Antonis Michalas. Head of Cybersecurity Group. Education. PhD Thesis. Professional Experience
|
|
|
- Johnathan Manning
- 10 years ago
- Views:
Transcription
1 Antonis Michalas Head of Cybersecurity Group : [email protected] : : Education PhD in Network Security, University of Aalborg, Aalborg, Denmark. Main Academic Interests: Network Security, Privacy, Trust, Cryptography, e-voting, Cloud Computing, Urban Sensing, e-learning, Web Technologies, Semantic Web, and...anything that looks interesting Masters in Information Technology and Telecommunications, Athens Information Technology, Athens, Greece. Main Academic Interests: Computer Security, e-learning, Web Technologies, Semantic Web Degree in Mathematics, University of Crete, Heraklion, Crete. Main Academic Interests: Algebra, Approximation Theory, Mathematical Programming. PhD Thesis Title Supervisors External Collaboration Trust & Privacy in Distributed Networks Professor Neeli R. Prasad & Professor Nikos Komninos During my PhD I participated in the following external activities: Summer School. Mobile systems and ehealth security. University of Agder, Norway, Grimstad Visitor for one month at Ben Gurion University, Beersheva, Israel Visitor for three months at Princeton University, New Jersey, USA Professional Experience 09/2015 Current Lecturer in Cybersecurity, University of Westminster, Computer Science. As a lecturer I am teaching both undergraduate and postgraduate courses related to cryptography, forensics, cybersecurity and network security. My role expands to student supervision and research group coordination. In parallel I am an active member of the department s project development and research activities. In addition to that, I am leading the cybersecurity research group at the University of Westminster. The group has around 6 members and conducts applied research in security in widely deployed communication networks. 01/ /2015 Postdoctoral Researcher, Swedish Institute of Computer Science (SICS). Actively involved in the current national and European research projects in the Security Lab, where I combine research with student supervision and project management. Within one year of starting at SICS, I have successfully obtained funding for three EU projects. Currently, I conduct research in the field of Security & Privacy for People-Centric Sensing, Cloud Computing, Trusted Computing, e-voting Systems and Secure & Privacy Preserving e-health Systems. 1/7
2 03/ /2014 Security Consultant, Cyber Defence Department, Hellenic Army. Responsible for implementing and managing an information encryption system for the specific needs of the Hellenic Army. My work involved designing a secure single sign on protocol which connects online services of different web applications used by the military personnel. Additionaly, I was tasked with improving the security of existing systems/applications by staging attacks and providing solutions for any discovered vulnerabilities Senior Web Developer, DPG Digital Media, Athens, Greece. I was the team manager for Web-Related Projects. More precisely, I was responsible for talking directly with the clients and the Management Department in order to understand the needs of each project. Moreover, I was distributing the work to developers based on the requirements of each project while at the same time I was responsible for evaluating each part of the deliverable as well as programming the most demanding parts of the projects. Main working environments: php, mysql, javascript, jquery, ajax, xml, json Researcher, Athens Information Technology, Athens, Greece. Conducting research in network security. More precisely, my research focused on private and secure e-voting systems, reputation systems, privacy in decentralized environments, cloud computing and privacy preserving protocols in participatory sensing applications Software Engineer, I-Cube S.A., Athens, Greece. Development of European Union research projects. Main working environments: microsoft.net (c#, vb), javascript, mysql, php, jquery, ajax and web services Software Engineer, Intralot S.A., Athens, Greece. Programming and development of lottery-related games in Europe, the USA and Australia. Main working environments: microsoft.net (c#, vb), javascript, oracle, crystal reports and web services Web Developer, Webline S.A., Heraklion, Crete. During my undergraduate studies I worked as a Web Developer at Webline S.A. Main working environments: xhtml, php, mysql, javascript, xml Publications Journals Y. Verginadis, Antonis Michalas, P. Gouvas, G. Schiefer, G. Hubsch and I. Paraskakis. PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud Services. Journal of Grid Computing, a special issue on Cloud Computing and Services Science. Springer, (Under Review) Nicolae Paladi, Christian Gehrmann and Antonis Michalas. Providing End-User Security Guarantees in Public Infrastructure Clouds. IEEE Transactions on Cloud Computing, a special issue on Cloud Security Engineering, IEEE, (Under Review) Tassos Dimitriou and Antonis Michalas. Multi-Party Trust Computation in Decentralized Environments in the Presence of Malicious Adversaries. Ad Hoc Networks Journal, a special issue on Smart Solutions for Mobility Supported Distributed and Embedded Systems, Elsevier, Antonis Michalas, Tassos Dimitriou, Thanassis Gianetsos, Nikos Komninos and Neeli R. Prasad. Vulnerabilities of Decentralized Additive Reputation Systems Regarding the Privacy of Individual Votes. Springer Wireless Personal Communication, Springer, /7
