16
Page | 1 CURRICULUM VITAE Dr. Prokopios Drogkaris Adress : Lykourgou 105, Kallithea, Greece Date of Birth: 9th October 1982 Contact Tel. Number: 6979 -11- 31-98 Nationality: Greek Email: [email protected] Marital Status: Single Webpage: www.icsd.aegean.gr/pdrogk Military Obligations: Fulfilled Linkedin Profile: www.linkedin.com/in/pdrogk Twitter Profile: @PDrogkaris SKILLS Knowledge and experience in the fields of IT Security and e-Government environments through participation in research national and international projects (proposals, tenders and projects’ implementation) along to strong academic background (research publications and academic teaching). Deep understanding of Privacy Enhancing Technologies (PET), Digital Identities and Identification Management (IdM) along to Information Security Management System (ISMS) as specified in ISO/IEC 27001:2005 including security requirements establishment, security risks assessment and management, security policies, access control, security incidents and business continuity management. EDUCATION Doctor of Philosophy 9/2007 – 11/2013 University of the Aegean, Greece, School of Science, Department of Information and Communication Systems Engineering Research Area: Information and Communication Systems Security PhD Thesis Title: Security and Privacy in e-Government Information Systems Postgraduate Studies 9/2005 – 9/2007 City University Of London, UK, School Of Informatics Master of Science in Information Systems Undergraduate Studies 9/2000 – 6/2005 University of the Aegean, Greece, School of Science Department of Information and Communication Systems Engineering Diploma in Information and Communication Systems Enginneering

CURRICULUM VITAE Dr. Prokopios Drogkaris · 2013-11-18 · Undergraduate Studies 9/2000 – 6/2005 University of the Aegean , Greece, School of Science Department of Information and

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: CURRICULUM VITAE Dr. Prokopios Drogkaris · 2013-11-18 · Undergraduate Studies 9/2000 – 6/2005 University of the Aegean , Greece, School of Science Department of Information and

Page | 1

CURRICULUM VITAE

Dr. Prokopios Drogkaris

Adress : Lykourgou 105, Kallithea,

Greece Date of Birth: 9th October 1982

Contact Tel. Number: 6979 -11- 31-98 Nationality: Greek

Email: [email protected] Marital Status: Single

Webpage: www.icsd.aegean.gr/pdrogk Military Obligations: Fulfilled

Linkedin Profile: www.linkedin.com/in/pdrogk Twitter Profile: @PDrogkaris

SKILLS

Knowledge and experience in the fields of IT Security and e-Government environments through participation in

research national and international projects (proposals, tenders and projects’ implementation) along to strong

academic background (research publications and academic teaching). Deep understanding of Privacy Enhancing

Technologies (PET), Digital Identities and Identification Management (IdM) along to Information Security

Management System (ISMS) as specified in ISO/IEC 27001:2005 including security requirements establishment,

security risks assessment and management, security policies, access control, security incidents and business

continuity management.

EDUCATION

■ Doctor of Philosophy

9/2007 – 11/2013

University of the Aegean, Greece, School of Science,

Department of Information and Communication Systems Engineering

Research Area: Information and Communication

Systems Security

PhD Thesis Title: Security and Privacy in e-Government

Information Systems

■ Postgraduate Studies

9/2005 – 9/2007

City University Of London, UK, School Of Informatics

Master of Science in Information Systems

■ Undergraduate Studies

9/2000 – 6/2005

University of the Aegean, Greece, School of Science

Department of Information and Communication Systems Engineering

Diploma in Information and Communication Systems Enginneering

Page 2: CURRICULUM VITAE Dr. Prokopios Drogkaris · 2013-11-18 · Undergraduate Studies 9/2000 – 6/2005 University of the Aegean , Greece, School of Science Department of Information and

Page | 2

PUBLICATIONS

■ Journal Publications*

i. P. Drogkaris, S. Gritzalis, C. Lambrinoudakis, “Employing Privacy Policies and Preferences in

Modern e-Government Environments”, Special Issue on "Security and Privacy of E-Government

Applications and Services" of the International Journal of Electronic Governance, 2014,

Inderscience

(0)

■ Conference Publications*

ix. D. Kostopoulos, V. Tsoulkas, G. Leventakis, P. Drogkaris, V. Politopoulou, “Real Time Threat

Prediction, Identification and Mitigation for Critical Infrastructure Protection using Semantics, Event

Processing and Sequential Analysis“, 8th International Workshop on Critical Information

Infrastructures Security (CRITIS 2013), September 2013, Holland, Lecture Notes in Computer

Science LNCS, Springer

(0)

viii. D. Kostopoulos, V. Tsoulkas, G. Leventakis, P. Drogkaris, V. Politopoulou, “A Blend of Semantic

Monitoring and Intrusion Detection Systems for the Protection of Critical Infrastructures: Research

efforts within the Greek Cybercrime Center“ (Keynote Speech), Fifth International Conference on

Computanional Intelligence, Communication Systems and Networks (CICSYN 2013), G. Romero, A.

