Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Eleftherios Koutsoloukas is active.

Publication


Featured researches published by Eleftherios Koutsoloukas.


conference on computer as a tool | 2007

A Proxy for Privacy: the Discreet Box

Georgios V. Lioudakis; Eleftherios Koutsoloukas; Nikolaos L. Dellas; Sofia Kapellaki; George N. Prezerakos; Dimitra I. Kaklamani; Iakovos S. Venieris

The issue of user privacy is constantly brought to the spotlight since an ever increasing number of online services collects and processes personal information from users, in the context of personalized service provision. Although technology makes the collection of data easy, their protection against abuse is left to data protection legislation. However, the privacy requirements, other than being general and abstract terms to be regarded as legislature issues, should be brought down in the technological reality and carefully accounted for in devising technical solutions. In order to limit the disclosure and avoid the misuse of personal data, this paper discusses an architectural proposal for a middleware system that will enforce protection of user privacy through technical means. This goal is facilitated by a combination of a policy framework, a sensible interpretation of regulations into policies and the introduction of a privacy broker, named the discreet box.


IEEE Wireless Communications | 2006

Architecture for reliable service discovery and delivery in manets based on power management employing slp extensions

Christos I. Katsigiannis; Dimitrios A. Kateros; Eleftherios Koutsoloukas; Nikolaos D. Tselikas; Iakovos S. Venieris

Limited energy resources and mobility issues affect the topology of ad hoc networks and introduce difficulties in service discovery. The high possibility of a link breakdown due to low energy supplies in a ubiquitous computing environment, such as a mobile ad hoc network (MANET), raises service-provider selection issues with regard to achieving the best possible service reliability. Every node requiring a specific service must choose a provider under certain criteria. This article provides an overview of standardized service-discovery and delivery solutions. In addition, a novel architecture is proposed which provides the ability to select a service provider by taking into account metrics such as the power supplies of the service provider and concomitant path towards the destination. The proposed algorithm is decentralized and based on service location protocol version 2 (SLPvZ) extensions


international multiconference on computer science and information technology | 2008

A semantic framework for privacy-aware access control

Georgios V. Lioudakis; Nikolaos L. Dellas; Eleftherios Koutsoloukas; Georgia M. Kapitsaki; Dimitra I. Kaklamani; Iakovos S. Venieris

The issue of privacy is constantly brought to the spotlight since an ever increasing number of services collects and processes personal information from users. In fact, recent advances in mobile communications, location and sensing technologies and data processing are boosting the deployment of context-aware personalized services and the creation of smart environments but, at the same time, they pose a serious risk on individualspsila privacy rights. Being situated in the realms of legal and social studies, the notion of privacy is mainly left, concerning its protection, to legislation and service providerspsila self-regulation by means of privacy policies. However, all laws and codes of conduct are useless without enforcement. Based on this concept, this paper presents a framework conceived on the basis of privacy legislation. It uses a semantic model for the specification of privacy-aware data access rules and a middleware system which mediates between the service providers and the data sources and caters for the enforcement of the regulatory provisions.


personal, indoor and mobile radio communications | 2007

Towards Privacy-Preserving Network Monitoring: Issues and Challenges

Giuseppe Bianchi; Elisa Boschi; Dimitra I. Kaklamani; Eleftherios Koutsoloukas; Georgios V. Lioudakis; Francesco Oppedisano; Martin Petraschek; Fabio Ricciato; Carsten Schmoll

Passive network monitoring is required for the operation and maintenance of communication networks as well as to detect frauds and attacks. Typically, raw packet-level traffic traces are collected using suitable traffic probe devices and fed to monitoring applications (IDSs, antivirus, etc.) for analysis, with potential risks for the legitimate privacy rights of the customers. This paper aims to discuss the technical feasibility and the underlying research challenges of a two-tiered privacy-preserving network monitoring system, where carefully designed data protection mechanisms can coexist with suitably adapted monitoring applications.


Wireless Personal Communications | 2004

An OSA/Parlay-Based Middleware Architecture for Location-Based Services

Nikolaos D. Tselikas; Eleftherios Koutsoloukas; Sofia Kapellaki; Emmanuel S. Chaniotakis; Iakovos S. Venieris

The shift of the telecommunication world towards Next Generation Networks (NGNs) has triggered the interest in location-based services (LBSs) for service providers. This interest has elevated the need for seamless access to location information by anyone wishing to evade the overhead of adapting to proprietary interfaces. This paper discusses the use of Open Application Interfaces to unify the access to location information maintained by network components and describes the implementation of a middleware gateway to location information, which complies with these open interfaces. Additionally, the performance of different distributed technologies providing access to the gateway is evaluated.


