2014
|
KOSTA, E; GRAUX, H; DUMORTIER, J Collection and storage of personal data: a critical view on current practices in the transportation sector Conference APF 2012, LNCS 8319, Springer, 2014. BibTeX @conference{KOSTA2014,
title = {Collection and storage of personal data: a critical view on current practices in the transportation sector},
author = {E. KOSTA and H. GRAUX and J. DUMORTIER},
editor = {B. Preneel and D. Ikonomou},
year = {2014},
date = {2014-00-00},
booktitle = {APF 2012, LNCS 8319},
pages = {157-176},
publisher = {Springer},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
|
2013
|
Catteddu, Daniele; Felici, Massimo; Hogben, Giles; Holcroft, Amy; Kosta, Eleni; Leenes, Ronald; Millard, Christopher; Maartje
Niezen, ; Nu~nez, David; Papanikolaou, Nick; Pearson, Siani; Pradelles, Daniel; Reed, Chris; Rong, Chunming; Jean-Claude
Royer, ; Stefanatou, Dimitra; Wlodarczyk, Tomasz Towards a model of accountability for cloud computing services Conference Proceedings of the DIMACS/BIC/A4Cloud/CSA International Workshop on Trustworthiness, Accountability and Forensics in the Cloud (TAFC), 2013. Abstract | BibTeX @conference{Catteddu2013,
title = {Towards a model of accountability for cloud computing services},
author = {Daniele Catteddu and Massimo Felici and Giles Hogben and Amy Holcroft
and Eleni Kosta and Ronald Leenes and Christopher Millard and Maartje
Niezen and David Nu~nez and Nick Papanikolaou and Siani Pearson
and Daniel Pradelles and Chris Reed and Chunming Rong and Jean-Claude
Royer and Dimitra Stefanatou and Tomasz Wlodarczyk},
year = {2013},
date = {2013-00-00},
booktitle = {Proceedings of the DIMACS/BIC/A4Cloud/CSA International Workshop on Trustworthiness, Accountability and Forensics in the Cloud (TAFC)},
abstract = {This paper presents a model of accountability for cloud computing services, based on ongoing work as part of the A4Cloud project. We define a three-layer model of accountability as a general concept for data governance, distinguishing between accountability attributes, accountability practices, and accountability mechanisms and tools.},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
This paper presents a model of accountability for cloud computing services, based on ongoing work as part of the A4Cloud project. We define a three-layer model of accountability as a general concept for data governance, distinguishing between accountability attributes, accountability practices, and accountability mechanisms and tools. |
M, FELICI; M., GIJLE JAANTUN; E., KOSTA; N., WAINWRIGHT Bringing accountability to the cloud: Addressing emerging threats and legal perspectives Conference FELICI, Trust in the Digital World and Cyber Security and Privacy EU Forum 2013, Brussels, Belgium, April 2013, Revised Selected Papers, Series: Communications in Computer and Information Science, 182 , Springer, Berlin, Heidelberg, 2013, ISBN: 978-3-642-41204-2. Abstract | Links | BibTeX @conference{M2013,
title = {Bringing accountability to the cloud: Addressing emerging threats and legal perspectives},
author = {FELICI M and GIJLE JAANTUN M. and KOSTA E. and WAINWRIGHT N.},
doi = {10.1007/978-3-642-41205-9_3},
isbn = {978-3-642-41204-2},
year = {2013},
date = {2013-00-00},
booktitle = {FELICI, Trust in the Digital World and Cyber Security and Privacy EU Forum 2013, Brussels, Belgium, April 2013, Revised Selected Papers, Series: Communications in Computer and Information Science},
volume = {182},
pages = {28-40},
publisher = {Springer, Berlin, Heidelberg},
abstract = {This paper is concerned with accountability in cloud ecosystems. The separation between data and data subjects as well as the exchange of data between cloud consumers and providers increases the complexity of data governance in cloud ecosystems, a problem which is exacerbated by emerging threats and vulnerabilities. This paper discusses how accountability addresses emerging issues and legal perspectives in cloud ecosystems. In particular, it introduces an accountability model tailored to the cloud. It presents on-going work within the Cloud Accountability Project, highlighting both legal and technical aspects of accountability.},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
