Theodosis Dimitrakos

Orcid: 0000-0002-9522-1863

According to our database1, Theodosis Dimitrakos authored at least 100 papers between 1997 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Static and Dynamic Analysis of a Usage Control System.
Proceedings of the 29th ACM Symposium on Access Control Models and Technologies, 2024

Obligation Management Framework for Usage Control.
Proceedings of the 29th ACM Symposium on Access Control Models and Technologies, 2024

Towards Robust Trust Frameworks for Data Exchange: A Multidisciplinary Inquiry.
Proceedings of the Open Identity Summit 2024, Porto, Portugal, June 20-21, 2024, 2024

On Subjective Logic Trust Discount for Referral Paths.
Proceedings of the 27th International Conference on Information Fusion, 2024

2023
Specifying a Usage Control System.
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2023

A shared responsibility model to support cross border and cross organizational federation on top of decentralized and self-sovereign identity: Architecture and first PoC.
Proceedings of the Open Identity Summit 2023, Heilbronn, Germany, June 15-16, 2023, 2023

2022
WiP: Metamodel for Continuous Authorisation and Usage Control.
Proceedings of the SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8, 2022

2021
Certification-Based Cloud Adaptation.
IEEE Trans. Serv. Comput., 2021

DataPAL: Data Protection and Authorization Lifecycle framework.
Proceedings of the 6th South-East Europe Design Automation, 2021

SIUV: A Smart Car Identity Management and Usage Control System Based on Verifiable Credentials.
Proceedings of the ICT Systems Security and Privacy Protection, 2021

Towards Collaborative Cyber Threat Intelligence for Security Management.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

Handling Meta Attribute Information in Usage Control Policies (Short Paper).
Proceedings of the Emerging Technologies for Authorization and Authentication, 2021

2020
Session-dependent Usage Control for Big Data.
J. Internet Serv. Inf. Secur., 2020

Trust Aware Continuous Authorization for Zero Trust in Consumer Internet of Things.
Proceedings of the 19th IEEE International Conference on Trust, 2020

A Comparison Among Policy Editors for Attributed Based Access Control Model.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2020

2019
A Framework for Blockchain-Based Verification of Integrity and Authenticity.
Proceedings of the Trust Management XIII - 13th IFIP WG 11.11 International Conference, 2019

Data Protection as a Service in the Multi-Cloud Environment.
Proceedings of the 12th IEEE International Conference on Cloud Computing, 2019

2018
How to Develop a Security Controls Oriented Reference Architecture for Cloud, IoT and SDN/NFV Platforms.
Proceedings of the Trust Management XII - 12th IFIP WG 11.11 International Conference, 2018

2016
Deploying Visual Analytics Through a Multi-cloud Service Store with Encrypted Big Data (Short Paper).
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2016 Conferences, 2016

Managed security service distribution model.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016

A Certification Technique for Cloud Security Adaptation.
Proceedings of the IEEE International Conference on Services Computing, 2016

2015
A scalable and dynamic application-level secure communication framework for inter-cloud services.
Future Gener. Comput. Syst., 2015

Security-as-a-Service in Multi-cloud and Federated Cloud Environments.
Proceedings of the Trust Management IX - 9th IFIP WG 11.11 International Conference, 2015

A Cloud Orchestrator for Deploying Public Services on the Cloud - The Case of STRATEGIC Project.
Proceedings of the Trust Management IX - 9th IFIP WG 11.11 International Conference, 2015

Foreword: Towards Trusted Cloud Ecosystems.
Proceedings of the Trust Management IX - 9th IFIP WG 11.11 International Conference, 2015

Integrating Security Services in Cloud Service Stores.
Proceedings of the Trust Management IX - 9th IFIP WG 11.11 International Conference, 2015

Secure Cloud Storage: A framework for Data Protection as a Service in the multi-cloud environment.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
Data Interface All-iN-A-Place (DIANA) for Big Data.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Context-Aware Multifactor Authentication Based on Dynamic Pin.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

Mirroring Mobile Phone in the Clouds.
Proceedings of the IEEE Third International Conference on Mobile Services, Anchorage, AK, USA, June 27, 2014

Trust Assessment Using Cloud Broker.
Proceedings of the Trust Management VIII - 8th IFIP WG 11.11 International Conference, 2014

A Low-Overhead Secure Communication Framework for an Inter-cloud Environment.
Proceedings of the Intelligent Cloud Computing - First International Conference, 2014

