default search action
George Pangalos
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j15]Nikolaos Serketzis, Vasilios Katos, Christos Ilioudis, Dimitrios A. Baltatzis, George Pangalos:
Improving Forensic Triage Efficiency through Cyber Threat Intelligence. Future Internet 11(7): 162 (2019) - [j14]Nikolaos Serketzis, Vasilios Katos, Christos Ilioudis, Dimitrios A. Baltatzis, George J. Pangalos:
Actionable threat intelligence for digital forensics readiness. Inf. Comput. Secur. 27(2): 273-291 (2019) - 2014
- [j13]Simeon Veloudis, Dimitrios A. Baltatzis, Christos Ilioudis, George Pangalos:
A formal framework to support dynamic authorisation in collaborative environments. Int. J. Comput. Sci. Eng. 9(4): 278-291 (2014) - [j12]George Pangalos, V. Sfyroeras, Ioannis Pagkalos:
E-prescription as a tool for improving services and the financial viability of healthcare systems: the case of the Greek national e-prescription system. Int. J. Electron. Heal. 7(4): 301-314 (2014) - 2013
- [c23]Alkiviadis Tsimpiris, Dimitris Kugiumtzis, Anastasios Drosou, Christos Ilioudis, George Pangalos, Dimitrios Tzovaras:
Geometrical facial feature selection for person identification. FUSION 2013: 730-735 - [c22]George Pangalos, Noel Nader, Ioannis Pagkalos:
Using the NETC@RDS Approach as a Basis for Cross-Border Electronic Authentication. I3E 2013: 153-168 - [c21]George Pangalos, D. Asimakopoulos, Ioannis Pagkalos:
The new Greek national e-prescription system: an effective tool for improving quality of care and containing medication costs. ICIMTH 2013: 13-17 - 2012
- [j11]Dimitrios A. Baltatzis, Christos Ilioudis, George Pangalos:
A Role Engineering Framework to Support Dynamic Authorizations in Collaborative Environments. Inf. Secur. J. A Glob. Perspect. 21(1): 12-27 (2012) - 2011
- [j10]Alexandros Zaharis, Adamantini Martini, Theo Tryfonas, Christos Ilioudis, George Pangalos:
Lightweight Steganalysis Based on Image Reconstruction and Lead Digit Distribution Analysis. Int. J. Digit. Crime Forensics 3(4): 29-41 (2011) - [c20]Alexandros Zaharis, Adamantini Martini, Theodore Tryfonas, Christos Ilioudis, George Pangalos:
Reconstructive Steganalysis by Source Bytes Lead Digit Distribution Examination. WDFIA 2011: 55-68 - 2010
- [c19]George Pangalos, Christos Ilioudis, Ioannis Pagkalos:
The Importance of Corporate Forensic Readiness in the Information Security Framework. WETICE 2010: 12-16
2000 – 2009
- 2009
- [c18]Georgios J. Pangalos, Vasilios Katos:
Information Assurance and Forensic Readiness. e-Democracy 2009: 181-188 - [c17]George Vakaros, George Pangalos:
K-bass: A Knowledge-Based Access Security System For Medical Environments. MCIS 2009: 74 - [c16]A. Samaras, George Pangalos, Christos Ilioudis, Ioannis Pagkalos:
Using Nature and Bio-inspired Technologies for Building Innovative Proactive Security Mechanisms. Panhellenic Conference on Informatics 2009: 7-13 - 2008
- [j9]Christos K. Georgiadis, Dimitrios A. Baltatzis, George Pangalos:
Secure mobile agent environments: modelling role assignments. Int. J. Electron. Secur. Digit. Forensics 1(3): 249-267 (2008) - [j8]Stergiani Spyrou, Panagiotis D. Bamidis, Nicos Maglaveras, George Pangalos, Costas Pappas:
A Methodology for Reliability Analysis in Health Networks. IEEE Trans. Inf. Technol. Biomed. 12(3): 377-386 (2008) - 2007
- [j7]Charalampos Bratsas, Vassilis Koutkias, Evangelos Kaimakamis, Panagiotis D. Bamidis, George Pangalos, Nicos Maglaveras:
