dblp.uni-trier.dewww.uni-trier.de

Dimitris Gritzalis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
45EEStelios Dritsas, Vicky Dritsou, Bill Tsoumas, P. Constantopoulos, Dimitris Gritzalis: OntoSPIT: SPIT management through ontologies. Computer Communications 32(1): 203-212 (2009)
2008
44EEYannis Soupionis, Stelios Dritsas, Dimitris Gritzalis: An Adaptive Policy-Based Approach to SPIT Management. ESORICS 2008: 446-460
43EEStelios Dritsas, Yannis Soupionis, Marianthi Theoharidou, Yannis Mallios, Dimitris Gritzalis: SPIT Identification Criteria Implementation: Effectiveness and Lessons Learned. SEC 2008: 381-395
42EEDimitris Gritzalis, Yannis Mallios: A SIP-oriented SPIT Management Framework. Computers & Security 27(5-6): 136-153 (2008)
2007
41EEDimitrios Lekkas, Dimitris Gritzalis: E-Passports as a Means Towards the First World-Wide Public Key Infrastructure. EuroPKI 2007: 34-48
40EEGiannis F. Marias, Stelios Dritsas, Marianthi Theoharidou, John Mallios, Dimitris Gritzalis: SIP Vulnerabilities and Anti-SPIT Mechanisms Assessment. ICCCN 2007: 597-604
39EEStelios Dritsas, John Mallios, Marianthi Theoharidou, Giannis F. Marias, Dimitris Gritzalis: Threat Analysis of the Session Initiation Protocol Regarding Spam. IPCCC 2007: 426-433
38EEAggeliki Tsohou, Marianthi Theoharidou, Spyros Kokolakis, Dimitris Gritzalis: Addressing Cultural Dissimilarity in the Information Security Management Outsourcing Relationship. TrustBus 2007: 24-33
37EEMarianthi Theoharidou, Eleftheria Stougiannou, Dimitris Gritzalis: A CBK for Information Security and Critical Infrastructure Protection. World Conference on Information Security Education 2007: 49-56
2006
36EEBill Tsoumas, Dimitris Gritzalis: Towards an Ontology-based Security Management. AINA (1) 2006: 985-992
35EEBill Tsoumas, Panagiotis Papagiannakopoulos, Stelios Dritsas, Dimitris Gritzalis: Security-by-Ontology: A Knowledge-Centric Approach. SEC 2006: 99-110
34EEStelios Dritsas, John Tsaparas, Dimitris Gritzalis: A Generic Privacy Enhancing Technology for Pervasive Computing Environments. TrustBus 2006: 103-113
33EEStelios Dritsas, Dimitris Gritzalis, Costas Lambrinoudakis: Protecting privacy and anonymity in pervasive computing: trends and perspectives. Telematics and Informatics 23(3): 196-210 (2006)
2005
32EEBill Tsoumas, Stelios Dritsas, Dimitris Gritzalis: An Ontology-Based Approach to Information Systems Security Management. MMM-ACNS 2005: 151-164
31EEDimitris Gritzalis, Costas Lambrinoudakis, Dimitrios Lekkas, S. Deftereos: Technical guidelines for enhancing privacy and data protection in modern electronic medical environments. IEEE Transactions on Information Technology in Biomedicine 9(3): 413-423 (2005)
2004
30EEGeorgios Kambourakis, Angelos N. Rouskas, Dimitris Gritzalis: Performance Evaluation of Certificate Based Authentication in Integrated Emerging 3G and Wi-Fi Networks. EuroPKI 2004: 287-296
29EEDimitrios Lekkas, Dimitris Gritzalis: Cumulative notarization for long-term preservation of digital signatures. Computers & Security 23(5): 413-424 (2004)
28EEDimitris Gritzalis: Embedding privacy in IT applications development. Inf. Manag. Comput. Security 12(1): 8-26 (2004)