Seamless Enablement of Intelligent Protection for Enterprise Cloud Applications through Service Store.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

CloudJet4BigData: Streamlining Big Data via an Accelerated Socket Interface.
Proceedings of the 2014 IEEE International Congress on Big Data, Anchorage, AK, USA, June 27, 2014

2013
Secure Execution Context Enforcement Framework Based on Activity Detection on Data and Applications Hosted on Smart Devices.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Trust Model for Cloud Based on Cloud Characteristics.
Proceedings of the Trust Management VII - 7th IFIP WG 11.11 International Conference, 2013

Privacy-Preserving Collaborative Filtering on the Cloud and Practical Implementation Experiences.
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013

2012
Privacy preserving collaborative filtering for SaaS enabling PaaS clouds.
J. Cloud Comput., 2012

OPTIMIS: A holistic approach to cloud service provisioning.
Future Gener. Comput. Syst., 2012

Self Managed Security Cell, a security model for the Internet of Things and Services
CoRR, 2012

Securing business operations in an SOA
CoRR, 2012

An Architecture for the Enforcement of Privacy and Security Requirements in Internet-Centric Services.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Feasibility of a privacy preserving collaborative filtering scheme on the Google App Engine: a performance case study.
Proceedings of the ACM Symposium on Applied Computing, 2012

A Perspective on the Evolution of the International Trust Management Research Community in the Last Decade.
Proceedings of the Trust Management VI - 6th IFIP WG 11.11 International Conference, 2012

Secure communication using dynamic VPN provisioning in an Inter-Cloud environment.
Proceedings of the 18th IEEE International Conference on Networks, 2012

Opinion Model Based Security Reputation Enabling Cloud Broker Architecture.
Proceedings of the Cloud Computing - Third International Conference, 2012

2011

Regulatory Impact of Data Protection and Privacy in the Cloud.
Proceedings of the Trust Management V, 5th IFIP WG 11.11 International Conference, 2011

Privacy-preserving Collaborative Filtering for the Cloud.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011

2010
Security of Service Networks.
Proceedings of the Handbook of Information and Communication Security, 2010

Special issue on security and trust management for dynamic coalitions.
Secur. Commun. Networks, 2010

SOA-Based Security Governance Middleware.
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010

An Efficient Secure Shared Storage Service with Fault and Investigative Disruption Tolerance.
Proceedings of the 39th International Conference on Parallel Processing, 2010

Towards Secure Cloud Bursting, Brokerage and Aggregation.
Proceedings of the 8th IEEE European Conference on Web Services (ECOWS 2010), 2010

Common Capabilities for Service Oriented Infrastructures and Platforms: An Overview.
Proceedings of the 8th IEEE European Conference on Web Services (ECOWS 2010), 2010

Bringing it all Together.
Proceedings of the Service Oriented Infrastructures and Cloud Service Platforms for the Enterprise, 2010

Approach Towards Technical Innovations for Service Oriented Infrastructures and Clouds.
Proceedings of the Service Oriented Infrastructures and Cloud Service Platforms for the Enterprise, 2010

Introduction.
Proceedings of the Service Oriented Infrastructures and Cloud Service Platforms for the Enterprise, 2010

Common Capabilities for Service Oriented Infrastructures - Grid and Cloud Computing.
Proceedings of the Grid and Cloud Computing, 2010

The BEinGRID Project.
Proceedings of the Grid and Cloud Computing, 2010

Aspects of General Security & Trust.
Proceedings of the Service Oriented Infrastructures and Cloud Service Platforms for the Enterprise, 2010

Virtual Hosting Environments for Online Gaming.
Proceedings of the Grid and Cloud Computing, 2010

2009
A Governance Model for SOA.
Proceedings of the IEEE International Conference on Web Services, 2009

2008
Preface.
Proceedings of the 4th International Workshop on Security and Trust Management, 2008

An Architecture for Non Functional Properties Management in Distributed Computing.
Proceedings of the DCSOFT 2008, 2008

2007
Guest Editors' Preface.
Int. J. Inf. Sec., 2007

Dynamic security perimeters for inter-enterprise service integration.
Future Gener. Comput. Syst., 2007

Secure web service federation management using tpm virtualisation.
Proceedings of the 4th ACM Workshop On Secure Web Services, 2007

Design patterns for secure virtual organization management architecture.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