3 2011. Antonis Michalas, Nikos Komninos and Neeli R. Prasad. Mitigate DoS and DDoS attack in Ad Hoc Networks. International Journal of Digital Crime and Forensics, IGI Global, Conferences Antonis Michalas and Thanassis Giannetsos. Security Aspects of Participatory Sensing Systems Migration to the Cloud. International Conference on Innovations in Info-business and Technology (ICIIT), Sri Lanka, March 4-5, (To Appear) Antonis Michalas and Rafael Dowsley. Towards Trusted ehealth Services in the Cloud. Cloud Security and Data Privacy by Design (CloudSPD 15), Workshop co-located with the 8th IEEE/ACM International Conference on Utility and Cloud Computing, Limassol, Cyprus, December 7-10, Y. Verginadis, Antonis Michalas, P. Gouvas, G. Schiefer, G. Hubsch and I. Paraskakis. PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud Services. In the 5th International Conference on Cloud Computing and Services Science (CLOSER 15), May, 2015, Lisbon, Portugal. (Position Paper) Antonis Michalas, Nicolae Paladi and Christian Gehrmann. Security Aspects of e-health Systems Migration to the Cloud. Proceedings of the 16 th IEEE International Conference on E-health Networking, Application & Services (Healthcom), October 15-18, 2014, Natal, Brazil. Nicolae Paladi, Antonis Michalas and Christian Gehrmann. Domain Based Storage Protection with Secure Access Control for the Cloud". The 2014 International Workshop on Security in Cloud Computing, held in conjunction with the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS), June 3, 2014, Kyoto, Japan. Antonis Michalas and Nikos Komninos. The Lord of the Sense: A Privacy Preserving Reputation System for Participatory Sensing Applications. Proceedings of the 19 th IEEE International Conference on Communications (ISCC 2014), Madeira, Portugal, Nicolae Paladi and Antonis Michalas. One of Our Hosts in Another Country: Challenges of Data Geolocation in Cloud Storage. Proceedings of the 6 th IEEE Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE), May 11-14, 2014, Aalborg, Denmark. (Invited) Antonis Michalas and Menelaos Bakopoulos. SecGOD - Google Docs: Now I Feel Safer!. Proceedings of the 7 th IEEE International Conference for Internet Technology and Secured Transactions (ICITST-2012), London, UK, Antonis Michalas, Menelaos Bakopoulos, Nikos Komninos and Neeli R. Prasad. Secure & Trusted Communication in Emergency Situations. Proceedings of the 35 th IEEE Sarnoff Symposium, Newark, New Jersey, USA, Tassos Dimitriou and Antonis Michalas. Multi-Party Trust Computation in Decentralized Environments. Proceedings of the 5 th IFIP International Conference on New Technologies, Mobility & Security (NTMS 12), Istanbul, Turkey, /7
4 2011. Antonis Michalas, Tassos Dimitriou, Thanassis Gianetsos, Nikos Komninos and Neeli R. Prasad. Vulnerabilities of Decentralized Additive Reputation Systems Regarding the Privacy of Individual Votes. Proceedings of the 3 rd International ICST Conference on Security and Privacy in Mobile Information and Communication Systems (MobiSec 2011), Aalborg, Denmark, 2011.(Best Paper Award) Antonis Michalas, Vladimir A. Oleshchuk, Nikos Komninos and Neeli R. Prasad. Privacypreserving Trust Establishment scheme for Mobile Ad Hoc Networks. Proceedings of the 16 th IEEE International Conference on Communications (ISCC 11), Corfu, Greece, Antonis Michalas, Nikos Komninos and Neeli R. Prasad. Multiplayer Game for DDoS Attacks Resilience in Ad hoc Networks. Proceedings of the 2 nd IEEE International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless Vitae 2011), Chennai, India, Antonis Michalas, N. Komninos, Neeli R. Prasad and Vladimir A. Oleshchuk. New Client Puzzle Approach for DoS Resistance in Ad hoc Networks. Proceedings of the IEEE International Conference on Information Theory and Information Security (ICITIS 10), Beijing, China, Book Chapters Antonis Michalas, Nikos Komninos and Neeli R. Prasad. Cryptographic Puzzles and Game Theory against DoS and DDoS attacks in Networks. Encryption: Methods, Software and Security, Nova Science Publishers, Projects PaaSword, EU H2020 Project. The vision is to fortify trust in cloud services and increase the adoption rate of cloud-based solutions. To this end, we design and develop mechanisms that safeguard both corporate and personal data for cloud infrastructures and storage services. Furthermore, by