Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Fotios Gogoulos is active.

Publication


Featured researches published by Fotios Gogoulos.


computer and information technology | 2010

Privacy-Aware Access Control and Authorization in Passive Network Monitoring Infrastructures

Fotios Gogoulos; Anna Antonakopoulou; Georgios V. Lioudakis; Aziz S. Mousas; Dimitra I. Kaklamani; Iakovos S. Venieris

Despite the usefulness of passive network monitoring for the operation, maintenance, control and protection of communication networks, as well as law enforcement, network monitoring activities are surrounded by serious privacy implications. In this paper, an innovative approach for privacy-preserving authorization and access control to data originating from passive network monitoring is described. The proposed framework relies on an ontological model for the specification of the access control policies, which are evaluated and enforced on a two-phase and two-stage basis by a system that intercedes between the network link and the monitoring applications. The two stages refer to controlled access regarding both the data that are disclosed to the monitoring application from the mediating system and the raw data that the mediator retrieves from the network link. On the other hand, the two phases concern respectively the execution of “static” and “dynamic” control; the former enforces the rules that are a priori applicable, grounded on the data, role and purpose semantics, while the latter evaluates the real-time contextual parameters for the adaptation of the access control procedures to the particular conditions underlying a request.


international conference for internet technology and secured transactions | 2009

An access control approach for privacy-preserving passive network monitoring

Georgios V. Lioudakis; Fotios Gogoulos; Anna Antonakopoulou; Aziz S. Mousas; Iakovos S. Venieris; Dimitra I. Kaklamani

Passive network monitoring is very useful for the operation, maintenance, control and protection of communication networks, while in certain cases it provides the authorities with the means for law enforcement. Nevertheless, the flip side of passive network monitoring activities is that they are natively surrounded by serious privacy implications. In this paper, an innovative approach for privacy-preserving access control to data originating from passive network monitoring is described. The proposed framework relies on an ontological model for the specification of the access control policies, which are evaluated and enforced on a two-phase and two-stage basis by a system that intercedes between the network link and the monitoring applications. The two stages refer to controlled access regarding both the data that are disclosed to the monitoring application from the mediating system and the raw data that the mediator retrieves from the network link. On the other hand, the two phases concern respectively the execution of “static” and “dynamic” control; the former enforces the rules that are a priori applicable, grounded on the data, role and purpose semantics, while the latter evaluates the real-time “privacy context” for the adaptation of the access control procedures to the particular conditions underlying a request.


Electronic Markets | 2014

On the design of a privacy aware authorization engine for collaborative environments

Fotios Gogoulos; Anna Antonakopoulou; Georgios V. Lioudakis; Aziz S. Mousas; Dimitra I. Kaklamani; Iakovos S. Venieris

Business networking has substantially reshaped common enterprise procedures and has paved the way for the development of ground-breaking information sharing patterns and inter-organizational cooperative practices. Yet, critical issues still stand unaddressed; privacy and sensitive information confidentiality implications threaten to diminish the economic and social benefits derived from online collaboration. Nevertheless, privacy preservation refers to a multidimensional and cross-disciplinary subject, accompanied by both legal as well as technical challenges. In this context, this paper describes the design of a privacy-aware decision engine operating within synergistic contexts. Decision making regarding the production of authorizations and information usage rules is founded on a detailed privacy context and the enforcement of a deductive reasoning algorithm. The proposed reasoning process spans two distinct phases, taking into account an a priori perspective of the system while at the same time maintaining responsiveness in dynamic contexts.


panhellenic conference on informatics | 2010

Visualising Access Control: The PRISM Approach

Aziz S. Mousas; Anna Antonakopoulou; Fotios Gogoulos; Georgios V. Lioudakis; Dimitra I. Kaklamani; Iakovos S. Venieris

Despite the usefulness of passive network monitoring for the operation, maintenance, control and protection of communication networks, as well as law enforcement, network monitoring activities are surrounded by serious privacy implications. In this paper, a software tool for the management of privacy-preserving authorisation and access control to data originating from passive network monitoring is described. It offers a user-friendly, visual interface for the specification of the underlying concepts, such as roles, data types, actions, rules and contextual information, providing the appropriate level of abstraction. Based on the specified model, the proposed application generates the cryptographic means for the dissemination of the provisions to the enforcing entities, while relying on an ontological model for the representation of the access control policies.


panhellenic conference on informatics | 2009

Privacy-Aware Passive Network Monitoring

Fotios Gogoulos; Anna Antonakopoulou; Aziz S. Mousas; Georgios V. Lioudakis; Dimitra I. Kaklamani; Iakovos S. Venieris

Among the several threats to personal privacy caused by the emerging Information and Communication Technologies, activities related to passive network monitoring hold an outstanding position. This paper describes a privacy-aware passive network monitoring system, focusing on the specification and performance evaluation of its access control and authorization aspects.


panhellenic conference on informatics | 2010

Semantic Information Model for Privacy-Aware Access Control

Anna Antonakopoulou; Fotios Gogoulos; Georgios V. Lioudakis; Aziz S. Mousas; Dimitra I. Kaklamani; Iakovos S. Venieris

As privacy is becoming a salient issue for both organizations that provide digital services, as well as their users, access control shifts from traditional role-based models to more sophisticated paradigms that include additional provisions with respect to privacy. Complementing and particularizing our previous research work on the development of frameworks for the enforcement of privacy-aware access control, this paper targets the protection of personal data that are collected in the context of passive monitoring of communication networks. Specifically, this paper’s focus is on the description of a semantic access control model conceived on the basis of the privacy legislation, which is enforced by an innovative two-tier monitoring architecture.


advanced information networking and applications | 2009

Privacy Protection in Passive Network Monitoring: An Access Control Approach

Georgios V. Lioudakis; Fotios Gogoulos; Anna Antonakopoulou; Dimitra I. Kaklamani; Iakovos S. Venieris


Archive | 2012

Leveraging Access Control for Privacy Protection: A Survey

Anna Antonakopoulou; Georgios V. Lioudakis; Fotios Gogoulos; Dimitra I. Kaklamani; Iakovos S. Venieris


Archive | 2014

Trust in an Enterprise World: A Survey

Fotios Gogoulos; Anna Antonakopoulou; Georgios V. Lioudakis; Dimitra I. Kaklamani; Iakovos S. Venieris


Journal of Research and Practice in Information Technology | 2014

An Ontology for Privacy-aware Access Control in Network Monitoring Environments.

Anna Antonakopoulou; Fotios Gogoulos; Georgios V. Lioudakis; Aziz S. Mousas; Dimitra I. Kaklamani; Iakovos S. Venieris

Collaboration


Dive into the Fotios Gogoulos's collaboration.

Top Co-Authors

Avatar

Anna Antonakopoulou

National and Kapodistrian University of Athens

View shared research outputs
Top Co-Authors

Avatar

Dimitra I. Kaklamani

National Technical University of Athens

View shared research outputs
Top Co-Authors

Avatar

Georgios V. Lioudakis

National Technical University of Athens

View shared research outputs
Top Co-Authors

Avatar

Iakovos S. Venieris

National Technical University of Athens

View shared research outputs
Top Co-Authors

Avatar

Aziz S. Mousas

National Technical University of Athens

View shared research outputs
Researchain Logo
Decentralizing Knowledge