Christos Kalloniatis

University of the Aegean

Dr. Christos Kalloniatis holds a Ph.D. from the Department of Cultural Technology and Communication of the University of the Aegean and a master’s degree in Computer Science from the University of Essex, UK. Currently, he is an Associate professor in the Department of Cultural Technology and Communication of the University of the Aegean and director of the Privacy Engineering and Social Informatics (PrivaSI) research laboratory. He is a former member of the board of the Hellenic Authority for Communication Security and Privacy. His main research interests are the elicitation, analysis, and modeling of security and privacy requirements in traditional and cloud-based systems, the analysis, and modeling of forensic-enabled systems and services, Privacy Enhancing Technologies and the design of Information System Security and Privacy in Cultural Informatics. Dr. Kalloniatis is the author of several refereed papers in international scientific journals and conferences and has served as a visiting professor in many European Institutions. Prior to his academic career, he has served at various places on the Greek public sector including the North Aegean Region and Ministry of Interior, Decentralisation and e-Governance. He is a lead member of the Cultural Informatics research group as well as the privacy requirements research group in the Department of Cultural Technology and Communication of the University of the Aegean and has a close collaboration with the Laboratory of Information & Communication Systems Security of the University of the Aegean. He has served as a member of various development and research projects. He lives in Mitilini, the capital of Lesvos island along with his wife Liana and his daughters Elpiniki and Irene.

3books edited

Latest work with IntechOpen by Christos Kalloniatis

Every day, more users access services and electronically transmit information which is usually disseminated over insecure networks and processed by websites and databases, which lack proper security protection mechanisms and tools. This may have an impact on both the users’ trust as well as the reputation of the system’s stakeholders. Designing and implementing security enhanced systems is of vital importance. Therefore, this book aims to present a number of innovative security enhanced applications. It is titled “Security Enhanced Applications for Information Systems” and includes 11 chapters. This book is a quality guide for teaching purposes as well as for young researchers since it presents leading innovative contributions on security enhanced applications on various Information Systems. It involves cases based on the standalone, network and Cloud environments.

Go to the book