addressing major cloud security challenges, we provide essential knowledge to organizations that wish to securely migrate to the cloud. Six pilots together with EU industrial partners will be implemented Trusted Telecommuncation IaaS Platform, EU EIT Project. This project mainly focus on the design and implementation of data confidentiality and integrity protection mechanisms for IaaS clouds that will open up radical new telecommunication business opportunities. In particular this new business offering will allow transparent storage isolation between IaaS clients and their data. The main target for the activity is to extend the OpenStack open source project with particular focus on secure storage. In particular, one important task is to extend the previous results with novel principles for efficient data search over encrypted data (Symmetric Searchable Encryption) InfraCloud, Swedish National Project. InfraCloud is a Swedish project that targets the security of critical information in an infrastructure as a Service (IaaS) cloud. More precisely, InfraCloud utilizes and builds upon previous research on the verification of computer resources in public IaaS clouds and paves the way for applications and organizations that wishes to securely move to a public cloud. In addition to that, the absence of reliable data sharing mechanisms is addressed by providing a framework, which enables clients of IaaS clouds to securely share data and clearly define access rights granted to peers. 4/7
5 Secure Single Sign On & Identity Management, Greek National Project. The concept of this project was to design and implement a secure Single-Sign-On (SSO) framework and Identity Management System for an international company. In a SSO approach users authenticate themselves only once and they are automatically logged into application servers as necessary without required any further interaction. For the needs of this project, I implemented the Kerberos architecture in order to secure the login procedure without sending the password over the channel as well as for securing each request from users. To do so, each http request was based on unique tickets with unique session keys. Thus providing an additional level of security PERFORM, EU FP7 Project. The PERFORM project aims to tackle problems associated with the efficient remote health status monitoring, the qualitative and quantitative assessment and the treatment personalization for people suffering from neurodegenerative diseases and movement disorders, such as Parkinson s disease (PD). Aspires to research and develop an innovative, intelligent system for monitoring neurodegenerative disease evolution through the employment of a wide range of wearable micro-sensors, advanced knowledge processing and fusion algorithms I-WAY, EU FP7 Project. A Geographic Information System for a European Research program. The goal of I-WAY is to develop a multi-sensorial system that can ubiquitously monitor and recognize the psychological condition of driver as well as special conditions prevailing in the road environment. Technical Program Committee Membership Elsevier Ad Hoc Networks Journal, Elsevier Computers & Security Journal, Elsevier Journal of Computer and System Sciences, Springer Journal of Trust Management, Springer Journal of Wireless Networks, The Computer Journal Oxford Journals, IEEE Conference on Communications & Electronics (ICCE), IEEE Conference on Advanced Technologies for Communications (ATC), IEEE Global Wireless Summit (GWS). Funding 2015 ICT-TNG Proposal. Project Title: Efficient Cloud-Based Privacy Preserving Mobile Sensing. Duration & Grant: Research funding for 1 year ( 53,421e, Individual Funding). Role: Project Leader & Researcher Horizon H2020-ICT Proposal. Project Title: A Holistic Data Privacy and Security by Design Platform-as-a-Service Framework Introducing Distributed Encrypted Persistence in Cloud-based Applications (PaaSword). Duration & Grant: Research funding for 3 years (3,984,575e, 10 Partners). Role: Scientific Coordinator & Researcher. European Institute of Innovation & Technology (EIT) Proposal. Project Title: Trusted Telecommunication IaaS Platform. Duration & Grant: Research funding for 1 year (320,000e, 3 Partners). Role: Project Leader & Researcher. 5/7