Orsoni, (eds), June 2013, Spain, IEEE CPS

(0)

vii. D. Kostopoulos, V. Tsoulkas, G. Leventakis, P. Drogkaris, V. Politopoulou, "Semantic Systems

Modeling and Monitoring for Real Time Decision Making: Results and Next Steps within the Greek

Cyber Security Center of Excellence (Keynote Speech)“, AMSS 15th International Conference on

Modelling and Simulation (UK-SIM 2013), April 2013, Cambridge University , IEEE CPS

(0)

vi. D. Núñez, I. Agudo, P. Drogkaris, S. Gritzalis, “Identity Management Challenges for Intercloud

Applications“, 1st International Workshop on Security & Trust for Applications in Virtualised

Environments (STAVE 2011), June, 2011, Loutraki, Greece, Communications in Computer and

Information Science Series CCIS, Springer

(4)

v. P. Drogkaris, S. Gritzalis, “Attaching Multiple Personal Identifiers in X.509 Digital Certificates”,

EuroPKI 2010 7th European Workshop on Public Key Services, Applications and Infrastructures, J.

Camenisch and C. Lambrinoudakis, (Eds.), pp. 171-177, September 2010, Athens, Greece, Lecture

Notes in Computer Science LNCS, Springer

(0)

iv. P. Drogkaris, S. Gritzalis, C. Lambrinoudakis, "Transforming the Greek e-Government Environment

towards the e-Gov 2.0 Era", EGOVIS'10 International Conference on Electronic Government and the

Information Systems Perspective, K. Andersen, E. Francesconi, A. Gronlund, T. M. Engers. (Eds.),

pp. 142 -149, September 2010, Bilbao, Spain, Lecture Notes in Computer Science LNCS, Springer

(6)

iii. P. Drogkaris, C. Lambrinoudakis, S. Gritzalis, "Introducing Federated Identities to One-Stop-Shop e-

Government Environments: The Greek Case", eChallenges 2009 19th Conference, P. Cunningham,

M. Cunningham (Eds.), pp 115 – 121, October 2009, Istanbul, Turkey, eChallenges e-2009

(0)

* The numbers inside the parentheses suggest the citations of each publication.

Page 3: CURRICULUM VITAE Dr. Prokopios Drogkaris · 2013-11-18 · Undergraduate Studies 9/2000 – 6/2005 University of the Aegean , Greece, School of Science Department of Information and

Page | 3

Conference Proceedings

ii. P. Drogkaris, S. Gritzalis, C. Lambrinoudakis, "Enabling Secure Data Management in e-Government

Environments: The Greek Case", EGOV’09 8th International Conference on Electronic Government,

EGOV 2009, H. J. Scholl, M. Janssen, R. Traunmüller, M. A. Wimmer (Eds.), pp. 138-145,

September 2009, Linz, Austria, Trauner Verlag Schriftenreihe Informatik

(0)

i. P. Drogkaris, D. Geneiatakis, S. Gritzalis, C. Lambrinoudakis, L. Mitrou, "Towards an Enhanced

Authentication Framework for eGovernment Services: The Greek case", EGOV’08 7th International

Conference on Electronic Government, E. Ferro, J. Scholl, M. Wimmer (Eds.), pp. 189-196,

September 2008, Torino, Italy, Trauner Verlag Schriftenreihe Informatik

(6)

RESEARCH INTERESTS

■ e-Government Privacy, Security, Legal & Ethical Issues

■ Privacy Enhancing Technologies (PET)

■ Cloud Computing

■ Digital Authentication in e-Government Environments

■ Public Key Infrastructures

■ Federated Identities

■ Web 2.0

EDITING & CONFERENCE

ORGANIZATION ACTIVITIES

■ Member of Program Committee at 10 International and 6 European conferences:

▪ European Conference on Social Media (ECSM 2014), (Brighton : United Kingdom), July 2014, Academic

Publishing International API

▪ 9th International Conference on Cyber Warfare and Security (ICCWS 2014), (West Lafayette : USA),

March 2014, Academic Publishing International API

▪ The Eighth International Conference on Digital Society (ICDS 2014), (Barcelona : Spain), March 2014,

IARIA XPS Press

▪ International Conference on Cloud Security Management (ICCSM-2013), (Seattle : USA), October 2013,

Academic Publishing International API

▪ 12th European Conference on Research Methodology for Business and Management Studies (ECRM

2013), (Minho : Portugal), July 2013, Academic Publishing International API

▪ 13th European Conference on eGovernment (ECEG 2013), (Como : Italy), June 2013, Academic

Publishing International API

Page 4: CURRICULUM VITAE Dr. Prokopios Drogkaris · 2013-11-18 · Undergraduate Studies 9/2000 – 6/2005 University of the Aegean , Greece, School of Science Department of Information and

Page | 4

▪ 8th International Conference on Information Warfare and Security (ICIW-2013), (Denver : USA), March

2013, Academic Publishing International API

▪ The Seventh International Conference on Digital Society (ICDS 2013), (Nice : France), February 2013,

XPS (Xpert Publishing Services)

The Second International Conference on Social Eco-Informatics (SOTICS 2012), (Venice : Italy), October

2012, XPS (Xpert Publishing Services)

▪ 12th European Conference on eGovernment (ECEG 2012), (Barcelona : Spain), June 2012, Academic

Publishing International API

▪ 11th European Conference on Research Methodology for Business and Management Studies (ECRM

2012), (Bolton : United Kingdom), June 2012, Academic Publishing International API

