Research Methodology



The main objective of the course is to highlight the privacy violation concerns in the modern digital world. The privacy concept and requirements are clearly distinguished from those of security, while the latest privacy enhancing technologies are presented. Finally, the risks against privacy introduced in new environments, like that of cloud computing, are discussed.

Upon completion of this course, the students will be able to:

  • Understand in detail the privacy requirements and the way they can be identified.
  • Understand the existing privacy enhancing techniques and tools.
  • Identify the new risks that modern computing environments, like cloud computing, introduce.

Course Contents

  • Privacy Requirements.
  • Privacy Enhancing Technologies and tools.
  • Personal data protection and privacy of communications.
  • Identity Management and Federations – Digital Authentication Framework.
  • Location Privacy.
  • Definition and main architectural and functional characteristics of distributed systems and cloud environments.
  • Identification of new threats in the new computing environments.
  • Managing the new threats against security and privacy in cloud environments.
  • Privacy and Data Protection in Emerging Scenarios.

  • Acquisti, Α., Gritzalis, S., Lambrinoudakis, C., De Capitani di Vimercati S. (2008): Digital Privacy, Theory Technologies and Practices, Auerbach Publications.
  • S. Furnell, S. Katsikas, J. Lopez, A. Patel, (2008): Securing Information and Communications Systems, Principles Technologies and Applications, Artech House.
  • S. Gritzalis, T. Karygiannis and C. Skiannis, (2009): Security and Privacy in Wireless and Mobile Networking, Troubador Publishing.
  • J. Vacca (2009): Computer and Information Security Handbook, Morgan Kaufmann.
  • Vic (J.R.) Winkler. Securing the Cloud: Cloud Computer Security Techniques and Tactics. Syngress, 2011.
  • Ronald L. Krutz and Russell Dean Vines. Cloud Security: A Comprehensive Guide to Secure Cloud Computing. Wiley, 2010.
  • Frank Swiderski and Window Snyder , “Threat Modelling “, Microsoft Press, 2004.
  • J. Lopez and J. Zhou (Eds.) (2008): Wireless Sensor Network Security, IOS Press
  • Scientific papers, notes and/or books that will be recommended.