6 Teaching - Supervising 2015 Current University of Westminster. As a lecturer I have been involved in the following undergraduate and postgraduate courses: A. Postgraduate Internet Security (Course Leader) Computer Security & Applications (Course Leader) B. Undergraduate Computer & Forensics (Assistant) Athens Information Technology. As a researcher I have been regularly involved in the provision (by giving a number of lectures and organizing lab exercises/seminars) of the following undergraduate level courses: Web Technologies and Programming, Cryptography, Network Security, Linear Algebra, Calculus, Mathematical Analysis. Supervising PhD Students. Ali Haidar: PhD Thesis Attribute-Based Encryption Techniques for Platform-as-a-Service Clouds University of Westminster, London, UK. Degree expected end of Nicolae Paladi: PhD Thesis Storage Security in Infrastructure as a Service Clouds In collaboration with Lund University, Sweden. Degree expected end of Invited Talks 10/03/2015 Advances in Cryptography & Coding, Chalmers University, Gothenburg, Sweden. Title: No More Dark Clouds: Towards Trusted Cloud Environments. 05/02/2014 Swedish Institute of Computer Science, Stockholm, Sweden. Title: Trust & Privacy in Distributed Networks. 04/02/2013 Athens Information Technology, Athens, Greece. Title: Multi-Party Trust Computation in Decentralized Environments in the Presence of Malicious Adversaries. Awards 2014 ERCIM Scholarship for conducting postdoctoral research for 1 year. Total grant: 33,600e Best Paper Award for the paper entitled Vulnerabilities of Decentralized Additive Reputation Systems Regarding the Privacy of Individual Votes. In Mobisec, Aalborg, Denmark: May Programming skills Advanced Intermediate xhtml - html5, css, javascript, jquery, php,.net, c#, vb, java, mysql, sql server, cvs/subversion c, android development, oracle, XNA Framework Languages Greek English Spanish Mothertongue Cambridge FCE, TOEFL Elementary 6/7
7 Interests - Traveling - Literature - Cinema - Theater - Music - Photography - Programming - Technology - Sports - Cooking - An active member of ARCHELON (Sea Turtle Protection Society of Greece). Worked as a volunteer in the European Union funded programme Life based in Lakonikos Bay South Peloponnese 7/7
Curriculum Vitae. Personal information. Work experience. First name / Surname Thanassis Giannetsos
Curriculum Vitae Personal information First name / Surname Home Page https://www.kth.se/profile/athgia/ Address Papaflessa 34, Ano Flyfada, 166 74, Greece Telephone(s) + 30 210 9648517, + 30 6977400395
CAREER OPPORTUNITIES
CAREER OPPORTUNITIES After the graduation, students can select three different paths. Students should have at least GPA 2.7 to get into the first two types of job. To apply for academic positions in the
CURRICULUM VITAE FERNANDO LUÍS TODO-BOM FERREIRA DA COSTA
CURRICULUM VITAE FERNANDO LUÍS TODO-BOM FERREIRA DA COSTA Full Name: Fernando Luís Todo-Bom Ferreira da Costa Living Address: R. Tomás da Fonseca 36, 7-B, 1600-275 Lisboa Cell Phone: 91 4426281 E-mail
Dr Christos Anagnostopoulos. 1. Education. 2. Present employment. 3. Previous Appointments. Page 1 of 6
Dr Christos Anagnostopoulos 1. Education Ph.D. in Computer Science Department of Informatics & Telecommunications, National and Kapodistrian University of Athens, July 2008 Dissertation: Pervasive and
Bellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER Mrs. P.Venkateswari Assistant Professor / CSE Erode Sengunthar Engineering College, Thudupathi ABSTRACT Nowadays Communication
PROFESSIONAL INTERESTS WORK EXPERIENCE GINÉS DÓLERA TORMO CURRICULUM VITAE OCTOBER 2014
Ginés Dólera Tormo Phone: +49 176 90775273 E-mail: [email protected] Date of birth: 21 July, 1985 Nationality: Spanish Address: Dossenheimer Landsrtrasse 100 D-69121 Heidelberg, Germany PROFESSIONAL INTERESTS
Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication
Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Three Layered
A Security Integrated Data Storage Model for Cloud Environment
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,
Dr. STYLIANI KLEANTHOUS LOIZOU CURRICULUM VITAE
Dr. STYLIANI KLEANTHOUS LOIZOU CURRICULUM VITAE Personal Details Name: Date of Birth: 21/06/1981 Nationality: Cypriot Marital Status: Married E-Mail: [email protected] or [email protected]
How To Make A Secure Storage On A Mobile Device Secure
Outsourcing with secure accessibility in mobile cloud computing Monika Waghmare 1, Prof T.A.Chavan 2 Department of Information technology, Smt.Kashibai Navale College of Engineering, Pune, India. Abstract
CURRICULUM VITAE. 1. Carrer Objective. 2. Academic Qualification. 3. Working Experience
CURRICULUM VITAE Smt. Amrita Chaturvedi PhD. Scholar, Room No CS 106, Department of Computer Science & Engineering, Indian Institute of Technology, Kanpur, Uttar Pradesh, India. Address Amrita Chaturvedi
Dr. Shashank Srivastava. Contact. E-mail: [email protected]. Telephone: 0532-2271365. Teaching. Courses Taught: Current Courses: Past Courses:
Dr. Shashank Srivastava Assistant Professor Department of Computer Science & Engineering Image Processing Department Building-First Floor Motilal Nehru National Institute of Technology Allahabad-211004,
Dr. Waleed A. Alrodhan (Biographical Sketch)
Dr. Waleed A. Alrodhan (Biographical Sketch) Waleed was born in the Kingdom of Saudi Arabia in 1981. He has received his B.Sc. degree in Computer Sciences from King Saud University (2002), his M.Sc. degree
Xianrui Meng. MCS 138, 111 Cummington Mall Department of Computer Science Boston, MA 02215 +1 (857) 540 0460 [email protected] www.xianruimeng.