Virtualised Trusted Computing Platform for Adaptive Security Enforcement of Web Services Interactions.
Proceedings of the 2007 IEEE International Conference on Web Services (ICWS 2007), 2007

2006
The TrustCoM Approach to Enforcing Agreements between Interoperating Enterprises.
Proceedings of the Enterprise Interoperability, 2006

Extendable and Adaptive Message-Level Security Enforcement Framework.
Proceedings of the 2006 International Conference on Networking and Services (ICNS 2006), 2006

2005
Aspects of Trusted and Secure Business-Oriented VO Management in Service Oriented Architectures.
Proceedings of the 7th IEEE International Conference on E-Commerce Technology Workshops (CEC 2005 Workshops), 2005

Can We Manage Trust?
Proceedings of the Trust Management, Third International Conference, 2005

Towards a Grid Platform Enabling Dynamic Virtual Organisations for Business Applications.
Proceedings of the Trust Management, Third International Conference, 2005

Toward Web Services Profiles for Trust and Security in Virtual Organisations.
Proceedings of the Collaborative Networks and Their Breeding Environments, 2005

2004
An architecture for dynamic security perimeters of virtual collaborative networks.
Proceedings of the Managing Next Generation Convergence Networks and Services, 2004

Deploying Trust Policies on the Semantic Web.
Proceedings of the Trust Management, Second International Conference, 2004

Trust, Security, and Contract Management Challenges for Grid-Based Application Service Provision.
Proceedings of the Trust Management, Second International Conference, 2004

Towards Dynamic Security Perimeters for Virtual Collaborative Networks.
Proceedings of the Trust Management, Second International Conference, 2004

Overview of an Architecture Enabling Grid Based Application Service Provision.
Proceedings of the Grid Computing, 2004

2003
Towards Dynamic Population Management of Abstract Machines in the B Method.
Proceedings of the ZB 2003: Formal Specification and Development in Z and B, 2003

Meta-data Management Issues Underpinning Emerging Solutions for Distributed Trust and Contract Management in Enterprise Grid and P2P Systems. Experiences from GRASP, SWAD-Europe, PELLUCID and CORAS projects.
Proceedings of the MMGPS, 2003

An Emerging Architecture Enabling Grid Based Application Service Provision.
Proceedings of the 7th International Enterprise Distributed Object Computing Conference (EDOC 2003), 2003

Contract Performance Assessment for Secure and Dynamic Virtual Collaborations.
Proceedings of the 7th International Enterprise Distributed Object Computing Conference (EDOC 2003), 2003

2002
The CORAS Framework for a Model-Based Risk Management Process.
Proceedings of the Computer Safety, 2002

Policy-Driven Access Control over a Distributed Firewall Architecture.
Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 2002

Integrating Model-based Security Risk Management into eBusiness Systems Development: The CORAS Approach.
Proceedings of the Towards The Knowledge Society: eCommerce, 2002

Model Based Security Risk Analysis for Web Applications.
Proceedings of the Web and the Grid: from e-science to e-business. EuroWeb 2002 Conference, 2002

Discretionary Enforcement of Electronic Contracts.
Proceedings of the 6th International Enterprise Distributed Object Computing Conference (EDOC 2002), 2002

Model-Based Risk Assessment to Improve Enterprise Security.
Proceedings of the 6th International Enterprise Distributed Object Computing Conference (EDOC 2002), 2002

The coras approach for model-based risk management applied to e-commerce domain.
Proceedings of the Advanced Communications and Multimedia Security, 2002

A Service-Oriented Trust Management Framework.
Proceedings of the Trust, 2002

2001
Interpolation in Practical Formal Development.
Log. J. IGPL, 2001

System Models, e-Risks and e-Trust - Towards bridging the gap?
Proceedings of the Towards The E-Society: E-Commerce, 2001

2000
On a generalized modularization theorem.
Inf. Process. Lett., 2000

Compositional Structuring in the B-Method: A Logical Viewpoint of the Static Context.
Proceedings of the ZB 2000: Formal Specification and Development in Z and B, First International Conference of B and Z Users, York, UK, August 29, 2000

1998
Formal support for specification, design and implementation.
PhD thesis, 1998

Parameterising (Algebraic) Specifications on Diagrams.
Proceedings of the Thirteenth IEEE Conference on Automated Software Engineering, 1998

1997
Notes on Refinement, Interpolation and Uniformity.
Proceedings of the 1997 International Conference on Automated Software Engineering, 1997


  Loading...