Christos Kalloniatis
Christos Kalloniatis
Associate Professor, Department of Cultural Technology and Communication, University of the Aegean
Verified email at aegean.gr - Homepage
TitleCited byYear
Addressing privacy requirements in system design: the PriS method
C Kalloniatis, E Kavakli, S Gritzalis
Requirements Engineering 13 (3), 241-255, 2008
1972008
A framework to support selection of cloud providers based on security and privacy requirements
H Mouratidis, S Islam, C Kalloniatis, S Gritzalis
Journal of Systems and Software 86 (9), 2276-2293, 2013
1142013
Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts
C Kalloniatis, H Mouratidis, M Vassilis, S Islam, S Gritzalis, E Kavakli
Computer Standards & Interfaces 36 (4), 759-775, 2014
642014
Evaluating cloud deployment scenarios based on security and privacy requirements
C Kalloniatis, H Mouratidis, S Islam
Requirements Engineering 18 (4), 299-319, 2013
622013
Intelligent modification for the daltonization process of digitized paintings
CN Anagnostopoulos, G Tsekouras, I Anagnostopoulos, C Kalloniatis
International Conference on Computer Vision Systems: Proceedings, 2007
48*2007
Incorporating privacy requirements into the system design process
S Gritzalis, E Kavakli, C Kalloniatis, P Loucopoulos
Internet research, 2006
382006
Cloud forensics: identifying the major issues and challenges
S Simou, C Kalloniatis, E Kavakli, S Gritzalis
International conference on advanced information systems engineering, 271-284, 2014
372014
Fuzzy Clustering of Categorical Attributes and its Use in Analyzing Cultural Data.
GE Tsekouras, D Papageorgiou, SB Kotsiantis, C Kalloniatis, PE Pintelas
International Conference on Computational Intelligence, 202-206, 2004
272004
Model based process to support security and privacy requirements engineering
S Islam, H Mouratidis, C Kalloniatis, A Hudic, L Zechner
International Journal of Secure Software Engineering (IJSSE) 3 (3), 1-22, 2012
262012
Security requirements engineering for e-government applications: analysis of current frameworks
C Kalloniatis, E Kavakli, S Gritzalis
International Conference on Electronic Government, 66-71, 2004
262004
Using privacy process patterns for incorporating privacy requirements into the system design process
C Kalloniatis, E Kavakli, S Gritzalis
The Second International Conference on Availability, Reliability and …, 2007
232007
Methods for designing privacy aware information systems: a review
C Kalloniatis, E Kavakli, S Gritzalis
2009 13th Panhellenic Conference on Informatics, 185-194, 2009
222009
Dealing with privacy issues during the system design process
C Kalloniatis, E Kavakli, S Gritzalis
Proceedings of the Fifth IEEE International Symposium on Signal Processing …, 2005
222005
Aligning Security and Privacy to Support the Development of Secure Information Systems.
H Mouratidis, C Kalloniatis, S Islam, MP Huget, S Gritzalis
J. UCS 18 (12), 1608-1627, 2012
212012
Trustworthy selection of cloud providers based on security and privacy requirements: Justifying trust assumptions
M Pavlidis, H Mouratidis, C Kalloniatis, S Islam, S Gritzalis
International Conference on Trust, Privacy and Security in Digital Business …, 2013
182013
Pris Tool: A Case Tool For Privacy-Oriented Requirements Engineering.
C Kalloniatis, E Kavakli, E Kontellis
MCIS, 71, 2009
162009
Data protection issues pertaining to social networking under EU law
E Kosta, C Kalloniatis, L Mitrou, S Gritzalis
Transforming Government: People, Process and Policy 4 (2), 193-201, 2010
142010
PriS methodology: incorporating privacy requirements into the system design process
C Kalloniatis, E Kavakli, S Gritzalis
Proceedings of the SREIS 2005 13th IEEE International Requirements …, 2005
142005
Cloud forensics solutions: A review
S Simou, C Kalloniatis, E Kavakli, S Gritzalis
International Conference on Advanced Information Systems Engineering, 299-309, 2014
132014
Privacy in the cloud: bridging the gap between design and implementation
V Manousakis, C Kalloniatis, E Kavakli, S Gritzalis
International Conference on Advanced Information Systems Engineering, 455-465, 2013
132013
The system can't perform the operation now. Try again later.
Articles 1–20