2006 |
Stefanos Gritzalis, Spyros Kokolakis, Maria Karyda, Lazaros Gymnopoulos, Theodoros Balopoulos, S. Katsikas, A Framework for Exploiting Security Expertise in Application Development, TrustBus’06 3rd International Conference on Trust, Privacy, and Security in the Digital Business, S. Furnell, C. Lambrinoudakis, S. Fischer-Huebner, YES, 62-70, Σεπτέμβριος, 2006, Krakow, Poland, Lecture Notes in Computer Science LNCS Vol. 4083, Springer |
| | |
Stefanos Gritzalis, Spyros Kokolakis, Maria Karyda, Constantinos Lambrinoudakis, S. Dritsas, Lazaros Gymnopoulos, Theodoros Balopoulos, Developing a Security Patterns Repository for Secure Applications Design, ECIW 2006 5thEuropean Conference on Information Warfare and Security, C. Candolin et al., YES, 51-60, Ιούνιος, 2006, Helsinki, Finland, ACL Academic Conferences Limited |
| | |
Stefanos Gritzalis, Spyros Kokolakis, Maria Karyda, Constantinos Lambrinoudakis, S. Dritsas, Lazaros Gymnopoulos, Theodoros Balopoulos, An Ontology for Secure e-Government applications, DeSeGov’06 Workshop on Dependability and Security in eGovernment, A. Tjoa, E. Schweighofer, YES, 1033-1037, Απρίλιος, 2006, Vienna, Austria, IEEE CPS |
| | |
2005 |
Stefanos Gritzalis, Spyros Kokolakis, Maria Karyda, Constantinos Lambrinoudakis, S. Dritsas, Lazaros Gymnopoulos, Theodoros Balopoulos, Employing Ontologies for the Developmentof Security Critical Applications: The Secure e-Poll Paradigm, IFIP I3E International Conference on eBusiness,eCommerce, and eGovernemnt, M. Funabashi, A. Grzech, YES, 187-201, Οκτώβριος, 2005, Poznan, Poland, Springer |
| | |
Stefanos Gritzalis, Spyros Kokolakis, Maria Karyda, S. Dritsas, Lazaros Gymnopoulos, Theodoros Balopoulos, Incorporating Security Requirements into the Software Development Process, ECIW 2005 4th European Conference on Information Warfare and Security, 21-28, Ιούλιος, 2005, Glamorgan, United Kingdom, Academic Conferences Limited |
| | |
2004 |
Spyros Kokolakis, E. Kiountouzis, Maria Karyda, Information Systems Security and the Structuring of Organisations, 7th International Conference on the Social and Ethical Impacts of Information and Communication Technologies (ETHICOMP 2004), T. Bynum, N. Pouloudi, S. Rogerson, T. Spyrou, YES, 451-461, Απρίλιος, 2004, Syros, Greece, University of the Aegean |
| | |
2003 |
Spyros Kokolakis, Constantinos Lambrinoudakis, D. Gritzalis, A Knowledge-Based Repository Model for Security Policies Management, MMM-ACNS-2003 2nd International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security, V. Gorodetski, L. Popyack, V. Skormin , YES, 112-121, Σεπτέμβριος, 2003, St. Petersburg, Russia, Springer, LNCS 2776 |
| | |
Spyros Kokolakis, Maria Karyda, Constantinos Lambrinoudakis, S. Katsikas, D. Gritzalis, V. Tsoumas, Electronic Voting Systems: Security Implications of the Administrative Workflow, 14th International Workshop on Database and Expert Systems Applications (DEXA 2003), W06: International Workshop on Trust and Privacy in Digital Business (TrustBus), 467-471, Σεπτέμβριος, 2003, Prague, Czech, IEEE Computer Society Press |
| | |
Spyros Kokolakis, Euripidis Loukis, Computer supported collaboration in the public sector: the ICTE-PAN project, 2nd EGOV Conference , Σεπτέμβριος, 2003, Prague, Czech Republic |
| | |
Spyros Kokolakis, E. Kiountouzis, Maria Karyda, Content, Context, Process Analysis of IS Security Policy Formation, 18th IFIP International Conference on Information Security, D. Gritzalis, S. de Capitani di Vimercati, P. Samarati, S.K.Katsikas , YES, 145-156, Μάιος, 2003, Athens, Greece, Kluwer Academic Publishers |
| | |