Publications by authors named "Christos Xenakis"

Drifted by the hype of new and efficient machine learning and artificial intelligence models aiming to unlock the information wealth hidden inside heterogeneous datasets across different markets and disciplines, healthcare data are in the center of novel technological advancements in predictive health diagnostics, remote healthcare, assistive leaving and wellbeing. Nevertheless, this emerging market has underlined the necessity of developing new methods and updating existing ones for preserving the privacy of the data and their owners, as well as, ensuring confidentiality and trust throughout the health care data processing pipelines. This paper presents one of the key innovations of a Horizon Europe funded project named "TRUSTEE", which focuses on building a trust and privacy framework for cross-European data exchange by employing a secure and private federated framework to empower companies, organizations, and individuals to securely access data across different disciplines, use and re-use data and metadata to extract knowledge with trust.

View Article and Find Full Text PDF

IoT devices present an ever-growing domain with multiple applicability. This technology has favored and still favors many areas by creating critical infrastructures that are as profitable as possible. This paper presents a hierarchical architecture composed of different licensing entities that manage access to different resources within a network infrastructure.

View Article and Find Full Text PDF

Addressing cyber and privacy risks has never been more critical for organisations. While a number of risk assessment methodologies and software tools are available, it is most often the case that one must, at least, integrate them into a holistic approach that combines several appropriate risk sources as input to risk mitigation tools. In addition, cyber risk assessment primarily investigates cyber risks as the consequence of vulnerabilities and threats that threaten assets of the investigated infrastructure.

View Article and Find Full Text PDF

Recent advancements in information and communication technologies (ICT) have improved the power grid, leading to what is known as the smart grid, which, as part of a critical economic and social infrastructure, is vulnerable to security threats from the use of ICT and new emerging vulnerabilities and privacy issues. Access control is a fundamental element of a security infrastructure, and security is based on the principles of less privilege, zero-trust, and segregation of duties. This work addresses how access control can be applied without disrupting the power grid's functioning while also properly maintaining the security, scalability, and interoperability of the smart grid.

View Article and Find Full Text PDF

Due to its flexibility in terms of charging and billing, the smart grid is an enabler of many innovative energy consumption scenarios. One such example is when a landlord rents their property for a specific period to tenants. Then the electricity bill could be redirected from the landlord's utility to the tenant's utility.

View Article and Find Full Text PDF

TrustZone-based Trusted Execution Environments (TEEs) have been utilized extensively for the implementation of security-oriented solutions for several smart intra and inter-connected devices. Although TEEs have been promoted as the starting point for establishing a device root of trust, a number of published attacks against the most broadly utilized TEE implementations request a second view on their security. The aim of this research is to provide an analytical and educational exploration of TrustZone-based TEE vulnerabilities with the goal of pinpointing design and implementation flaws.

View Article and Find Full Text PDF

Introduction: Individuals and healthcare providers need to trust that the EHRs are protected and that the confidentiality of their personal information is not at stake.

Aim: Within CrowdHEALTH project, a security and privacy framework that ensures confidentiality, integrity, and availability of the data was developed.

Methods: The CrowdHEALTH Security and Privacy framework includes Privacy Enhancing Technologies (PETs) in order to comply with the GDPR EU laws of data protection.

View Article and Find Full Text PDF