting Electronic Government Success, Springer US, 2012, ISBN: 978-1-

4614-2015-6

3. U. Sivarajah, Z. Irani, “Exploring the Application of web 2.0 in e-Government: A United

Kingdom Context”, tGov 2012, May 2012, Brunel, United Kingdom, ISEing Group

Brunel University

4. M. Prandini, M. Ramilli, “Raising Risk Awareness on the Adoption of Web 2.0

Technologies in Decision Making Processes”, Future Internet 2012, 4(3), pp. 700-718,

ISSN 1999-5903, MDPI Publications

5. R. T. Khasawneh, E. A. Abu, “E-Government and Social Media Sites: The Role and

Impact”, World Journal of Computer Application and Technology, Vol. 1, pp. 10 - 17,

2013

6. U, Sivarajah, Z. Irani, “A Theoretical Model For The Application Of Web 2.0 In E-

Government”. European, Mediterranean & Middle Eastern Conference on Information

Systems 2013 (EMCIS2013), October 17-18, 2013, Windsor, UK

7. K, Zafiropoulos, K. Antoniadis, V. Vrana, “Sharing Followers in e-Government Twitter

Accounts: The Case of Greece”, Future Internet Journal, Volume 6, Issue 2, 2014,

MDPI

■ Publications

P. Drogkaris, S. Gritzalis, “Attaching Multiple Personal Identifiers in X.509 Digital

Certificates”, EuroPKI 2010 7th European Workshop on Public Key Services, Applications

and Infrastructures, J. Camenisch and C. Lambrinoudakis, (eds), pp. 171-177, September

2010, Athens, Greece, Springer LNCS

Page 20: CURRICULUM VITAE Dr. Prokopios DrogkarisKnowledge and experience in the fields of IT Security and e-Government environments through participation in research national and international

Page | 20

▪ Citations

1. M. Schmidt, M. Ramilli, “Vertrauenswürdige Identitäten mit dem neuen

Personalausweis”, Diplomarbeit am Institut fur Informatik der Freien Universit at Berlin,

July 2012

SCIENTIFIC PUBLICATIONS ANATYLIC MEMO

■ Journal Publications

Authors: P. Drogkaris, S. Gritzalis, C. Lambrinoudakis

Publication

Data:

“Exploring the Incorporation of Privacy Policies and Preferences in Modern e-

Government Environments”, special issue on "Security and Privacy of E-

Government Applications and Services" of the International Journal of Electronic

Governance, pp. 101-116 , 2013, Inderscience

Abstract: The evolvement of e-Government has increased users’ concerns on personal

data disclosure and privacy threats as more and more information is released to

a rising number of governmental service providers. This paper addresses the

consideration of users retaining control over their personal information while

relishing advanced governmental electronic services. Additionally, it proposes a

simple, yet effective, architecture which promotes the embodiment of Privacy

Policies and Preferences in modern e-Government environments that aim to

simplify the provision of electronic services while preserving users’ personal

data and information privacy.

■ Conference Publications

Page 21: CURRICULUM VITAE Dr. Prokopios DrogkarisKnowledge and experience in the fields of IT Security and e-Government environments through participation in research national and international

Page | 21

Authors: P. Drogkaris, D. Geneiatakis, S. Gritzalis, C. Lambrinoudakis, L. Mitrou

Publication

Data:

"Towards an Enhanced Authentication Framework for eGovernment Services:

The Greek case", EGOV’08 7th International Conference on Electronic

Government, E. Ferro, J. Scholl, M. Wimmer (Eds.), pp. 189 – 196, September

2008, Torino, Italy, Trauner Verlag Schriftenreihe Informatik

Abstract: It is widely accepted that electronic Government environments have caused a

complete transformation of the way individuals, businesses and governmental

agencies interact with central government. However, the acceptance and

success of e-Government services largely depend on the level of trust and

confidence developed by the users to the provided services and the overall

system security. Thus the employment of the appropriate authentication

framework is a crucial factor. This paper focuses on the way to determine the

appropriate trust level of an electronic service. Specifically, it provides

guidelines according to the data required for a transaction, as well as to the

available authentication and registration mechanisms. Moreover, a Single

SignOn architecture is proposed, supporting a uniform authentication procedure

that depends on the level of trust required by the service. In the aforementioned

research work specific requirements and limitations for Greece have been taken

into account.