▪ 7th International Conference on Information Warfare and Security (ICIW 2012), (Seattle : USA), March

2012, Thomson Reuters ISI Web of Science (WOS)

▪ The Sixth International Conference on Digital Society (ICDS 2012), (Valencia : Spain), February 2012, XPS

(Xpert Publishing Services)

▪ 11th European Conference on eGovernment (ECEG 2011), (Ljubljana : Slovenia), June 2011, Academic

Publishing International API

▪ 6th International Conference on Information Warfare and Security (ICIW 2011) (Washington: USA), March

2011, Thomson Reuters ISI Web of Science (WOS)

▪ The Fifth International Conference on Digital Society (ICDS 2011) (Gosier, Guadeloupe: France), February

2011, XPS (Xpert Publishing Services)

■ Member of Organization Committee at 2 International Conferences

▪ 3rd IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2011),

(Athens : Greece), November 2011, IEEE

▪ 2nd Annual Workshop on Digital Forensics and Incident Analysis (Greece: Samos), August 2007, IEEE

Computer Society Press

■ International Journals Editorial Board Member:

▪ International Journal On Advances in Internet Technology, IARIA

■ International Journals Reviewer:

Page 5: CURRICULUM VITAE Dr. Prokopios Drogkaris · 2013-11-18 · Undergraduate Studies 9/2000 – 6/2005 University of the Aegean , Greece, School of Science Department of Information and

Page | 5

▪ Computer Standards & Interfaces, Elsevier

▪ Transactions on Information Technology in BioMedicine, IEEE

■ External Reviewer at 40 International, 5 European and 1 National Conferences:

▪ 47th Hawaiian International Conference on System Sciences (HICSS-47), (Big Island : Hawaii), January 2014, IEEE

▪ 15th International Conference on Information & Communications Security (ICICS 2013), (Beijing : China), November 2013, Springer LNCS

▪ 2nd International Conference on Advances in Computing, Communications and Informatics (ICACCI-2013), (Mysore : India), August 2013, IEEE

▪ 10th International Conference on Security and Cryptography (SECRYPT 2013), (Reykjavic : Iceland), July 2013, Springer CCIS

▪ 7th IFIP WG 11.11 International Conference on Trust Management, (Malaga : Spain), June 2013, Springer LNCS

▪ The 7th International Conference on Network and System Security (NSS 2013), (Madrid : Spain), June 2013, Springer LNCS

▪ 21st Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP 2013), (Belfast : Ireland), February 2013, IEEE CPS

▪ 46th Hawaiian International Conference on System Sciences (HICSS-46),( Maui : Hawaii), January 2013, IEEE

▪ The 4th International Symposium on Cyberspace Safety and Security (CSS 2012), (Melbourne : Australia), December 2012, Springer LNCS

▪ 6th International Conference on Network and System Security (NSS 2012), (Fujian : China), November 2012, Springer LNCS

▪ The 7th International Conference on Frontier of Computer Science and Technology (FCST-12), (Suzhou : China), November 2012, FCST Conference Proceedings

▪ 9th European PKI Workshop: Research and Applications (EuroPKI 2012), (Pisa : Italy), September 2012, Springer LNCS

▪ 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12), (Liverpool : United Kingdom), June 2012, IEEE

▪ International Conference on Security and Cryptography (SECRYPT 2012), (Rome : Italy), July 2012, Springer CCIS

▪ The 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-11), (Changsha : China), November 2011, IEEE

▪ 9th Annual IEEE Consumer Communications and Networking Conference, (Las Vegas : USA), January 2012, IEEE

▪ 3rd IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2011), (Athens : Greece), November 2011, IEEE

▪ 2nd International Conference on Computer and Communication Technology (ICCCT 2011), (Allahabad : India), September 2011, IEEE Xplore

▪ 5th International Conference on Network and System Security (NSS 2011), (Milan : Italy), September 2011, IEEE

▪ International Conference on Security and Cryptography (SECRYPT 2011), (Seville : Spain), July 2011, SECRYPT Proceedings

▪ International Conference e-Commerce 2011 (EC 2011), (Rome : Italy), July 2011, IADIS Conference Proceedings

▪ 7th International Workshop on Security and Trust Management (STM'11) in conjunction with 5th IFIP WG

11.11 International Conference on Trust Management, (Copenhagen : Denmark), July 2011, Springer LNCS

▪ 9th Annual Conference on Privacy, Security and Trust (PST 2011), (Montreal : Canada), July 2011, IEEE

Page 6: CURRICULUM VITAE Dr. Prokopios Drogkaris · 2013-11-18 · Undergraduate Studies 9/2000 – 6/2005 University of the Aegean , Greece, School of Science Department of Information and

Page | 6

Xplore

▪ 9th International Conference on Applied Cryptography and Network Security (ACNS '11) , (Malaga : Spain), June 2011, Springer LNCS Series

▪ The 2010 International Conference on Multimedia Information NEtworking and Security (MINES 2010), (Nanjing : China), November 2010, IEEE

▪ 5th International Conference on Critical Information Infrastructure Security (CRITIS 10), (Athens : Greece), September 2010, Springer LNCS

▪ 15th European Symposium on Research in Computer Security (ESORICS 2010), (Athens : Greece), September 2010, Springer LNCS series

