Skip to main content

Research Repository

Advanced Search

All Outputs (3)

Decentralised Privacy: A Distributed Ledger Approach (2021)
Book Chapter
Papadopoulos, P., Pitropakis, N., & Buchanan, W. J. (2021). Decentralised Privacy: A Distributed Ledger Approach. In C. Mustansar Hussain, & P. Di Sia (Eds.), Handbook of Smart Materials, Technologies, and Devices (1-26). Cham: Springer. https://doi.org/1

Our world due to the technological progress became fast-paced and is constantly evolving, thus changing every single day. Consequently, the most valuable asset on earth is not gold or oil anymore but data. Big data companies try to take advantage of... Read More about Decentralised Privacy: A Distributed Ledger Approach.

Cloud Security, Privacy and Trust Baselines (2020)
Book Chapter
Pitropakis, N., Katsikas, S., & Lambrinoudakis, C. (2020). Cloud Security, Privacy and Trust Baselines. In J. R. Vacca (Ed.), Cloud Computing Security: Foundations and Challenges. Boca Raton, US: CRC Press. https://doi.org/10.1201/9780429055126

Cloud services vary from data storage and processing to software provision, posing requirements for high availability and on-demand commitment-free provision of services. Cloud providers must provide information through their privacy policy and/or up... Read More about Cloud Security, Privacy and Trust Baselines.

Cloud Security, Privacy, and Trust Baselines (2016)
Book Chapter
Pitropakis, N., Katsikas, S., & Lambrinoudakis, C. (2016). Cloud Security, Privacy, and Trust Baselines. In Cloud Computing Security Foundations and Challenges. Boca Raton: CRC Press

According to ISO 27001, a threat is a potential event. When a threat turns into an actual event, it may cause an undesirable incident. It is undesirable because the incident may harm an organization or a system, causing a security incident and/or t... Read More about Cloud Security, Privacy, and Trust Baselines.