This paper is concerned with accountability in cloud ecosystems. The separation between data and data subjects as well as the exchange of data between cloud consumers and providers increases the complexity of data governance in cloud ecosystems, a problem which is exacerbated by emerging threats and vulnerabilities. This paper discusses how accountability addresses emerging issues and legal perspectives in cloud ecosystems. In particular, it introduces an accountability model tailored to the cloud. It presents on-going work within the Cloud Accountability Project, highlighting both legal and technical aspects of accountability. |
Thuemmler, C; Mival, O; Benyon, D; Buchanan, W; Paulin, A; Fricker, S; Fiedler, M; Grottland, A; Jell, T; Magedanz, T; Ispas, I; Koops, B; Kosta, E; Schneider, A; Gavras, A; Barros, M; Cousin, P; Petrakis, E Norms and standards in modular medical architectures Conference 2013 IEEE 15th International Conference on e-Health Networking, Applications and Services (Healthcom 2013), 2013. Abstract | Links | BibTeX @conference{Thuemmler2013,
title = {Norms and standards in modular medical architectures},
author = {C. Thuemmler and O. Mival and D. Benyon and W. Buchanan and A. Paulin and S. Fricker and M. Fiedler and A. Grottland and T. Jell and T. Magedanz and I. Ispas and B. Koops and E. Kosta and A. Schneider and A. Gavras and M. Barros and P. Cousin and E. Petrakis},
doi = {10.1109/HealthCom.2013.6720705},
year = {2013},
date = {2013-00-00},
booktitle = {2013 IEEE 15th International Conference on e-Health Networking, Applications and Services (Healthcom 2013)},
pages = {382-387},
abstract = {Recent Internet of Things (IoT) research has been aiming at interoperability of devices and the integration of sensor networks. The Future Internet - Private Public Partnership (FI-PPP) has created a whole array of different purpose-oriented modules with defined specifications, better known as Generic Enablers. This article gives an overview of legal, ethical and technical norms and standards to be considered when planning, developing and implementing modular medical architectures, integrating the Internet of Things (IoT) and Generic Enablers (GEs) in cutting edge, latest generation medical data networks.},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
Recent Internet of Things (IoT) research has been aiming at interoperability of devices and the integration of sensor networks. The Future Internet - Private Public Partnership (FI-PPP) has created a whole array of different purpose-oriented modules with defined specifications, better known as Generic Enablers. This article gives an overview of legal, ethical and technical norms and standards to be considered when planning, developing and implementing modular medical architectures, integrating the Internet of Things (IoT) and Generic Enablers (GEs) in cutting edge, latest generation medical data networks. |
2009
|
Kosta, Eleni ; Kalloniatis, Christos ; Mitrou, Lilian ; Kavakli, Evangelia Search Engines: Gateway to a New ``Panopticon``? Conference Trust, Privacy and Security in Digital Business, Springer Berlin Heidelberg, 2009, ISBN: 978-3-642-03748-1. Abstract | Links | BibTeX @conference{Kosta2009,
title = {Search Engines: Gateway to a New ``Panopticon``?},
author = {Kosta, Eleni
and Kalloniatis, Christos
and Mitrou, Lilian
and Kavakli, Evangelia},
editor = {Fischer-Hubner Simone
and Lambrinoudakis Costas
and Pernul Gunther},
doi = {10.1007/978-3-642-03748-1_2},
isbn = {978-3-642-03748-1},
year = {2009},
date = {2009-00-00},
booktitle = {Trust, Privacy and Security in Digital Business},
pages = {11-21},
publisher = {Springer Berlin Heidelberg},