▪ 6th International ICST Conference on Security and Privacy in Communication Networks (SecureComm 2010), (Singapore : Singapore), September 2010, Springer's LNICST

▪ International Conference on Security and Cryptography (SECRYPT 2010) , (Athens : Greece), July 2010, Springer-Verlag

▪ IADIS e-Commerce 2010 (EC 2010), (Freiburg : Germany), July 2010, InderScience

▪ IEEE Communications and Information Security Symposium (Globecom 2009), (Hawai : USA), November 2009, IEEE Press

▪ 6th International Conference on Trust, Privacy & Security in Digital Business (Trustbus 2009) in conjunction

with 20th International Conference on Database and Expert Systems Applications (DEXA 2009) , (Linz : Austria), September 2009, Springer LNCS series

▪ 13th Panhellenic Conference on Informatics (PCI' 09), (Corfu : Greece), September 2009, IEEE

▪ International Conference on e-Business (ICE-B 2009) in conjunction with International Joint Conference on e-Business and Telecommunications, ICETE, (Milan : Italy), July 2009, ICE-B 2009 Proceedings

▪ 7th International Conference on Computing, Communications and Control Technologies (CCCT 2009) in

conjunction with 2nd International Multi-Conference on Engineering and Technological Innovation (IMETI 2009), (Orlando : USA ), July 2009, Conference Proceedings

▪ 8th Annual ISSA Conference (ISSA 2009), (Johannesburg : South Africa), July 2009, ISSA proceedings

▪ 4th International Annual Workshop on Digital Forensics & Incident Analysis (WDFIA 2009), (Athens : Greece), June 2009, WDFIA Proceedings

▪ Third International Symposium on Human Aspects of Information Security & Assurance (HAISA 2009), (Athens : Greece), June 2009, HAISA Proceedings

▪ 24th Annual ACM Symposium on Applied Computing, (Hawaii : USA), March 2009, ACM Press

▪ The Fourth International Conference on Signal-Image Technology & Internet, (Bali : Indonesia), December 2008, IEEE Conference Publishing Services (IEEE CSP)

▪ 3rd International Workshop on Critical Information Infrastructures Security, (Frascati (Rome) : Italy), October 2008, Springer Lecture Notes in Computer Science

▪ 5th International Conference on Trust, Privacy and Security in Digital Business (Trustbus 2008) in

conjunction with DEXA 2008: 19th International Conference on Database and Expert Systems Applications, (Torino : Italy), September 2008, Springer

▪ 7th Annual ISSA Information Security Conference, (Johannesburg : South Africa), July 2008, University of Johannensurg

▪ Fifth European PKI Workshop (EuroPKI 2008), (Trondheim : Norway), June 2008, Springer in the Lecture Notes in Computer Science (LNCS)

▪ 2nd International Conference on Multimedia and Ubiquitous Engineering, (Busan : Korea), April 2008, IEEE Computer Society

▪ 23rd Annual ACM Symposium on Applied Computing, (Ceará : Brasil), March 2008, ACM Press

TEACHING ACTIVITIES

Page 7: CURRICULUM VITAE Dr. Prokopios Drogkaris · 2013-11-18 · Undergraduate Studies 9/2000 – 6/2005 University of the Aegean , Greece, School of Science Department of Information and

Page | 7

■ 10/2010 – 6/2013 Technological Educational Institute of Piraeus, General Department of

Mathematics

Laboratory Associate

Teaching Structured Programming (Laboratory)

Introduction to Computer Programming I

(Laboratory)

Computer Programming I (Laboratory)

Computer Programming III (Laboratory)

■ 10/2012 – 1/2013 New York College Athens - School of Computing

▪ Instructor «Database Systems» and «Data Communications & Networking»

at BS. in Computer Science, State University of New York -Empire State

College

■ 10/2011 – 2/2013 Mediterranean College – School of Computing

▪ Instructor «Systems Analysis», «Introduction to Database Systems»,

«Databases» and «Operating Systems» at BSc (Hons) Computing and BSc

(Hons) Computer Science, University of Derby UK

▪ Instructor «Web Development Issues» at BSc (Hons) Computing, University

of Teeside UK

▪ Instructor «IT Applications – Project Management» at HND Civil

Engineering, Edexcel

■ 10/2010 – 2/2012 Technological Educational Institute of Kalamata, Department of Technology of

Informatics & Telecommunications.

Laboratory Associate

Teaching Databases II (Theory, Tutorial and Laboratory)

Algorithms and Data Structures (Laboratory)

Software Engineering (Theory and Laboratory)

Systems Analysis (Laboratory)

■ 2/2010 – 6/2010 University of the Aegean, Greece, School of Science,

Department of Information and Communication Systems Engineering

Auxiliary Laboratory Teaching at “Information and Communication Systems

Security” Undergraduate Course

■ 2/2009 – 6/2009 University of the Aegean, Greece, School of Science,

Department of Information and Communication Systems Engineering

Auxiliary Laboratory Teaching at “Information and Communication Systems

Security” Undergraduate Course

■ 23/1/2009 University of the Aegean, Greece, School of Science

Department of Information and Communication Systems Engineering

Postgraduate Program in “Technologies and management of information and

Page 8: CURRICULUM VITAE Dr. Prokopios Drogkaris · 2013-11-18 · Undergraduate Studies 9/2000 – 6/2005 University of the Aegean , Greece, School of Science Department of Information and

