Follow
Dr. Prokopios Drogkaris
Dr. Prokopios Drogkaris
Cybersecurity Expert - Deputy DPO - European Union Agency for Cybersecurity (ENISA)
Verified email at aegean.gr
Title
Cited by
Cited by
Year
Privacy by design in big data: an overview of privacy enhancing technologies in the era of big data analytics
G D'Acquisto, J Domingo-Ferrer, P Kikiras, V Torra, YA de Montjoye, ...
arXiv preprint arXiv:1512.06000, 2015
1422015
Interoperability and portability approaches in inter-connected clouds: A review
K Kaur, DRS Sharma, DRKS Kahlon
ACM Computing Surveys (CSUR) 50 (4), 1-40, 2017
562017
Transforming the Greek e-government environment towards the e-Gov 2.0 era
P Drogkaris, S Gritzalis, C Lambrinoudakis
Electronic Government and the Information Systems Perspective: First …, 2010
292010
Identity management challenges for intercloud applications
D Núñez, I Agudo, P Drogkaris, S Gritzalis
Secure and Trust Computing, Data Management, and Applications: STA 2011 …, 2011
232011
Introduction: Surveillance, privacy and security
J Čas, R Bellanova, JP Burgess, M Friedewald, W Peissl
Surveillance, Privacy and Security, 1-12, 2017
192017
Towards an enhanced authentication framework for eGovernment services: the Greek case
P Drogkaris, D Geneiatakis, S Gritzalis, C Lambrinoudakis, M Lilian
na, 2008
182008
Cybersecurity in the EU Common Security and Defence Policy (CSDP): Challenges and risks for the EU
P Trimintzios, G Chatzichristos, S Portesi, P Drogkaris, L Palkmets, ...
http://www.europarl.europa.eu/RegData/etudes/STUD/2017/603175/EPRS_STU(2017 …, 2017
152017
Employing privacy policies and preferences in modern e–government environments
P Drogkaris, S Gritzalis, C Lambrinoudakis
International Journal of Electronic Governance 6 (2), 101-116, 2013
142013
Security and privacy in communication networks
J Zhou
Springer Berlin Heidelberg, 2010
122010
A privacy preserving framework for big data in e-government environments
P Drogkaris, A Gritzalis
Trust, Privacy and Security in Digital Business: 12th International …, 2015
102015
Pseudonymisation techniques and best practices: Recommendations on shaping technology according to data protection and privacy provisions
A Bourka, P Drogkaris, I Agrafiotis
Publications Office of the European Union, 2019
72019
Perceptions of videosurveillance in Greece: A ‘Greek paradox’beyond the trade-off of security and privacy?
L Mitrou, P Drogkaris, G Leventakis
Surveillance, Privacy and Security, 123-138, 2017
72017
Computer Security--ESORICS 2017
SN Foley, D Gollmann, E Snekkenes
Springer, 2017
52017
A hierarchical multitier approach for privacy policies in e-government environments
P Drogkaris, S Gritzalis, C Kalloniatis, C Lambrinoudakis
Future Internet 7 (4), 500-515, 2015
52015
Empowering users to specify and manage their privacy preferences in e-government environments
P Drogkaris, A Gritzalis, C Lambrinoudakis
Electronic Government and the Information Systems Perspective: Third …, 2014
52014
Secure and Trust Computing, Data Management, and Applications
J Lopez, S Shon, D Taniar
Academic Press, 2011
52011
Real Time Threat Prediction, Identification and Mitigation for Critical Infrastructure Protection Using Semantics, Event Processing and Sequential Analysis
D Kostopoulos, V Tsoulkas, G Leventakis, P Drogkaris, V Politopoulou
Critical Information Infrastructures Security: 8th International Workshop …, 2013
42013
Data Protection Engineering: from Theory to Practice
C Castelluccia, G D'Acquisto, M Hansen, C Lauradoux, M Jensen, J Orzeł, ...
European Union Agency for Cybersecurity (ENISA), 2022
32022
Survey-based investigation, feature extraction and classification of Greek municipalities maturity for open source adoption and migration prospects
S Koloniaris, G Kousiouris, D Anagnostopoulos, M Nikolaidou, K Tserpes
Journal of Systems and Software 158, 110431, 2019
32019
Moving away from the security–privacy trade-off: The use of the test of proportionality in decision support
B Somody, MD Szabó, I Székely
Surveillance, Privacy and Security, 155-176, 2017
32017
The system can't perform the operation now. Try again later.
Articles 1–20