{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T01:59:08Z","timestamp":1774144748643,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,6,9]],"date-time":"2009-06-09T00:00:00Z","timestamp":1244505600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,6,9]]},"DOI":"10.1145\/1579114.1579143","type":"proceedings-article","created":{"date-parts":[[2009,8,4]],"date-time":"2009-08-04T09:38:06Z","timestamp":1249378686000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Privacy and resource protection in personal network federations"],"prefix":"10.1145","author":[{"given":"Ch. Z.","family":"Patrikakis","sequence":"first","affiliation":[{"name":"NTUA, Zografou, GR"}]},{"given":"D. M.","family":"Kyriazanos","sequence":"additional","affiliation":[{"name":"NTUA, Zografou, GR"}]},{"given":"A. S.","family":"Voulodimos","sequence":"additional","affiliation":[{"name":"NTUA, Zografou, GR"}]},{"given":"I. G.","family":"Nikolakopoulos","sequence":"additional","affiliation":[{"name":"NTUA, Zografou, GR"}]}],"member":"320","published-online":{"date-parts":[[2009,6,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1019912421877"},{"key":"e_1_3_2_1_2_1","volume-title":"Personal Networks: An Overlay Network of Wireless Personal Area Networks and 3G Networks,\" presented at the Third Annual International Conference on Mobile and Ubiquitous Systems: Networking &amp","author":"Lo A.","year":"2006","unstructured":"A. Lo, M. Jacobsson, V. Prasad, and I. G. Niemegeers, \"Personal Networks: An Overlay Network of Wireless Personal Area Networks and 3G Networks,\" presented at the Third Annual International Conference on Mobile and Ubiquitous Systems: Networking &amp; Services, San Jose California, July 2006."},{"key":"e_1_3_2_1_3_1","volume-title":"A Profile-Based Network Layer Architecture for Personal Ubiquitous Environments,\" presented at the VTC2007 Vehicular Technology Conference","author":"Javaid U.","year":"2007","unstructured":"U. Javaid, D.-E. Meddour, T. Rasheed, and T. Ahmed, \"A Profile-Based Network Layer Architecture for Personal Ubiquitous Environments,\" presented at the VTC2007 Vehicular Technology Conference, 2007-Spring, Dublin, Ireland."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-005-0574-1"},{"key":"e_1_3_2_1_5_1","volume-title":"Retrieved","author":"National Security Agency, (n.d). \"Defense in depth","year":"2008","unstructured":"National Security Agency, (n.d). \"Defense in depth: a practical strategy for achieving information assurance in today's highly networked environments\", Retrieved March 12, 2008, from http:\/\/www.nsa.gov\/snac\/support\/defenseindepth.pdf."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/512788.512797"},{"key":"e_1_3_2_1_7_1","volume-title":"Wireless Personal Multimedia Communications '05","author":"Politis C.","year":"2005","unstructured":"C. Politis, K. Nyberg, S. Mirzadeh, K. Masmoudi, H. Afifi, J. Floroiu, N. R. Prasad, \"Personal Network Security Architecture\", International Wireless Summit 2005, Wireless Personal Multimedia Communications '05, September 18--22, Aalborg, Denmark, 2005."},{"key":"e_1_3_2_1_8_1","first-page":"979","volume-title":"NOMS 2000. 2000","author":"Reiser H.","year":"2000","unstructured":"H. Reiser and G. Vogt, \"Threat analysis and security architecture of mobile agent based management systems,\" Network Operations and Management Symposium, 2000. NOMS 2000. 2000 IEEE\/IFIP 10--14 April 2000, pp. 979--980."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC2764"},{"key":"e_1_3_2_1_10_1","first-page":"13","article-title":"Distributed Denial of Service Attacks","volume":"7","author":"Patrikakis Ch.","year":"2004","unstructured":"Ch. Patrikakis, M. Masikos, O. Zouraraki, \"Distributed Denial of Service Attacks\", Internet Protocol Journal, Cisco Systems, vol. 7, December 2004, pp 13--35.","journal-title":"Internet Protocol Journal, Cisco Systems"},{"key":"e_1_3_2_1_11_1","volume-title":"Recommendations of the U","author":"Scarfone K.","year":"2007","unstructured":"K. Scarfone, P. Mell, \"Guide to Intrusion Detection and Prevention Systems (IDPS)\", Recommendations of the U.S. National Institute of Standards and Technology, Information Technology Laboratory, National Institute of Standards and Technology, US Department of Commerce, February 2007."},{"key":"e_1_3_2_1_12_1","unstructured":"D. M. Kyriazanos W. Louati M. G. Genet D. Zeghlache M. Argyropoulos and Ch. Z. Patrikakis \"An Architecture for Secure Wide-Area Service Discovery in Personal Peer-to-Peer Networks \" presented at IST Mobile &amp; Wireless Communications Summit Mykonos Greece June 2006"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1759008.1759009"},{"key":"e_1_3_2_1_14_1","volume-title":"Workshop on Capturing Context and Context Aware Systems and Platforms, IST Mobile and Wireless Communications summit","author":"Bauer M.","year":"2005","unstructured":"M. Bauer, R. L. Olsen, et al., \"Context Management Framework for MAGNET Beyond\", Workshop on Capturing Context and Context Aware Systems and Platforms, IST Mobile and Wireless Communications summit, Myconos, Greece, June 2005"},{"key":"e_1_3_2_1_15_1","volume-title":"Special Issue on \"Information Security and data protection in Future Generation Communication and Networking\"","author":"Patrikakis Ch. Z.","year":"2008","unstructured":"Ch. Z. Patrikakis, D. M. Kyriazanos, N. Prasad, \"Establishing trust through anonymous and private information exchange over Personal Networks\", accepted for publication with minor changes to Springer Wireless Personal Communications, Special Issue on \"Information Security and data protection in Future Generation Communication and Networking\", 2008."},{"key":"e_1_3_2_1_16_1","unstructured":"IST-MAGNET Beyond IR1.4.1 \"Defining Usability of PN Services\" August 2006 Retrieved March 14th 2008 from: http:\/\/www.ist-magnet.org\/public+deliverables."},{"key":"e_1_3_2_1_17_1","volume-title":"accepted for poster presentation to the ICT-MobileSummit","author":"Patrikakis Ch. Z.","year":"2008","unstructured":"Ch. Z. Patrikakis, I. G. Nikolakopoulos, A. Skoufis, S. Stamokostas, \"Safe access to computing resources in personal networking environments\", accepted for poster presentation to the ICT-MobileSummit, Stockholm, Sweden, June 2008."}],"event":{"name":"PETRA '09: The 2nd International Conference on PErvasive Technologies Related to Assistive Environments","location":"Corfu Greece","acronym":"PETRA '09"},"container-title":["Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1579114.1579143","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1579114.1579143","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T01:43:26Z","timestamp":1774143806000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1579114.1579143"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6,9]]},"references-count":17,"alternative-id":["10.1145\/1579114.1579143","10.1145\/1579114"],"URL":"https:\/\/doi.org\/10.1145\/1579114.1579143","relation":{},"subject":[],"published":{"date-parts":[[2009,6,9]]},"assertion":[{"value":"2009-06-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}