Authors: P. Drogkaris, S. Gritzalis, C. Lambrinoudakis,

Publication

Data:

"Enabling Secure Data Management in e-Government Environments: The

Greek Case", EGOV’09 8th International Conference on Electronic

Government, EGOV 2009, H. J. Scholl, M. Janssen, R. Traunmüller, M. A.

Wimmer (Eds.), pp. 138-144, September 2009, Linz, Austria, Trauner Verlag

Schriftenreihe Informatik

Abstract: Modern e-Government environments adopt technologies that can support

interoperability across the entire “electronic” public sector and thus new

improved electronic services. At the same time new requirements are raised

from the users. This paper presents ongoing research on a secure user data

Page 22: CURRICULUM VITAE Dr. Prokopios DrogkarisKnowledge and experience in the fields of IT Security and e-Government environments through participation in research national and international

Page | 22

management architecture for e-Government environments. More specifically

the utilization of Privacy Preferences and Privacy Policies along with the

introduction of two entities responsible for administrating user documents and

data management is proposed. The research work presented has been based

on the Greek Interoperability Framework and it’s specific requirements and

limitations.

Authors: P. Drogkaris. C. Lambrinoudakis, S. Gritzalis

Publication

Data:

"Introducing Federated Identities to One-Stop-Shop e-Government

Environments: The Greek Case", eChallenges 2009 19th Conference, P.

Cunningham, M. Cunningham (Eds.), pp 115 – 121, October 2009, Istanbul,

Turkey, eChallenges e-2009 Conference Proceedings

Abstract: Even though e-Government environments have achieved a certain

interoperability level and coherence across public sector, there are several

approaches, technologies and mechanisms that could aid these environments

towards delivering more user-centric electronic services. This paper focuses on

the aspect of identity management. More specifically it presents a framework

that incorporates the notion of federation and federated identities in order to

overcome the impediment of per-sector identifiers. Moreover, it provides Single

Sign-On access to electronic services through the utilization of a linking

mechanism. This framework has been based on the Greek Interoperability

Framework and its specific requirements and limitations.

Authors: P. Drogkaris, S. Gritzalis, C. Lambrinoudakis

Publication

Data:

“Transforming the Greek e-Government Environment towards the e-Gov 2.0

Era”, EGOVIS'10 International Conference on Electronic Government and the

Information Systems Perspective, K. N. Andersedn, E. Francesconi, Å.

Grönlund, T. M. Engers (Eds.), pp. 142 -149, September 2010, Bilbao, Spain,

Lecture Notes in Computer Science LNCS, Springer

Abstract: Modern e-Government environments across the public sector have achieved

Page 23: CURRICULUM VITAE Dr. Prokopios DrogkarisKnowledge and experience in the fields of IT Security and e-Government environments through participation in research national and international

Page | 23

significant interoperability and coherence but are now in front of the next leap

forward, which is the adaptation of Web 2.0 technologies. This transition

towards e-Government 2.0 will not only improve participation, transparency and

integration but it will also speed up the pace of innovation through collaboration

and consultation. This paper presents an enhanced Greek e-Government

Framework that fully incorporates Web 2.0 technologies along with an

identification mechanism that retains compliance with existing authentication

sub-framework taking into account the specific needs and requirements of the

Greek Governmental Agencies.

Authors: P. Drogkaris, S. Gritzalis

Publication

Data:

"Attaching Multiple Personal Identifiers in X.509 Digital Certificates",

EuroPKI'10 7th European Workshop on Public Key Services, Applications and

Infrastructures, J. Camenisch and C. Lambrinoudakis, (Eds.), pp. 171-177,

September 2010, Athens, Greece, Springer LNCS

Abstract: The appeals for interoperable and decentralized Electronic Identity

Management are rapidly increasing, especially since their contribution towards

interoperability across the entire “electronic” public sector, effective information

sharing and simplified access to electronic services, is unquestioned. This

paper presents an efficient and user-centric method for storing multiple users’

identifiers in X.509 digital certificates while preserving their confidentiality,

allowing for interoperable user identification in environments where users

cannot be identified by an all embracing unique identifier.