Page | 8

communication systems”

Invited Lecture on «Security and Digital Authentication in e-Government

Environments»

R&D ACTIVITIES

■ 9/2013 - Today Ministry of Interior Spain, ISDEFE, Center for Security Studies

Researcher, CIISC-T2: Critical Instrastructure Improvement of Security

Control against the Terrorist Threat

■ 7/2013 - Today THALES Communications S.A., National Centre for Scientific Research

(NCSR) “Demokritos”, Center For Security Studies, TELETEL, S.A., AMPER

SISTEMAS, S.A., Cluster TIC Seguridad y Confianza, Empresa de Serviços e

Desenvolvimento de Software, S.A., Rohill Technologies B.V., THYIA

TEHNOLOGIJE D.O.O., Rinicom Ltd.

Ethical Committee Member - Researcher, “Heterogeneous Interoperable

Transportable GATEway for First-Responders”

(www.hit-gate.eu)

■ 4/2013 - Today Vitamib, Atos Spain S.A., Centre for Irish and European Security, Market &

Opinion Research International, Center for Security Studies, The Hebrew

University of Jerusalem, National Center for Scientific Research

"DEMOKRITOS", Rand Europe, Institutt for Fredsforsking Stiftelse, University

of Westminster, Centre for Science, Society and Citizenship

Researcher, The relationship between Human privacy and security SEC

Programme “Public Perception of Security and Privacy: Assessing

Knowledge, Collecting Evidence, Translating Research into Action”

(www.projectpact.eu)

■ 2/2013 - Today FORTH-ICS, SafeNet, AUTH-LEPS, Center for Security Studies

Researcher on FP7, DG Home Affairs: Prevention of and Fight against Crime

ISEC Programme “A CyberCrime Center of Excellence for

Training, Research and Education in Greece”

(www.cybercc.gr)

■ 8/2012 – 11/2013 Ministry of Development, Competiveness, Infrastructure, Transport and

Networks, Interreg III, Cyprus University of Technology, Technical University

of Crete, University of the Aegean, Cyprus Police

Researcher on international project “Development of Intelligent Sea Space

surveillance system with the application of Array Camera and Sensor

Networks (POSEIDON)”

Page 9: CURRICULUM VITAE Dr. Prokopios Drogkaris · 2013-11-18 · Undergraduate Studies 9/2000 – 6/2005 University of the Aegean , Greece, School of Science Department of Information and

Page | 9

(www.poseidonproject.eu)

■ 11/2012 – 12/2012 National and Kapodistrian University of Athens, Administrative Reform 2007-

2013, Ministry of Administrative Reform & e-Government

Researcher on national project “Comparative study of the European Union

and Greece for a) e-Government, b) Trust and Security, and c) Fast and

Ultra-Fast internet access. Deviations, performance indicators and

recommendations for national actions”.

■ 11/2013 – 2/2013 PAU Education & European Commision - Digital Agenda for Europe - Going

Local 2012 (http://www.digitalagenda12.eu) Cyprus and Greece Animator

■ 4/2012 – 7/2012 PAU Education & European Commision - Digital Agenda for Europe - Digital

Agenda Assembly 2012 (http://www.digitalagenda12.eu) Security Group Animator and Moderator

■ 11/2010 – 10/2011 Ministry of Transportations, Structures and Networks

Digital Greece 2020 Forum (www.digitalgreece2020.gr)

Privacy and Security Group Rapporteur

■ 1/2007 – 12/2008 KTP ΑΕ – Ministry of the Interior, Public Administration and Decentralization -

PLANET AE, NTUA

Researcher on national project «eGIF: Greek e-Government Interoperability

Framework: Digital Authentication Framework»

EMPLOYMENT ACTIVITIES

■ 2/2013 - Today Center for Security Studies (KEMEA)

Research Associate on EU-funded and National Research Projects

■ 1/2009 – 7/2009 Unisystems Α.Ε.Ε

User Training and Software Support at Samos Prefecture Information

Systems

■ 1/2005 – 8/2005 Laboratory of Information and Communication Systems Security (Info-Sec-

Lab), University of the Aegean

Researcher on project « Design and development of a department database

for maintaining all students personal and educational data »

■ 10/2004 – 2/2005 Laboratory of Information and Communication Systems Security (Info-Sec-

Lab), University of the Aegean

Page 10: CURRICULUM VITAE Dr. Prokopios Drogkaris · 2013-11-18 · Undergraduate Studies 9/2000 – 6/2005 University of the Aegean , Greece, School of Science Department of Information and

Page | 10

Researcher on project « Development and Deployment of a smart card based

PKI infrastructure for authentication and authorization mechanisms for all

University users ( students and faculty )»

LANGUAGES

■ English Excellent

Knowledge 6/1999

Certificate of Proficiency in English, University Of Cambridge

■ German Good Knowledge

9/1998 Grundstuffe Zertifikat

Goethe-Institut

COMPUTER SKILLS

■ Methodologies & Standards CRAMM, Octave, ISO/IEC 27001:2005 Certified ISMS Auditor

■ Programming Languages: Visual Basic, C, C WinAPI, C++, Java, SQL

■ Databases: MS SQL, MySQL, PostgreSQL, MS Access

■ Modeling and Analysis Tools: UML, SSADM

■ Web Programming: HTML, PHP, ASP, VBscript, JavaScript, XML, CSS

■ Operating Systems: Linux (Ubuntu), Windows (NT/200/Server 2003/XP/Vista/7)

MEMBER

■ 12/2006 - Today : Technical Chamber of Greece (T.E.E.)