2003
27 Dimitris Gritzalis, Sabrina De Capitani di Vimercati, Pierangela Samarati, Sokratis K. Katsikas: Security and Privacy in the Age of Uncertainty, IFIP TC11 18th International Conference on Information Security (SEC2003), May 26-28, 2003, Athens, Greece Kluwer 2003
26EECostas Lambrinoudakis, Spyros Kokolakis, Maria Karyda, Vassilis Tsoumas, Dimitris Gritzalis, Sokratis K. Katsikas: Electronic Voting Systems: Security Implications of the Administrative Workflow. DEXA Workshops 2003: 467-471
25EESpyros Kokolakis, Costas Lambrinoudakis, Dimitris Gritzalis: A Knowledge-Based Repository Model for Security Policies Management. MMM-ACNS 2003: 112-121
24EEJohn Iliadis, Stefanos Gritzalis, Diomidis Spinellis, Danny De Cock, Bart Preneel, Dimitris Gritzalis: Towards a framework for evaluating certificate status information mechanisms. Computer Communications 26(16): 1839-1850 (2003)
23EEJohn Iliadis, Stefanos Gritzalis, Dimitris Gritzalis: ADoCSI: towards a transparent mechanism for disseminating Certificate Status Information. Computer Communications 26(16): 1851-1862 (2003)
2002
22EECostas Lambrinoudakis, Dimitris Gritzalis, Sokratis K. Katsikas: Building a Reliable e-Voting System: Functional Requirements and Legal Constraints. DEXA Workshops 2002: 435
21 L. Mitrou, Dimitris Gritzalis, Sokratis K. Katsikas: Revisiting Legal and Regulatory Requirements for Secure E-Voting. SEC 2002: 469-480
20 S. Ikonomopoulos, Costas Lambrinoudakis, Dimitris Gritzalis, Spyros Kokolakis, K. Vassiliou: Functional Requirements for a Secure Electronic Voting System. SEC 2002: 507-520
19 Dimitris Gritzalis, Maria Karyda, Lazaros Gymnopoulos: Elaborating Quantitative Approaches for IT Security Evaluation. SEC 2002: 67-78
18 Diomidis Spinellis, Dimitris Gritzalis: Panoptis: Intrusion Detection Using a Domain-Specific Language. Journal of Computer Security 10(1/2): 159-176 (2002)
2001
17EEDimitris Gritzalis, Konstantinos Moulinos, Konstantinos Kostis: A Privacy-Enhancing e-Business Model Based on Infomediaries. MMM-ACNS 2001: 72-83
16EEDimitris Gritzalis, Nikolaos Kyrloglou: Consumer Online-Privacy and Anonymity Protection using Infomediary Schemes. SCCC 2001: 115-123
15 Dimitris Gritzalis, Konstantinos Moulinos, John Iliadis, Costas Lambrinoudakis, S. Xarhoulacos: Pythia: Towards Anonymity in Authentication. SEC 2001: 1-18
14EEStefanos Gritzalis, Dimitris Gritzalis: A digital seal solution for deploying trust on commercial transactions. Inf. Manag. Comput. Security 9(2): 71-79 (2001)
2000
13EEJohn Iliadis, Diomidis Spinellis, Dimitris Gritzalis, Bart Preneel, Sokratis K. Katsikas: Evaluating certificate status information mechanisms. ACM Conference on Computer and Communications Security 2000: 1-8
12 Theodore Tryfonas, Dimitris Gritzalis, Spyros Kokolakis: A Qualitative Approach to Information Availability. SEC 2000: 37-48
1999
11EEDiomidis Spinellis, Stefanos Gritzalis, John Iliadis, Dimitris Gritzalis, Sokratis K. Katsikas: Trusted third party services for deploying secure telemedical applications over the WWW. Computers & Security 18(7): 627-639 (1999)
1997