abstract = {Nowadays, Internet users are depending on various search engines in order to be able to find requested information on the Web. Although most users feel that they are and remain anonymous when they place their search queries, reality proves otherwise. The increasing importance of search engines for the location of the desired information on the Internet usually leads to considerable inroads into the privacy of users. The scope of this paper is to study the main privacy issues with regard to search engines, such as the anonymisation of search logs and their retention period, and to examine the applicability of the European data protection legislation to non-EU search engine providers. Ixquick, a privacy-friendly meta search engine will be presented as an alternative to privacy intrusive existing practices of search engines.},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
Nowadays, Internet users are depending on various search engines in order to be able to find requested information on the Web. Although most users feel that they are and remain anonymous when they place their search queries, reality proves otherwise. The increasing importance of search engines for the location of the desired information on the Internet usually leads to considerable inroads into the privacy of users. The scope of this paper is to study the main privacy issues with regard to search engines, such as the anonymisation of search logs and their retention period, and to examine the applicability of the European data protection legislation to non-EU search engine providers. Ixquick, a privacy-friendly meta search engine will be presented as an alternative to privacy intrusive existing practices of search engines. |
2008
|
Kosta, Eleni ; Valcke, Peggy The promise and peril of ICT implants: Setting the legal framework Conference Proceedings of the 47th FITCE Congress – “Transformation: Next Stop…True Convergence?”, London UK, 2008. BibTeX @conference{Kosta2008,
title = {The promise and peril of ICT implants: Setting the legal framework},
author = {Kosta, Eleni and Valcke, Peggy},
year = {2008},
date = {2008-00-00},
booktitle = {Proceedings of the 47th FITCE Congress – “Transformation: Next Stop…True Convergence?”, London UK},
pages = {19-22},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
|
2007
|
E., KOSTA; J., ZIBUSCHKA; T., SCHERNER; J., DUMORTIER Privacy-enhancing user-friendly Identity Management for Location Based Services using PRIME technology – A legal discussion Conference Cyberlaw Security & Private, The Second International Conference on Legal, Security and Privacy Issues in Information Technology (IT), Beijing - China, 5-7 December 2007, 2007. BibTeX @conference{E.2007b,
title = {Privacy-enhancing user-friendly Identity Management for Location Based Services using PRIME technology – A legal discussion},
author = {KOSTA E. and ZIBUSCHKA J. and SCHERNER T. and DUMORTIER J.},
editor = {MERCADO-KIERKEGAARD S.},
year = {2007},
date = {2007-00-00},
booktitle = {Cyberlaw Security & Private, The Second International Conference on Legal, Security and Privacy Issues in Information Technology (IT), Beijing - China, 5-7 December 2007},
pages = {183 – 192},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
|
C., TRONCOSO; G., DANEZIS; E., KOSTA; B., PRENEEL PriPAYD: Privacy Friendly Pay-As-You-Drive Insurance Conference In Proceedings of the 2007 ACM workshop on Privacy in Electronic Society (WPES), Alexandria, Virginia – USA, 2007, 2007. BibTeX @conference{C.2007,
title = {PriPAYD: Privacy Friendly Pay-As-You-Drive Insurance},
author = {TRONCOSO C. and DANEZIS G. and KOSTA E. and PRENEEL B.},
year = {2007},
date = {2007-00-00},
booktitle = {In Proceedings of the 2007 ACM workshop on Privacy in Electronic Society (WPES), Alexandria, Virginia – USA, 2007},
pages = {99 – 107},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
|
E., KOSTA RFID Technology: When Innovation Brings Along Data Protection Challenges Conference roceedings of the 46th FITCE Congress – “The broadband way to the future”, Warsaw - Poland, 30.08 - 01.09.2007, 2007, (AWARD FOR BEST WRITTEN PAPER). BibTeX @conference{E.2007c,
title = {RFID Technology: When Innovation Brings Along Data Protection Challenges},
author = {KOSTA E.},
year = {2007},
date = {2007-00-00},
booktitle = {roceedings of the 46th FITCE Congress – “The broadband way to the future”, Warsaw - Poland, 30.08 - 01.09.2007},
pages = {54-59},