■ 9/2006 - Today : Laboratory of Information and Communication Systems Security (Info-Sec-

Lab), University of the Aegean

■ 5/2005 - Today : Greek Computer Society (E.P.Y.)

■ 10/2012 – Today: Open Web Application Security Project (OWASP)

■ 8/2013 – Today: EC NIS Platform - WG1 (Risk Management) Member

RECCOMENDATION LETTERS

Furnished upon request

Page 11: CURRICULUM VITAE Dr. Prokopios Drogkaris · 2013-11-18 · Undergraduate Studies 9/2000 – 6/2005 University of the Aegean , Greece, School of Science Department of Information and

Page | 11

CITATIONS

■ Publication

P. Drogkaris, D. Geneiatakis, S. Gritzalis, C. Lambrinoudakis, L. Mitrou, "Towards an Enhanced Authentication

Framework for eGovernment Services: The Greek case", EGOV’08 7th International Conference on Electronic

Government, E. Ferro, J. Scholl, M. Wimmer (Eds.), pp. 189-196, September 2008, Torino, Italy, Trauner

Verlag Schriftenreihe Informatik

■ Citations

1. Lampathaki F., Tsiakaliaris C., Stasis A., Charalabidis Y., "National Interoperability Frameworks: The Way

Forward", Interoperability in Digital Public Services and Administration: Bridging E-Government and E-

Business, pp. 1-24, IGI Global, 2011

2. lomp M., Grijpink J., "Combating Identity Fraud in the Public Domain: Information Strategies for

Healthcare and Criminal Justice", Proceedings of the 11th European Conference on e-Government, Klun

M., Decman M., Jukić T. (Eds), pp.481-488, 2011, Ljubljana, Slovenia, Academic Publishing Limited

3. Z. Kardasiadou, E. Chatziliasi and K. Limniotis, "e-Government in Greece: serving state’s economic needs

– respecting the fundamental right to data protection", in the 7th International Conference in Global

Security, Safety and Sustainability (ICGS3) / 4th e-Democracy Joint Conferences, R. Bashroush, et al.

(Eds.), Springer, 2011

4. Al-Hujra, O, Al-dalahmeh,M and Aloudat, A. “The Role of National Culture on Citizen Adoption of

eGovernment Services: An Empirical Study” Electronic Journal of e-Government Volume 9 Issue 2, pp. 93

– 106, 2011

5. Z. Kardasiadou, E. Chatziliasi, K. Limniotis. “E-Government in Greece: Serving State’s Economic Needs –

Respecting the Fundamental Right to Data Protection” Global Security, Safety and Sustainability & e-

Democracy, pp. 179-185, Springer, 2012, ISBN: 978-3-642-33448-1

6. Plomp, M and Grijpink, J. “Towards an Information Strategy for Combating Identity Fraud in the Public

Domain: Cases from Healthcare and Criminal Justice” Electronic Journal of e-Government Volume 9

Issue 2 2011, (pp214 - 222)

■ Publications

D. Nunez , I. Agudo, P. Drogkaris, S. Gritzalis, “Identity Management Challenges for Intercloud Applications”,

1st International Workshop on Security & Trust for Applications in Virtualised Environments (STAVE

2011), C. Skianis, (Ed.), pp. 198-204, June 2011, Loutraki, Greece, Springer CCIS

▪ Citations

1. P.G. Dorey, A. Leite, "Commentary : Cloud computing – A security problem or solution?", Information

Security Technical Report, ISSN 1363-4127, 10.1016/j.istr.2011.08.004., 2011, Elsevier

2. R. Roman, M. R. Felipe, P. E. Gene, and J. Zhou, ‘Analysis of security components in cloud storage

systems’, APMRC, 2012 Digest, pp. 1–4, Nov. 2012.

3. Yung-Feng Lu and Chin-Fu Kuo. “Robust and flexible tunnel management for secure private cloud”.

SIGAPP Appl. Comput. Rev. 13, pp. 41-50, 2013, ACM

4. S. Bendoukha, D. Moldt, T. Wagner : Enabling Cooperation in an Inter-cloud Environment: An Agent-

Based Approach, , 2013 24th International Workshop on Database and Expert Systems Applications

Page 12: CURRICULUM VITAE Dr. Prokopios Drogkaris · 2013-11-18 · Undergraduate Studies 9/2000 – 6/2005 University of the Aegean , Greece, School of Science Department of Information and

Page | 12

(DEXA), pp. 217 – 221, 2013, Springer

■ Publication

P. Drogkaris, S. Gritzalis, C. Lambrinoudakis, "Transforming the Greek e-Government Environment towards

the e-Gov 2.0 Era", EGOVIS'10 International Conference on Electronic Government and the Information

Systems Perspective, K. Andersen, E. Francesconi, A. Gronlund, T. M. Engers. (Eds.), pp. 142 -149,

September 2010, Bilbao, Spain, Lecture Notes in Computer Science LNCS, Springer

▪ Citations

1. M. Prandini, M. Ramilli, “Security considerations about the adoption of web 2.0 technologies in sensitive e-

government processes”, ICEGOV '11 5th International Conference on Theory and Practice of Electronic

Governance, Ed(s) E. Estevez, M.Janssen and N. Leosk pp. 285-288, September 2011, Tallinn Estonia,

ACM Press

2. Gil-Garcia, J. Ramon, “Electronic Government Success: Definition, Measures, and Factors”, Enacting

Electronic Government Success, Springer US, 2012, ISBN: 978-1-4614-2015-6

3. U. Sivarajah, Z. Irani, “Exploring the Application of web 2.0 in e-Government: A United Kingdom Context”,

tGov 2012, May 2012, Brunel, United Kingdom, ISEing Group Brunel University

4. M. Prandini, M. Ramilli, “Raising Risk Awareness on the Adoption of Web 2.0 Technologies in Decision

Making Processes”, Future Internet 2012, 4(3), pp. 700-718, ISSN 1999-5903, MDPI Publications

5. R. T. Khasawneh, E. A. Abu, “E-Government and Social Media Sites: The Role and Impact”, World

Journal of Computer Application and Technology, Vol. 1, pp. 10 - 17, 2013

6. U, Sivarajah, Z. Irani, “A Theoretical Model For The Application Of Web 2.0 In E-Government”. European,

Mediterranean & Middle Eastern Conference on Information Systems 2013 (EMCIS2013), October 17-18,

2013, Windsor, UK

SCIENTIFIC PUBLICATIONS ANATYLIC MEMO

■ Journal Publications

Authors: P. Drogkaris, S. Gritzalis, C. Lambrinoudakis

Publication

Data:

“Exploring the Incorporation of Privacy Policies and Preferences in Modern e-

Government Environments”, special issue on "Security and Privacy of E-Government

Applications and Services" of the International Journal of Electronic Governance, pp ,

2013, Inderscience

Abstract: The evolvement of e-Government has increased users’ concerns on personal data

disclosure and privacy threats as more and more information is released to a rising

number of governmental service providers. This paper addresses the consideration of

users retaining control over their personal information while relishing advanced

governmental electronic services. Additionally, it proposes a simple, yet effective,

architecture which promotes the embodiment of Privacy Policies and Preferences in

Page 13: CURRICULUM VITAE Dr. Prokopios Drogkaris · 2013-11-18 · Undergraduate Studies 9/2000 – 6/2005 University of the Aegean , Greece, School of Science Department of Information and

Page | 13

modern e-Government environments that aim to simplify the provision of electronic

services while preserving users’ personal data and information privacy.

■ Conference Publications

Authors: P. Drogkaris, D. Geneiatakis, S. Gritzalis, C. Lambrinoudakis, L. Mitrou

Publication

Data:

"Towards an Enhanced Authentication Framework for eGovernment Services: The Greek

case", EGOV’08 7th International Conference on Electronic Government, E. Ferro, J.

Scholl, M. Wimmer (Eds.), pp. 189 – 196, September 2008, Torino, Italy, Trauner Verlag

Schriftenreihe Informatik

Abstract: It is widely accepted that electronic Government environments have caused a complete

transformation of the way individuals, businesses and governmental agencies interact

with central government. However, the acceptance and success of e-Government

services largely depend on the level of trust and confidence developed by the users to the

provided services and the overall system security. Thus the employment of the

appropriate authentication framework is a crucial factor. This paper focuses on the way to

determine the appropriate trust level of an electronic service. Specifically, it provides

guidelines according to the data required for a transaction, as well as to the available

authentication and registration mechanisms. Moreover, a Single SignOn architecture is

proposed, supporting a uniform authentication procedure that depends on the level of

trust required by the service. In the aforementioned research work specific requirements

and limitations for Greece have been taken into account.

Authors: P. Drogkaris, S. Gritzalis, C. Lambrinoudakis,

Publication

Data:

"Enabling Secure Data Management in e-Government Environments: The Greek Case",

EGOV’09 8th International Conference on Electronic Government, EGOV 2009, H. J.

Scholl, M. Janssen, R. Traunmüller, M. A. Wimmer (Eds.), pp. 138-144, September

2009, Linz, Austria, Trauner Verlag Schriftenreihe Informatik

Abstract: Modern e-Government environments adopt technologies that can support interoperability

across the entire “electronic” public sector and thus new improved electronic services. At

the same time new requirements are raised from the users. This paper presents ongoing

research on a secure user data management architecture for e-Government

environments. More specifically the utilization of Privacy Preferences and Privacy

Policies along with the introduction of two entities responsible for administrating user

documents and data management is proposed. The research work presented has been

based on the Greek Interoperability Framework and it’s specific requirements and

limitations.

Authors: P. Drogkaris. C. Lambrinoudakis, S. Gritzalis

Page 14: CURRICULUM VITAE Dr. Prokopios Drogkaris · 2013-11-18 · Undergraduate Studies 9/2000 – 6/2005 University of the Aegean , Greece, School of Science Department of Information and

Page | 14

Publication

Data:

"Introducing Federated Identities to One-Stop-Shop e-Government Environments: The

Greek Case", eChallenges 2009 19th Conference, P. Cunningham, M. Cunningham

(Eds.), pp 115 – 121, October 2009, Istanbul, Turkey, eChallenges e-2009 Conference

Proceedings

Abstract: Even though e-Government environments have achieved a certain interoperability level

and coherence across public sector, there are several approaches, technologies and

mechanisms that could aid these environments towards delivering more user-centric

electronic services. This paper focuses on the aspect of identity management. More

specifically it presents a framework that incorporates the notion of federation and

federated identities in order to overcome the impediment of per-sector identifiers.