Xianrui Meng MCS 138, 111 Cummington Mall Boston, MA 02215 +1 (857) 540 0460 [email protected] www.xianruimeng.org RESEARCH INTERESTS In my research, I investigate practical privacy-preserving solutions
UBITECH Company Presentation
UBITECH Company Presentation Ubiquitous Intelligent Technical Solutions Ltd. 429 Messogion Ave., 15343 Ag. Paraskevi, Greece W: T: +30 211 700 55 70 F: +30 211 700 55 71 The Ubiquitous Solutions Company
Cryptographic Data Security over Cloud
Cryptographic Data Security over Cloud Er. Lalit Gehlod Asst.Professor, Dept.Of Computer Engineering, Institute Of Engineering & Technology, Devi Ahilya University, Indore, India. Govind Patidar Dept.
QF01/0407-1.0 الخطة الدراسية كلية العلوم وتكنولوجيا المعلومات- برنامج الماجستير/ الوصف المختصر
Algorithms analysis and design(0102721). The course introduces students to a variety of computer problems and methods of their solutions. It enables students to assess the complexity of problems and algorithms.
DR AYŞE KÜÇÜKYILMAZ. Imperial College London Personal Robotics Laboratory Department of Electrical and Electronic Engineering SW7 2BT London UK
DR AYŞE KÜÇÜKYILMAZ Imperial College London Personal Robotics Laboratory Department of Electrical and Electronic Engineering SW7 2BT London UK http://home.ku.edu.tr/~akucukyilmaz [email protected]
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY
MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing
Security and Privacy in Big Data, Blessing or Curse?
Security and Privacy in Big Data, Blessing or Curse? 2 nd National Cryptography Days 9-11 April 2015 Dr. Zeki Erkin Cyber Security Section Department of Intelligent Systems Delft University of Technology
Abdullahi Arabo MEng, MBCS, PhD Email: [email protected]
Email: [email protected] Profile Dr Arabo has over six years experience in research and development within the field of Network Security, Security of System-of-Systems composition, Mobile adhoc
CURRICULUM VITAE. September, 2015
CURRICULUM VITAE September, 2015 C1. Personal Information Asaad AbdulRahman Nayyef Alani Department of Computer Science,, Sultan Qaboos University, P.O. Box 36, Al-Khoudh 123, Muscat, Sultanate of Oman,
1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, [email protected]
Proposed PhD Research Areas I am looking for strong PhD candidates to work on the projects listed below. The ideal candidate would have a mix of theoretical and practical skills, achieved a distinction
How to Secure Infrastructure Clouds with Trusted Computing Technologies
How to Secure Infrastructure Clouds with Trusted Computing Technologies Nicolae Paladi Swedish Institute of Computer Science 2 Contents 1. Infrastructure-as-a-Service 2. Security challenges of IaaS 3.
Information Security at ETH Zurich Institute of Information Security at ETH Zurich Zurich Information Security and Privacy Center
Information Security at ETH Zurich Institute of Information Security at ETH Zurich Zurich Information Security and Privacy Center Department of Computer Science Introduction Our society is undergoing a
How To Write A Blog Post On A Website
Myrto Amorgianou IT professional [email protected] Summary Investment Banking Software: Analysis, Implementation, Support Web Development: Development, Maintenance, Web design Project Management:
Cloud deployment model and cost analysis in Multicloud
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) ISSN: 2278-2834, ISBN: 2278-8735. Volume 4, Issue 3 (Nov-Dec. 2012), PP 25-31 Cloud deployment model and cost analysis in Multicloud
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
SDN Security Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015
SDN Security Challenges Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015 Cybersecurity Enhancement Act 2014 Public-Private Collaboration on Security (NIST
SYMMETRIC CRYPTOGRAPHIC KEY MANAGEMENT IN CLOUD PARADIGM
SYMMETRIC CRYPTOGRAPHIC KEY MANAGEMENT IN CLOUD PARADIGM Supervisor: Dr. Muhammad Awais Shibli Presented By: Faiza Fakhar Reg. No.: 2010-NUST-MS PhD-IT-27 Date: 12 th February, 2014 AGENDA Overview of
Associate Prof. Dr. Victor Onomza Waziri
BIG DATA ANALYTICS AND DATA SECURITY IN THE CLOUD VIA FULLY HOMOMORPHIC ENCRYPTION Associate Prof. Dr. Victor Onomza Waziri Department of Cyber Security Science, School of ICT, Federal University of Technology,
EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015
EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015 Aristotelis Tzafalias Trust and Security Unit H.4 DG Connect European Commission Trust and Security: One Mission
Resume. Dr. Vedat COSKUN. Organisational E-mail Personal E-mail Personal Web Site Research Lab Web Site
Resume Dr. Vedat COSKUN Organisational E-mail Personal E-mail Personal Web Site Research Lab Web Site [email protected] [email protected] www.vedatcoskun.com www.nfclab.com Dr. Vedat Coskun is
Cyber Security in the University of Oxford: Collaborating without Conforming?