MATA'05 Proceedings of the Second international conference on Mobility Aware Technologies and Applications | 2005

Facilitating context-awareness through hardware personalization devices: the simplicity device

John P. Papanis; Sofia Kapellaki; Eleftherios Koutsoloukas; Nikolaos L. Dellas; George N. Prezerakos; Iakovos S. Venieris

The paper presents the specification, development and initial performance evaluation of the Simplicity Device (SD), which is one of the key components of the SIMPLICITY Architecture. The SD is both a portable personalization device and a hardware Single-Sign-On (SSO) token. It accommodates the Simplicity User Profile (SUP), which contains user context related information and has been designed according to 3GPP and W3C standards. In cooperation with a distributed brokerage framework the SD provides the users with the means to automatically personalize terminals and services according to their context by the simple act of “plugging” the SD into any SIMPLICITY compliant user equipment. Within this paper we present the generic SD architecture which is the basis for different SD implementations and consequently we focus on a JavaCard SD implementation and its performance evaluation.


ist mobile and wireless communications summit | 2007

A Performance Comparison of Ontolog Reasoning and Rule Engines

N.L. Delias; Eleftherios Koutsoloukas; Georgios V. Lioudakis; Dimitra I. Kaklamani; Iakovos S. Venieris

Even though ontology modeling and policy based systems were originally created for different problem spaces it became obvious in the course of time that they can both be useful tools to express restrictions in a real life situation into technically enforceable rules. One of such situations where both ontology reasoning and rule engines can be applied as technological solutions is the design of an information system that enforces restrictions related to user privacy protection. During the design of such a system, privacy related restrictions could be expressed either as rules into an ontology describing the privacy world of a user, or as a set of straightforward Jess rules. A performance comparison of the two approaches is presented in this paper.


Internet multimedia management systems. Conference | 2003

Architectural framework for resource management optimization over heterogeneous wireless networks

Nikos Tselikas; Sofia Kapellaki; Eleftherios Koutsoloukas; Iakovos S. Venieris

The main goal of wireless telecommunication world can be briefly summarized as: “communication anywhere, anytime, any-media and principally at high-data rates.” On the other hand, this goal is in conflict with the co-existence of plenty different current and emerging wireless systems covering almost the whole world, since each one follows its own architecture and is based on its particular bedrocks. This results in a heterogeneous depiction of the hyper-set of wireless communications systems. The scope of this paper is to present a highly innovative and scalable architectural framework, which will allow different wireless systems to be interconnected in a common way, able to achieve resource management optimization, augmentation of network performance and maximum utilization of the networks. It will describe a hierarchical management system covering all GSM, GPRS, UMTS and WLAN networks each one individually, as well as a unified and wide wireless telecommunication system including all later, in order to provide enhanced capacity and quality via the accomplished network interworking. The main idea is to monitor all the resources using distributed monitoring components with intention to feed an additional centralized system with alarms, so that a set of management techniques will be selected and applied where needed. In parallel, the centralized system will be able to combine the aforementioned alarms with business models for the efficient use of the available networks according to the type of user, the type of application as well as the user’s location.


Computer Networks | 2007

A middleware architecture for privacy protection

Georgios V. Lioudakis; Eleftherios Koutsoloukas; Nikolaos L. Dellas; Nikolaos D. Tselikas; Sofia Kapellaki; George N. Prezerakos; Dimitra I. Kaklamani; Iakovos S. Venieris


World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering | 2007

Context for Simplicity: A Basis for Context-aware Systems Based on the 3GPP Generic User Profile

Enrico Rukzio; George N. Prezerakos; Giovanni Cortese; Eleftherios Koutsoloukas; Sofia Kapellaki

Collaboration


Dive into the Eleftherios Koutsoloukas's collaboration.

Top Co-Authors

Avatar

Iakovos S. Venieris

National Technical University of Athens

View shared research outputs
Top Co-Authors

Avatar

Sofia Kapellaki

National Technical University of Athens

View shared research outputs
Top Co-Authors

Avatar

George N. Prezerakos

National Technical University of Athens

View shared research outputs
Top Co-Authors

Avatar

Dimitra I. Kaklamani

National Technical University of Athens

View shared research outputs
Top Co-Authors

Avatar

Georgios V. Lioudakis

National Technical University of Athens

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Nikolaos L. Dellas

National Technical University of Athens

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Emmanuel S. Chaniotakis

National Technical University of Athens

View shared research outputs
Researchain Logo
Decentralizing Knowledge