Authors: D. Núñez, I. Agudo, P. Drogkaris, S. Gritzalis

Publication

Data:

“Identity Management Challenges for Intercloud Applications“, 1st International

Workshop on Security & Trust for Applications in Virtualised Environments

(STAVE 2011), pp. 198-204, June, 2011, Loutraki, Greece, Communications in

Computer and Information Science Series CCIS, Springer

Page 24: CURRICULUM VITAE Dr. Prokopios DrogkarisKnowledge and experience in the fields of IT Security and e-Government environments through participation in research national and international

Page | 24

Abstract: Intercloud notion is gaining a lot of attention lately from both enterprise and

academia, not only because of its benefits and expected results but also due to

the challenges that it introduces regarding interoperability and standardisation.

Identity management services are one of the main candidates to be outsourced

into the Intercloud, since they are one of the most common services needed by

companies and organisations. This paper addresses emerging identity

management challenges that arise in intercloud formations, such as naming,

identification, interoperability, identity life cycle management and single sign-

on.

Authors: D. Kostopoulos, V. Tsoulkas, G. Leventakis, P. Drogkaris, V.Politopoulou

Publication

Data:

“Real Time Threat Prediction, Identification and Mitigation for Critical

Infrastructure Protection using Semantics, Event Processing and Sequential

Analysis”, 8th International Workshop on Critical Information Infrastructures

Security (CRITIS 2013), September 2013, Holland, Lecture Notes in Computer

Science LNCS, Springer

Abstract: Seamless and faultless operational conditions of multi stakeholder Critical

Infrastructures (CIs) are of high importance for today’s societies on a global

scale. Due to their population impact, attacks against their interconnected

components can create serious damages and performance degradation which

eventually can result in a societal crisis. Therefore it is crucial to effectively and

timely protect these high performance - critical systems against any type of

malicious cyber-physical intrusions. This can be realized by protecting CIs

against threat consequences or by blocking threats to take place at an early

stage and preventing further escalation or predicting threat occurrences and

have the ability to rapidly react by eliminating its roots. In this paper a novel

architecture is proposed in which these three ways of confronting with cyber –

physical threats are combined using a novel semantics based risk methodology

that relies on real time behavioral analysis. The final prototype provides the CI

operator with a decision tool (DST) that imprints the proposed approach and

which is capable of alerting on new unknown threats, generate suggestions of

Page 25: CURRICULUM VITAE Dr. Prokopios DrogkarisKnowledge and experience in the fields of IT Security and e-Government environments through participation in research national and international

Page | 25

the required counter-actions and alert of probable threat existence. The

implemented architecture has been tested and validated in a proof of concept

scenario of an airport CI with simulated monitoring data.

Authors: P. Drogkaris, S. Gritzalis, C. Lambrinoudakis

Publication

Data:

Empowering Users to Specify and Manage their Privacy Preferences in e-

Government Environments”, 3rd International Conference on Electronic

Government and the Information Systems Perspective (EGOVIS 2014), Andrea

Kö, Enrico Francesconi, (eds), (to appear), September 2014, Munich,

Germany, Springer LNCS

Abstract: The provision of advanced e-Government services has raised users’ concerns

on personal data disclosure and privacy threats as more and more information

is released to various governmental service providers. Towards this direction,

the employment of Privacy Policies and Preferences has been proposed in an

attempt to simplify the provision of electronic services while preserving users’

personal data and information privacy This paper addresses the consideration

of users to create, manage and fine-tune their privacy preferences in a user

friendly, yet efficient way. It presents a Graphical User Interface (GUI) which

empowers them to articulate their preferences in machine readable format and

resolve possible conflicts with Service Provider’s (SP) policy, without being

obliged to go through complex and nuanced XML documents or being familiar

with privacy terminology. Users can now be confident that their personal data

will be accessed, processed and transmitted according to their actual

preferences while being aware of their privacy-related consequences of their

selections.