Cyber Security in the University of Oxford: Collaborating without Conforming? Andrew Martin June 2013 Workshop on Addressing R&D Challenges in Cybersecurity: Innovation and Collaboration Strategy Cybersecurity
EIT ICT Labs MASTER SCHOOL. Specialisations
EIT ICT Labs MASTER SCHOOL Specialisations S&P EIT ICT Labs Master Programme Security & Privacy The Learning outcomes of this major are: Understanding the concepts and technologies for achieving confidentiality,
E-Democracy and e-voting
E-Democracy and e-voting How to make them secure and transparent August 2013 Jordi Puiggali CSO and SVP R&D [email protected] Index Introduction e-democracy Security and Transparency in e-voting
At a Glance A short portrait of the Technical University of Crete
At a Glance A short portrait of the Technical University of Crete Contact: Technical University of Crete Public & International Relations Department University Campus Akrotiri 731 00 Chania Crete Greece
1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications
1. Introduction 2. Web Application 3. Components 4. Common Vulnerabilities 5. Improving security in Web applications 2 What does World Wide Web security mean? Webmasters=> confidence that their site won
Europass Curriculum Vitae
Europass Curriculum Vitae Personal information Surname(s) / First name(s) Address(es) Custódio, Jorge Filipe Telephone(s) +351 919687707 Email(s) Personal website(s) Nationality(-ies) Rua Francisco Pereira
SWASTIK K. BRAHMA PROFESSIONAL EXPERIENCE
SWASTIK K. BRAHMA Electrical Engineering & Computer Science Syracuse University Syracuse, NY 13244 Tel: (505) 948-1288 Email: [email protected] Web: http://skbrahma.mysite.syr.edu/ PROFESSIONAL EXPERIENCE
3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India
3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India Call for Papers Cloud computing has emerged as a de facto computing
ATTPS Publication: Trustworthy ICT Taxonomy
Publication: worthy ICT Taxonomy Roger Berkley worthy ICT Taxonomy Research Cybersecurity technology is a considerably large subdomain of ICT. Technology experts like Gartner have identified at least 94
Department of Electronic Information Engineering, Beihang Univerisity Specialization: Electrical Engineering, Completion: July 2004
Jin Kocsis (Jin Wei) CURRICULUM VITAE Assistant Professor Department of Electrical and Computer Engineering Auburn Science and Engineering Center, Room 554 The University of Akron Akron, OH, 44325-3905
Cyber Security and Privacy
Cyber Security and Privacy Jovan Golić CySeP Winter School, Stockholm, 2014 EIT ICT Labs EIT ICT Labs is one of the first Knowledge and Innovation Communities set up in 2010 by the European Institute of
The Ubiquitous Web, UPnP and Smart Homes
The Ubiquitous Web, UPnP and Smart Homes Franklin Reynolds Nokia Research Center, Cambridge [email protected] 1 NOKIA PCG.PPT / 15 6 2004 / Franklin Reynolds Our Vision "The essence of this vision
An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud
, pp.246-252 http://dx.doi.org/10.14257/astl.2014.49.45 An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud Jiangang Shu ab Xingming Sun ab Lu Zhou ab Jin Wang ab
Prof. Udo Helmbrecht
Prof. Udo Helmbrecht Guiding EU Cybersecurity from Policy to Implementation Udo Helmbrecht Executive Director Information Security for the Public Sector 2015 Stockholm 02/09/15 European Union Agency for
Dept. of Financial Information Security
Dept. of Financial Information Security Department of Financial Information Security offers an excellent education and interdisciplinary cutting-edge research programs to train future leaders and innovators
Maldives Pension Administration Office Republic of Maldives
A. Background Maldives Pension Administration Office Republic of Maldives Pension and Social Protection Administration Project IDA Credit.: 4611-MV Date: 01 June 2014 Design and Development of the CMDA
MH NOROUZI RÉSUMÉ AND CV
MH NOROUZI RÉSUMÉ AND CV PERSONAL INFORMATION Last Name: NorouziMahalli First Name: MohammadHossein Date of Birth: 1988 Marital status: Single Birth Certificate ID: 9850 Languages Spoken: Native Language:
Excellence Doesn t Need a Certificate. Be an. Believe in You. 2014 AMIGOSEC Consulting Private Limited
Excellence Doesn t Need a Certificate Be an 2014 AMIGOSEC Consulting Private Limited Believe in You Introduction In this age of emerging technologies where IT plays a crucial role in enabling and running
Developing ASP.NET MVC 4 Web Applications MOC 20486
Developing ASP.NET MVC 4 Web Applications MOC 20486 Course Outline Module 1: Exploring ASP.NET MVC 4 The goal of this module is to outline to the students the components of the Microsoft Web Technologies
The Design of Web Based Secure Internet Voting System for Corporate Election
