George Pangalos

According to our database1, George Pangalos authored at least 40 papers between 1979 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Actionable threat intelligence for digital forensics readiness.
Inf. Comput. Secur., 2019

Improving Forensic Triage Efficiency through Cyber Threat Intelligence.
Future Internet, 2019

2014
E-prescription as a tool for improving services and the financial viability of healthcare systems: the case of the Greek national e-prescription system.
Int. J. Electron. Heal., 2014

A formal framework to support dynamic authorisation in collaborative environments.
Int. J. Comput. Sci. Eng., 2014

2013
The new Greek national e-prescription system: an effective tool for improving quality of care and containing medication costs.
Proceedings of the Informatics, 2013

Using the NETC@RDS Approach as a Basis for Cross-Border Electronic Authentication.
Proceedings of the Collaborative, Trusted and Privacy-Aware e/m-Services, 2013

Geometrical facial feature selection for person identification.
Proceedings of the 16th International Conference on Information Fusion, 2013

2012
A Role Engineering Framework to Support Dynamic Authorizations in Collaborative Environments.
Inf. Secur. J. A Glob. Perspect., 2012

2011
Lightweight Steganalysis Based on Image Reconstruction and Lead Digit Distribution Analysis.
Int. J. Digit. Crime Forensics, 2011

Reconstructive Steganalysis by Source Bytes Lead Digit Distribution Examination.
Proceedings of the 6th International Workshop on Digital Forensics and Incident Analysis, 2011

2010
The Importance of Corporate Forensic Readiness in the Information Security Framework.
Proceedings of the 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, 2010

2009
Using Nature and Bio-inspired Technologies for Building Innovative Proactive Security Mechanisms.
Proceedings of the PCI 2009, 2009

K-bass: A Knowledge-Based Access Security System For Medical Environments.
Proceedings of the 4th Mediterranean Conference on Information Systems, 2009

Information Assurance and Forensic Readiness.
Proceedings of the Next Generation Society. Technological and Legal Issues, 2009

2008
A Methodology for Reliability Analysis in Health Networks.
IEEE Trans. Inf. Technol. Biomed., 2008

Secure mobile agent environments: modelling role assignments.
Int. J. Electron. Secur. Digit. Forensics, 2008

2007
KnowBaSICS-M: An ontology-based system for semantic management of medical problems and computerised algorithmic solutions.
Comput. Methods Programs Biomed., 2007

Securing Healthgrid Environments.
Proceedings of the SECRYPT 2007, 2007

2003
Healthcare teams over the Internet: programming a certificate-based approach.
Int. J. Medical Informatics, 2003

Implementing Authentication (LAP) and Monitoring in Healthcare Information Systems.
Health Informatics J., 2003

Programming Secure Mobile Agents in Healthcare Environments using Role-based Permissions.
Proceedings of the New Navigators: from Professionals to Patients, 2003

Towards Dynamically Administered Role-Based Access Control
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

2001
Flexible team-based access control using contexts.
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, 2001

A Flexible Access Control Model for Multimedia Medical Image Security.
Proceedings of the Advances in Multimedia Information Processing, 2001

A flexible content and context-based access control model for multimedia medical image database systems.
Proceedings of the 4th workshop on Multimedia & Security: New Challenges, 2001

A Flexible Role-Based Access Control Model for Multimedia Medical Image Database Systems.
Proceedings of the Information Security, 4th International Conference, 2001

Security Model for XML Data.
Proceedings of the International Conference on Internet Computing, 2001

1999
A Secure Payment System for Electronic Commerce.
Proceedings of the 10th International Workshop on Database & Expert Systems Applications, 1999

eMEDAC: Role-based Access Control Supporting Discretionary and Mandatory Features.
Proceedings of the Research Advances in Database and Information Systems Security, 1999

1998
Design of Secure Distributed Medical Database Systems.
Proceedings of the Database and Expert Systems Applications, 9th International Conference, 1998

1996
Security of Medical Database Systems for Health Care Management.
Proceedings of the Data Security for Health Care - Volume I: Management Guidelines, 1996

Design of secure medical database systems.
Proceedings of the Information Systems Security, 1996

1994
A tutorial on secure database systems.
Inf. Softw. Technol., 1994

Development of Secure Medical Database Systems.
Proceedings of the Database and Expert Systems Applications, 5th International Conference, 1994

Security Guidelines for Database Systems Development.
Proceedings of the Database Security, 1994

1993
Integrating Object Oriented Technology and Security in Medical Database Systems.
Proceedings of the Security for Object-Oriented Systems, 1993

1992
Consistency and standardization of user interfaces.
Inf. Softw. Technol., 1992

1989
Logical design of data base systems.
Inf. Manag., 1989

Delivery of textual files between national administrations using teletex.
Comput. Commun., 1989

1979
Design and Implementation of Relational Databases with Application to a Hospital Information System.
PhD thesis, 1979


  Loading...