10EEDimitris Gritzalis: A baseline security policy for distributed healthcare information systems. Computers & Security 16(8): 709-719 (1997)
1996
9 Sokratis K. Katsikas, Dimitris Gritzalis: Information Systems Security, Facing the information society of the 21st Century Chapman & Hall 1996
8 Sokratis K. Katsikas, Dimitris Gritzalis, Paul G. Spirakis: Attack Modelling in Open Network Environments. Communications and Multimedia Security 1996: 268-277
7EEDimitris Gritzalis, Sokratis K. Katsikas: Towards a formal system-to-system authentication protocol. Computer Communications 19(12): 954-961 (1996)
6EESokratis K. Katsikas, Thomas Spyrou, Dimitris Gritzalis, John Darzentas: Model for network behaviour under viral attack. Computer Communications 19(2): 124-132 (1996)
1995
5EEAnastasia Doumas, Konstantinos Mavroudakis, Dimitris Gritzalis, Sokratis K. Katsikas: Design of a neural network for recognition and classification of computer viruses. Computers & Security 14(5): 435-448 (1995)
1994
4EEMichel Denault, Dimitris Karagiannis, Dimitris Gritzalis, Paul G. Spirakis: Intrusion detection: Approach and performance issues of the SECURENET system. Computers & Security 13(6): 495-508 (1994)
1992
3EEDimitris Gritzalis, Sokratis K. Katsikas, J. Keklikoglou, A. Tomaras: Determining access rights for medical information systems. Computers & Security 11(2): 149-161 (1992)
2EEDimitris Gritzalis, Sokratis K. Katsikas, Stefanos Gritzalis: A zero knowledge probabilistic login protocol. Computers & Security 11(8): 733-745 (1992)
1991
1EEDimitris Gritzalis, A. Tomaras, Sokratis K. Katsikas, J. Keklikoglou: Data security in medical information systems: The Greek case. Computers & Security 10(2): 141-159 (1991)

Coauthor Index

1Danny De Cock [24]
2P. Constantopoulos [45]
3John Darzentas [6]
4S. Deftereos [31]
5Michel Denault [4]
6Anastasia Doumas [5]
7Stelios Dritsas [32] [33] [34] [35] [39] [40] [43] [44] [45]
8Vicky Dritsou [45]
9Stefanos Gritzalis [2] [11] [14] [23] [24]
10Lazaros Gymnopoulos [19]
11S. Ikonomopoulos [20]
12John Iliadis [11] [13] [15] [23] [24]
13Georgios Kambourakis [30]
14Dimitris Karagiannis [4]
15Maria Karyda [19] [26]
16Sokratis K. Katsikas [1] [2] [3] [5] [6] [7] [8] [9] [11] [13] [21] [22] [26] [27]
17J. Keklikoglou [1] [3]
18Spyros Kokolakis [12] [20] [25] [26] [38]
19Konstantinos Kostis [17]
20Nikolaos Kyrloglou [16]
21Costas Lambrinoudakis [15] [20] [22] [25] [26] [31] [33]
22Dimitrios Lekkas [29] [31] [41]
23John Mallios [39] [40]
24Yannis Mallios [42] [43]
25Giannis F. Marias [39] [40]
26Konstantinos Mavroudakis [5]
27L. Mitrou [21]
28Konstantinos Moulinos [15] [17]
29Panagiotis Papagiannakopoulos [35]
30Bart Preneel [13] [24]
31Angelos N. Rouskas [30]
32Pierangela Samarati [27]
33Yannis Soupionis [43] [44]
34Diomidis Spinellis [11] [13] [18] [24]
35Paul G. Spirakis [4] [8]
36Thomas Spyrou [6]
37Eleftheria Stougiannou [37]
38Marianthi Theoharidou [37] [38] [39] [40] [43]
39A. Tomaras [1] [3]
40Theodore Tryfonas [12]
41John Tsaparas [34]
42Aggeliki Tsohou [38]
43Bill Tsoumas [32] [35] [36] [45]
44Vassilis Tsoumas [26]
45K. Vassiliou [20]
46Sabrina De Capitani di Vimercati [27]
47S. Xarhoulacos [15]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)