The Design of Web Based Secure Internet Voting System for Corporate Election Jagdish B. Chakole 1, P. R. Pardhi 2 \ 1 Deptt. of Computer Science & Engineering, R.C.O.E.M., Nagpur, Maharashtra (India) 2
CLOUD COMPUTING Contractual and data protection aspects
CLOUD COMPUTING Contractual and data protection aspects Cloudscape VI 25 February 2014, Bruxelles Paolo Balboni Ph.D., Founding Partner, ICT Legal Consulting Domenico Converso LL.M., Senior Associate,
TUSKEGEE CYBER SECURITY PATH FORWARD
TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,
A Survey of Cloud Based Health Care System
A Survey of Cloud Based Health Care System Chandrani Ray Chowdhury Assistant Professor, Dept. of MCA, SDET-Brainware Group of Institution, Barasat, West Bengal, India ABSTRACT: Cloud communicating is an
National Cyber Security Framework and Protocol. for securing digital information in networked critical infrastructures and communications
OPERATIONAL REQUIREMENTS DOCUMENT National Cyber Security Framework and Protocol Contents for securing digital information in networked critical infrastructures and communications 1. General Description
Master of Science in Information Systems & Security Management. Courses Descriptions
Master of Science in Information Systems & Security Management Security Related Courses Courses Descriptions ISSM 530. Information Security. 1 st Semester. Lect. 3, 3 credits. This is an introductory course
Work address: Str. Bregu i Diellit, pn. 10000 Prishtinë, Kosovo Home address: Str. Qamil Ilazi, No.16, 70000 Ferizaj, Kosovo
CURRICULUM VITAE PERSONAL INFORMATION Isak Shabani Work address: Str. Bregu i Diellit, pn. 10000 Prishtinë, Kosovo Home address: Str. Qamil Ilazi, No.16, 70000 Ferizaj, Kosovo +377 (0) 44649676 [email protected]
MS Information Security (MSIS)
MS Information Security (MSIS) Riphah Institute of Systems Engineering (RISE) Riphah International University, Islamabad, Pakistan 1. Program Overview: The program aims to develop core competencies in
JVA-122. Secure Java Web Development
JVA-122. Secure Java Web Development Version 7.0 This comprehensive course shows experienced developers of Java EE applications how to secure those applications and to apply best practices with regard
SENIOR WEB DEVELOPER
SENIOR WEB DEVELOPER Belatrix s Software Developers play a vital role in helping our global clients to innovate and produce game changing software products. Using an Agile approach, Developers participate
Westcon Presentation on Security Innovation, Opportunity, and Compromise
Westcon Presentation on Security Innovation, Opportunity, and Compromise Christian A. Christiansen Program Vice President IDC Security Products & Services What s Happening with Threats? 1.5B 80% 33% $1.3M
Cloud security architecture
ericsson White paper Uen 284 23-3244 January 2015 Cloud security architecture from process to deployment The Trust Engine concept and logical cloud security architecture presented in this paper provide
One LAR Course Credits: 3. Page 4
Course Descriptions Year 1 30 credits Course Title: Calculus I Course Code: COS 101 This course introduces higher mathematics by examining the fundamental principles of calculus-- functions, graphs, limits,
Vesa Vainio. Address: Kuminakuja 2 E 37 00840 Helsinki Finland Mobile phone: +358-40-563 6966 Email: [email protected]
Vesa Vainio Address: Kuminakuja 2 E 37 00840 Helsinki Finland Mobile phone: +358-40-563 6966 Email: [email protected] 5th October 2006 Objective A position in a successful company where I will
A Layered Signcryption Model for Secure Cloud System Communication
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.1086
Title ISSN SJR H index Country Foundations and Trends in Information 1554 1 Retrieval
Title ISSN SJR H index Country Foundations and Trends in Information 1554 1 Retrieval 0677 Q1 6,536 12 United States 2 Swarm and Evolutionary Computation 2210 6502 Q1 3,364 8 Netherlands 3 IEEE Transactions
Xelude. Company Profile. www.xelude.com [email protected]. Information Systems. www.xelude.com
Xelude Information Systems Company Profile [email protected] About Us Xelude Information Systems is a Sri Lankan Information Technology (IT) Services Company incorporated in 2009 for providing IT solutions,
Cloud-based Identity and Access Control for Diagnostic Imaging Systems
Cloud-based Identity and Access Control for Diagnostic Imaging Systems Weina Ma and Kamran Sartipi Department of Electrical, Computer and Software Engineering University of Ontario Institute of Technology
Safety by trust: British model of cyber security. David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw
Safety by trust: British model of cyber security David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw Strategy Structure Campaign Partnerships Strategy The UK
CS 464/564 Networked Systems Security SYLLABUS
CS 464/564 Networked Systems Security SYLLABUS College: College of Science Department: Department of Computer Science Syllabus Title: CS 464/564 Networked Systems Security Call Number: 1. Meet the Professor
Human Resources Department. [email protected]
McNewton Solutions Private Limited Plot No. J-7 2nd Floor, FCS Building Chandigarh Information Technology Park, INDIA P: +91 172 456 7842 E: [email protected] W: www.mcnewton.org Touch Human Resources
Curriculum Vitae RESEARCH INTERESTS EDUCATION. SELECTED PUBLICATION Journal. Current Employment: (August, 2012 )
Curriculum Vitae Michael Tu Current Employment: (August, 2012 ) Assistant Professor Department of Computer Information Technology and Graphics School of Technology Purdue University Calumet Email: [email protected]
SAVMDS: A Software Application Vulnerability Management Dashboard System
, July 2-4, 2014, London, U.K. SAVMDS: A Software Application Vulnerability Management Dashboard System Mauranda Elliott, Huiming Yu, Xiaohong Yuan and Justin Zhan Abstract-A vulnerability management tool,
SMART InTeRneT OF ThIngS
Join us at the SMART InTeRneT OF ThIngS SUMMIT 2012 Manchester United FC Conference Centre, Old Trafford, UK Supported by: November 26-28 2012 The European Commission The Institution of Engineering and
A Survey on Cloud Security Issues and Techniques
A Survey on Cloud Security Issues and Techniques Garima Gupta 1, P.R.Laxmi 2 and Shubhanjali Sharma 3 1 Department of Computer Engineering, Government Engineering College, Ajmer [email protected]
DR AYŞE KÜÇÜKYILMAZ. Yeditepe University Department of Computer Engineering Kayışdağı Caddesi 34755 Istanbul Turkey
DR AYŞE KÜÇÜKYILMAZ Yeditepe University Department of Computer Engineering Kayışdağı Caddesi 34755 Istanbul Turkey http://cse.yeditepe.edu.tr/~akucukyilmaz [email protected] QUALIFICATIONS
Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.
Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Administrative Awareness Case Study: Government Offices Certification and Accreditation:
2 Authentication and identity management services in multi-platform cloud infrastructure
Abstract The security provision within multi-platform cloud computing environment is still considered not to be properly solved due to different problems with technical and humanbased origin. ICT users
INTEGRATING ADMINISTRATIVE INFORMATION SYSTEMS: THE CASE OF GREECE
INTEGRATING ADMINISTRATIVE INFORMATION SYSTEMS: THE CASE OF GREECE George Dimitriou, Theofilos Milonas, Andreas Velonis, George Papazidis Cardisoft S.A., 60 Monastiriou St, Thessaloniki GR-54267, Greece
Syllabus INFO-UB-3322. Design and Development of Web and Mobile Applications (Especially for Start Ups)
Syllabus INFO-UB-3322 Design and Development of Web and Mobile Applications (Especially for Start Ups) Fall 2014 Stern School of Business Norman White, KMEC 8-88 Email: [email protected] Phone: 212-998
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense Cyber Investigations Data Management Systems Security Data Security Analysis Digital Forensics Health Care Security Industrial
Privacy, Security and Identity in the Cloud. Giles Hogben ENISA
Privacy, Security and Identity in the Cloud Giles Hogben ENISA What s new about Cloud Computing? Isn t it just old hat? Larry Ellison, CEO, Oracle The interesting thing about cloud computing is that we
Internet of Things (IoT): A vision, architectural elements, and future directions
SeoulTech UCS Lab 2014-2 st Internet of Things (IoT): A vision, architectural elements, and future directions 2014. 11. 18 Won Min Kang Email: [email protected] Table of contents Open challenges
Secure and privacy-preserving DRM scheme using homomorphic encryption in cloud computing
December 2013, 20(6): 88 95 www.sciencedirect.com/science/journal/10058885 The Journal of China Universities of Posts and Telecommunications http://jcupt.xsw.bupt.cn Secure and privacy-preserving DRM scheme
Cloud Computing and Government Services August 2013 Serdar Yümlü SAMPAŞ Information & Communication Systems
eenviper White Paper #4 Cloud Computing and Government Services August 2013 Serdar Yümlü SAMPAŞ Information & Communication Systems 1 Executive Summary Cloud computing could revolutionise public services
Georgia Siougle .Contact Information .Education Ph.D in Accounting Marie Curie fellow University of Manchester MSc in Banking and Finance
Georgia Siougle Ι.Contact Information Telephone : +30-210-8203145 E-mail : [email protected] Business Address : Athens University of Economics and Business, 76 Patission St, Athens, 104 34 Greece SSRN Author
