Fotios Gogoulos
National Technical University of Athens
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Fotios Gogoulos.
computer and information technology | 2010
Fotios Gogoulos; Anna Antonakopoulou; Georgios V. Lioudakis; Aziz S. Mousas; Dimitra I. Kaklamani; Iakovos S. Venieris
Despite the usefulness of passive network monitoring for the operation, maintenance, control and protection of communication networks, as well as law enforcement, network monitoring activities are surrounded by serious privacy implications. In this paper, an innovative approach for privacy-preserving authorization and access control to data originating from passive network monitoring is described. The proposed framework relies on an ontological model for the specification of the access control policies, which are evaluated and enforced on a two-phase and two-stage basis by a system that intercedes between the network link and the monitoring applications. The two stages refer to controlled access regarding both the data that are disclosed to the monitoring application from the mediating system and the raw data that the mediator retrieves from the network link. On the other hand, the two phases concern respectively the execution of “static” and “dynamic” control; the former enforces the rules that are a priori applicable, grounded on the data, role and purpose semantics, while the latter evaluates the real-time contextual parameters for the adaptation of the access control procedures to the particular conditions underlying a request.
international conference for internet technology and secured transactions | 2009
Georgios V. Lioudakis; Fotios Gogoulos; Anna Antonakopoulou; Aziz S. Mousas; Iakovos S. Venieris; Dimitra I. Kaklamani
Passive network monitoring is very useful for the operation, maintenance, control and protection of communication networks, while in certain cases it provides the authorities with the means for law enforcement. Nevertheless, the flip side of passive network monitoring activities is that they are natively surrounded by serious privacy implications. In this paper, an innovative approach for privacy-preserving access control to data originating from passive network monitoring is described. The proposed framework relies on an ontological model for the specification of the access control policies, which are evaluated and enforced on a two-phase and two-stage basis by a system that intercedes between the network link and the monitoring applications. The two stages refer to controlled access regarding both the data that are disclosed to the monitoring application from the mediating system and the raw data that the mediator retrieves from the network link. On the other hand, the two phases concern respectively the execution of “static” and “dynamic” control; the former enforces the rules that are a priori applicable, grounded on the data, role and purpose semantics, while the latter evaluates the real-time “privacy context” for the adaptation of the access control procedures to the particular conditions underlying a request.
Electronic Markets | 2014
Fotios Gogoulos; Anna Antonakopoulou; Georgios V. Lioudakis; Aziz S. Mousas; Dimitra I. Kaklamani; Iakovos S. Venieris
Business networking has substantially reshaped common enterprise procedures and has paved the way for the development of ground-breaking information sharing patterns and inter-organizational cooperative practices. Yet, critical issues still stand unaddressed; privacy and sensitive information confidentiality implications threaten to diminish the economic and social benefits derived from online collaboration. Nevertheless, privacy preservation refers to a multidimensional and cross-disciplinary subject, accompanied by both legal as well as technical challenges. In this context, this paper describes the design of a privacy-aware decision engine operating within synergistic contexts. Decision making regarding the production of authorizations and information usage rules is founded on a detailed privacy context and the enforcement of a deductive reasoning algorithm. The proposed reasoning process spans two distinct phases, taking into account an a priori perspective of the system while at the same time maintaining responsiveness in dynamic contexts.
panhellenic conference on informatics | 2010
Aziz S. Mousas; Anna Antonakopoulou; Fotios Gogoulos; Georgios V. Lioudakis; Dimitra I. Kaklamani; Iakovos S. Venieris
Despite the usefulness of passive network monitoring for the operation, maintenance, control and protection of communication networks, as well as law enforcement, network monitoring activities are surrounded by serious privacy implications. In this paper, a software tool for the management of privacy-preserving authorisation and access control to data originating from passive network monitoring is described. It offers a user-friendly, visual interface for the specification of the underlying concepts, such as roles, data types, actions, rules and contextual information, providing the appropriate level of abstraction. Based on the specified model, the proposed application generates the cryptographic means for the dissemination of the provisions to the enforcing entities, while relying on an ontological model for the representation of the access control policies.
panhellenic conference on informatics | 2009
Fotios Gogoulos; Anna Antonakopoulou; Aziz S. Mousas; Georgios V. Lioudakis; Dimitra I. Kaklamani; Iakovos S. Venieris
Among the several threats to personal privacy caused by the emerging Information and Communication Technologies, activities related to passive network monitoring hold an outstanding position. This paper describes a privacy-aware passive network monitoring system, focusing on the specification and performance evaluation of its access control and authorization aspects.
panhellenic conference on informatics | 2010
Anna Antonakopoulou; Fotios Gogoulos; Georgios V. Lioudakis; Aziz S. Mousas; Dimitra I. Kaklamani; Iakovos S. Venieris
As privacy is becoming a salient issue for both organizations that provide digital services, as well as their users, access control shifts from traditional role-based models to more sophisticated paradigms that include additional provisions with respect to privacy. Complementing and particularizing our previous research work on the development of frameworks for the enforcement of privacy-aware access control, this paper targets the protection of personal data that are collected in the context of passive monitoring of communication networks. Specifically, this paper’s focus is on the description of a semantic access control model conceived on the basis of the privacy legislation, which is enforced by an innovative two-tier monitoring architecture.
advanced information networking and applications | 2009
Georgios V. Lioudakis; Fotios Gogoulos; Anna Antonakopoulou; Dimitra I. Kaklamani; Iakovos S. Venieris
Archive | 2012
Anna Antonakopoulou; Georgios V. Lioudakis; Fotios Gogoulos; Dimitra I. Kaklamani; Iakovos S. Venieris
Archive | 2014
Fotios Gogoulos; Anna Antonakopoulou; Georgios V. Lioudakis; Dimitra I. Kaklamani; Iakovos S. Venieris
Journal of Research and Practice in Information Technology | 2014
Anna Antonakopoulou; Fotios Gogoulos; Georgios V. Lioudakis; Aziz S. Mousas; Dimitra I. Kaklamani; Iakovos S. Venieris