note = {AWARD FOR BEST WRITTEN PAPER},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
|
E., KOSTA; F., COUDERT; J., DUMORTIER Data protection in the third pillar: in the aftermath of the ECJ decision on PNR data and the data retention directive Conference aper presented at the BILETA 2007 Annual Conference “Paper, scissors, stone: Business, law and politics – the E and M-Commerce debate”, Hertfordshire – UK, 16-17 April 2007, 2007. BibTeX @conference{E.2007d,
title = {Data protection in the third pillar: in the aftermath of the ECJ decision on PNR data and the data retention directive},
author = {KOSTA E. and COUDERT F. and DUMORTIER J.},
year = {2007},
date = {2007-00-00},
booktitle = {aper presented at the BILETA 2007 Annual Conference “Paper, scissors, stone: Business, law and politics – the E and M-Commerce debate”, Hertfordshire – UK, 16-17 April 2007},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
|
E., KOSTA; M, MEINTS; M, HANSEN; M., GASSON An analysis of security and privacy issues relating to RFID enabled ePassports Conference IFIP international Federation for Information Processing, Volume 232, New Approaches for Security, Privacy and Trust in Complex Environments (IFIP SEC 2007 - Security and Control of Identity in Society (SCITS 4), Sandton, South Africa, 14-16.05.2007), Springer, 2007. BibTeX @conference{E.2007e,
title = {An analysis of security and privacy issues relating to RFID enabled ePassports},
author = {KOSTA E. and MEINTS M and HANSEN M and GASSON M.},
editor = {VENTER H. and ELOFF M. and LABUSCHAGNE. L. and ELOFF J. and von SOLMS R.},
year = {2007},
date = {2007-00-00},
booktitle = {IFIP international Federation for Information Processing, Volume 232, New Approaches for Security, Privacy and Trust in Complex Environments (IFIP SEC 2007 - Security and Control of Identity in Society (SCITS 4), Sandton, South Africa, 14-16.05.2007)},
pages = {467–472},
publisher = {Springer},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
|
E., KOSTA The use of RFID chips on identification documents Conference Proceedings of the 2nd Greek national conference with international participation: Electronic democracy - challenges of the digital era, Athens, 16-17 March 2006, 2007. BibTeX @conference{E.2007f,
title = {The use of RFID chips on identification documents},
author = {KOSTA E.},
editor = {SIDERIDIS A.B.},
year = {2007},
date = {2007-00-00},
booktitle = {Proceedings of the 2nd Greek national conference with international participation: Electronic democracy - challenges of the digital era, Athens, 16-17 March 2006},
pages = {471-480},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
|
2006
|
E., KOSTA Data retention directive: What the Council cherishes, the privacy advocates reject and the industry fears… Conference Proceedings 45th FITCE Congress – “Telecom Wars: The return of the profit”, Athens – Greece, 30 August - 2 September 2006, 2006. BibTeX @conference{E.2006,
title = {Data retention directive: What the Council cherishes, the privacy advocates reject and the industry fears…},
author = {KOSTA E.},
year = {2006},
date = {2006-00-00},
booktitle = {Proceedings 45th FITCE Congress – “Telecom Wars: The return of the profit”, Athens – Greece, 30 August - 2 September 2006},
pages = {209-214},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
|
P., VALCKE; E., KOSTA Data “re-tensions” in the European electronic communications sector Conference Proceedings of the First International Conference on Legal, Security and Privacy Issues in Information Technology, Hamburg – Germany, 30 April – 3 May 2006, 2 , 2006, (AWARD FOR BEST ACADEMIC PAPER). BibTeX @conference{P.2006b,
title = {Data “re-tensions” in the European electronic communications sector},
author = {VALCKE P. and KOSTA E.},
editor = {MERCADO-KIERKEGAARD S.},
year = {2006},
date = {2006-00-00},
booktitle = {Proceedings of the First International Conference on Legal, Security and Privacy Issues in Information Technology, Hamburg – Germany, 30 April – 3 May 2006},
volume = {2},
pages = {373-395},
note = {AWARD FOR BEST ACADEMIC PAPER},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
|