Moreover, it provides Single Sign-On access to electronic services through the utilization

of a linking mechanism. This framework has been based on the Greek Interoperability

Framework and its specific requirements and limitations.

Authors: P. Drogkaris, S. Gritzalis, C. Lambrinoudakis

Publication

Data:

“Transforming the Greek e-Government Environment towards the e-Gov 2.0 Era”,

EGOVIS'10 International Conference on Electronic Government and the Information

Systems Perspective, K. N. Andersedn, E. Francesconi, Å. Grönlund, T. M. Engers

(Eds.), pp. 142 -149, September 2010, Bilbao, Spain, Lecture Notes in Computer

Science LNCS, Springer

Abstract: Modern e-Government environments across the public sector have achieved significant

interoperability and coherence but are now in front of the next leap forward, which is the

adaptation of Web 2.0 technologies. This transition towards e-Government 2.0 will not

only improve participation, transparency and integration but it will also speed up the pace

of innovation through collaboration and consultation. This paper presents an enhanced

Greek e-Government Framework that fully incorporates Web 2.0 technologies along with

an identification mechanism that retains compliance with existing authentication sub-

framework taking into account the specific needs and requirements of the Greek

Governmental Agencies.

Authors: P. Drogkaris, S. Gritzalis

Publication

Data:

"Attaching Multiple Personal Identifiers in X.509 Digital Certificates", EuroPKI'10 7th

European Workshop on Public Key Services, Applications and Infrastructures, J.

Camenisch and C. Lambrinoudakis, (Eds.), pp. 171-177, September 2010, Athens,

Greece, Springer LNCS

Abstract: The appeals for interoperable and decentralized Electronic Identity Management are

rapidly increasing, especially since their contribution towards interoperability across the

Page 15: CURRICULUM VITAE Dr. Prokopios Drogkaris · 2013-11-18 · Undergraduate Studies 9/2000 – 6/2005 University of the Aegean , Greece, School of Science Department of Information and

Page | 15

entire “electronic” public sector, effective information sharing and simplified access to

electronic services, is unquestioned. This paper presents an efficient and user-centric

method for storing multiple users’ identifiers in X.509 digital certificates while preserving

their confidentiality, allowing for interoperable user identification in environments where

users cannot be identified by an all embracing unique identifier.

Authors: D. Núñez, I. Agudo, P. Drogkaris, S. Gritzalis

Publication

Data:

“Identity Management Challenges for Intercloud Applications“, 1st International

Workshop on Security & Trust for Applications in Virtualised Environments (STAVE

2011), pp. 198-204, June, 2011, Loutraki, Greece, Communications in Computer and

Information Science Series CCIS, Springer

Abstract: Intercloud notion is gaining a lot of attention lately from both enterprise and academia,

not only because of its benefits and expected results but also due to the challenges that

it introduces regarding interoperability and standardisation. Identity management

services are one of the main candidates to be outsourced into the Intercloud, since they

are one of the most common services needed by companies and organisations. This

paper addresses emerging identity management challenges that arise in intercloud

formations, such as naming, identification, interoperability, identity life cycle

management and single sign-on.

Authors: D. Kostopoulos, V. Tsoulkas, G. Leventakis, P. Drogkaris, V.Politopoulou

Publication

Data:

“Real Time Threat Prediction, Identification and Mitigation for Critical Infrastructure

Protection using Semantics, Event Processing and Sequential Analysis”, 8th

International Workshop on Critical Information Infrastructures Security (CRITIS 2013),

September 2013, Holland, Lecture Notes in Computer Science LNCS, Springer

Abstract: Seamless and faultless operational conditions of multi stakeholder Critical Infrastructures

(CIs) are of high importance for today’s societies on a global scale. Due to their

population impact, attacks against their interconnected components can create serious

damages and performance degradation which eventually can result in a societal crisis.

Therefore it is crucial to effectively and timely protect these high performance - critical

systems against any type of malicious cyber-physical intrusions. This can be realized by

protecting CIs against threat consequences or by blocking threats to take place at an

early stage and preventing further escalation or predicting threat occurrences and have

the ability to rapidly react by eliminating its roots. In this paper a novel architecture is

proposed in which these three ways of confronting with cyber – physical threats are

combined using a novel semantics based risk methodology that relies on real time

behavioral analysis. The final prototype provides the CI operator with a decision tool

(DST) that imprints the proposed approach and which is capable of alerting on new

unknown threats, generate suggestions of the required counter-actions and alert of

Page 16: CURRICULUM VITAE Dr. Prokopios Drogkaris · 2013-11-18 · Undergraduate Studies 9/2000 – 6/2005 University of the Aegean , Greece, School of Science Department of Information and

Page | 16

probable threat existence. The implemented architecture has been tested and validated

in a proof of concept scenario of an airport CI with simulated monitoring data.