2005 |
Stefanos Gritzalis, Spyros Kokolakis, Maria Karyda, Constantinos Lambrinoudakis, S. Dritsas, Lazaros Gymnopoulos, Theodoros Balopoulos, Employing Ontologies for the Developmentof Security Critical Applications: The Secure e-Poll Paradigm, IFIP I3E International Conference on eBusiness,eCommerce, and eGovernemnt, M. Funabashi, A. Grzech, YES, 187-201, Οκτώβριος, 2005, Poznan, Poland, Springer |
| | |
Stefanos Gritzalis, E. Kavakli, C. Kalloniatis, Matching user Privacy Requirements to Implementation Techniques, HERCMA 2005 7th Hellenic European Research on Computer Mathematics and its Applications Conference, E. Lypitakis, YES, Σεπτέμβριος, 2005, Athens, Greece, LEA Publisher |
| | |
Stefanos Gritzalis, Georgios Kambourakis, Aggelos Rouskas, Eleni Klaoudatou, N. Doukas, Evaluation of digital certificates acquisition in large-scale 802.11-3GPP Hybrid Environments, 14th IEEE International Workshop on Local and Metropolitan Area Networks (LANMAN ‘05), 176-181, Σεπτέμβριος, 2005, Chania, Greece, IEEE CPS |
| | |
Stefanos Gritzalis, Georgios Kambourakis, Constantinos Lambrinoudakis, Dimitris Geneiatakis, T. Dagiuklas, SIP Message Tampering: THE SQL code INJECTION attack, 13th IEEE International Conference on Software, Telecommunications and Computer Networks (SoftCOM ‘05), N. Rozic et al., YES, 176-181, Σεπτέμβριος, 2005, Split, Croatia, IEEE CPS |
| | |
Stefanos Gritzalis, Georgios Kambourakis, Constantinos Lambrinoudakis, Dimitris Geneiatakis, T. Dagiuklas, A Framework for Detecting Malformed Messages in SIP Networks, 14th IEEE International Workshop on Local and Metropolitan Area Networks (LANMAN ‘05), Σεπτέμβριος, 2005, Chania, Greece, IEEE CPS |
| | |
Stefanos Gritzalis, Maria Karyda, Petros Belsis, C. Skourlas, I. Chalaris, M. Chalaris, Designing the Provision of PKI services for eGovernment, HERCMA 2005 7th Hellenic European Research on Computer Mathematics and its Applications Conference, E. Lypitakis, YES, Σεπτέμβριος, 2005, Athens, Greece, LEA publisher |
| | |
Stefanos Gritzalis, S. Katsikas, F. Trochoutsos, G. Charamis, Information Systems Security Effective Guidelines for “Participants”, HERCMA 2005 7th Hellenic European Research on Computer Mathematics and its Applications Conference, E. Lypitakis, YES, , Σεπτέμβριος, 2005, Athens, Greece, LEA Publisher |
| | |
Stefanos Gritzalis, Petros Belsis, C. Skourlas, A. Malatras, I. Chalaris, Sec-Shield: Security Preserved Distributed Knowledge Management between Autonomous Domains, DEXA, G. Pernul, J. Lopez, YES, 10-19, Αύγουστος, 2005, Copenhagen, Denmark, Springer |
| | |
Stefanos Gritzalis, E. Kavakli, C. Kalloniatis, PriS Methodology: Incorporating Privacy Requirements into the System Design Process, 13th IEEE International Requirements Engineering Conference – Symposium on Requirements Engineering , J. Mylopoulos, G. Spafford , YES, Αύγουστος, 2005, Paris, France, IEEE CPS |
| | |
Stefanos Gritzalis, Lazaros Gymnopoulos, Introducing Ontology-based Security Policy Management in the GRID, ECIW 2005 4th European Conference on Information Warfare and Security, 107-116, Ιούλιος, 2005, Glamorgan, United Kingdom, Academic Conferences Limited |
| | |