KnowBaSICS-M: An ontology-based system for semantic management of medical problems and computerised algorithmic solutions. Comput. Methods Programs Biomed. 88(1): 39-51 (2007) - [c15]Christos Ilioudis, Dimitrios A. Baltatzis, George Pangalos, Christos K. Georgiadis:
Securing Healthgrid Environments. SECRYPT 2007: 394-401 - 2003
- [j6]Costas Chousiadis, George Pangalos:
Implementing Authentication (LAP) and Monitoring in Healthcare Information Systems. Health Informatics J. 9(2): 79-87 (2003) - [j5]Christos K. Georgiadis, Ioannis Mavridis, George Pangalos:
Healthcare teams over the Internet: programming a certificate-based approach. Int. J. Medical Informatics 70(2-3): 161-171 (2003) - [c14]Andreas K. Mattas, Ioannis Mavridis, George Pangalos:
Towards Dynamically Administered Role-Based Access Control. DEXA Workshops 2003: 494-498 - [c13]Christos K. Georgiadis, J. Baltatzis, George I. Pangalos:
Programming Secure Mobile Agents in Healthcare Environments using Role-based Permissions. MIE 2003: 136-140 - 2001
- [c12]Christos Ilioudis, George Pangalos, Athena Vakali:
Security Model for XML Data. International Conference on Internet Computing (1) 2001: 400-406 - [c11]Sofia K. Tzelepi, George Pangalos:
A Flexible Role-Based Access Control Model for Multimedia Medical Image Database Systems. ISC 2001: 335-346 - [c10]Sofia K. Tzelepi, Dimitrios K. Koukopoulos, George Pangalos:
A flexible content and context-based access control model for multimedia medical image database systems. MM&Sec 2001: 52-55 - [c9]Sofia K. Tzelepi, George Pangalos:
A Flexible Access Control Model for Multimedia Medical Image Security. IEEE Pacific Rim Conference on Multimedia 2001: 1030-1035 - [c8]Christos K. Georgiadis, Ioannis Mavridis, George Pangalos, Roshan K. Thomas:
Flexible team-based access control using contexts. SACMAT 2001: 21-27
1990 – 1999
- 1999
- [c7]Ioannis Mavridis, George Pangalos, Marie Khair:
eMEDAC: Role-based Access Control Supporting Discretionary and Mandatory Features. DBSec 1999: 63-78 - [c6]Ioannis Mavridis, George Pangalos, Triadafyllos Koukouvinos, Sead Muftic:
A Secure Payment System for Electronic Commerce. DEXA Workshop 1999: 832-836 - 1998
- [c5]Marie Khair, Ioannis Mavridis, George Pangalos:
Design of Secure Distributed Medical Database Systems. DEXA 1998: 492-500 - 1996
- [c4]George Pangalos, Marie Khair:
Design of secure medical database systems. SEC 1996: 387-401 - [p1]George Pangalos:
Security of Medical Database Systems for Health Care Management. Data Security for Health Care (1) 1996: 108-134 - 1994
- [j4]George Pangalos:
A tutorial on secure database systems. Inf. Softw. Technol. 36(12): 717-724 (1994) - [c3]George Pangalos:
Security Guidelines for Database Systems Development. DBSec 1994: 353-370 - [c2]George Pangalos, A. Pomortsis, L. Bozios, Marie Khair:
Development of Secure Medical Database Systems. DEXA 1994: 680-689 - 1993
- [c1]George Pangalos:
Integrating Object Oriented Technology and Security in Medical Database Systems. Security for Object-Oriented Systems 1993: 11-24 - 1992
- [j3]Georgios J. Pangalos:
Consistency and standardization of user interfaces. Inf. Softw. Technol. 34(6): 397-401 (1992)
1980 – 1989
- 1989
- [j2]George Pangalos:
Delivery of textual files between national administrations using teletex. Comput. Commun. 12(4): 223-228 (1989) - [j1]George Pangalos:
Logical design of data base systems. Inf. Manag. 17(1): 23-29 (1989)
1970 – 1979
- 1979
- [b1]George I. Pangalos:
Design and Implementation of Relational Databases with Application to a Hospital Information System. University College London, UK, 1979
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint