22 results on '"Ioannis, Papagiannis"'
Search Results
2. Effect of the COVID-19 pandemic on cardiac electrophysiological ablation procedures in Greece – Data from the Hellenic Society of Cardiology Ablation Registry
- Author
-
Vassilios P. Vassilikos, Georgios Giannopoulos, Nikolaos Fragakis, Antonis Billis, Michalis Efremidis, Konstantinos Letsas, Themistoklis Maounis, Anna Kostopoulou, Georgios Andrikopoulos, Sokratis Pastromas, Apostolos Katsivas, Charalambos Kossyvakis, Eleftherios Kallergis, Emmanouel Kanoupakis, Panagiotis Ioannidis, Stelios Tzeis, Dimosthenis Avramidis, Ioannis Papagiannis, Spyridon Deftereos, Eftychia Symeonidou, Dimitrios Tsiachris, George Theodorakis, Ioannis Rassias, Dimitrios Lysitsas, Eleni Chatzinikolaou, Nikolaos Mezilis, Stylianos Paraskevaidis, Spyros Kourouklis, Theodoros Apostolopoulos, Dimosthenis Katritsis, Sophia Chatzidou, Lilian Mantziari, Georgios Leventopoulos, Ioannis Chiladakis, George Kourgiannidis, George Stavropoulos, Sotirios Xydonas, Charilaos Ginos, Athanasios Kotsakis, Giannis Baltogiannis, Antonis S. Manolis, Skevos Sideris, and Konstantinos Gatzoulis
- Subjects
Greece ,Cardiology ,Catheter Ablation ,COVID-19 ,Humans ,Registries ,Cardiology and Cardiovascular Medicine ,Pandemics - Published
- 2022
3. Primary Sjögren’s Syndrome Presenting with Rapidly Progressive Dementia: A Case Report
- Author
-
Vasileios Papaliagkas, Konstantinos Notas, Martha Spilioti, Ioannis Papagiannis, Petros Nemtsas, Athanasios Poulopoulos, Konstantinos Kouskouras, Ioannis Diakogiannis, and Vasilios K. Kimiskidis
- Subjects
Neurology ,Neurology (clinical) - Abstract
Background: Rapidly progressive dementias (RPDs) are dementias that progress subacutely over a time period of weeks to months. Primary Sjögren’s syndrome (pSS) is an autoimmune disease that can affect any organ system and may present with a wide range of clinical features that may mimic a plethora of medical conditions and, in rare cases, may manifest as RPD. We describe a unique case of pSS, in which rapidly progressive dementia (RPD) was the first disease manifestation, and the patient’s radiological and electroencephalogram findings were compatible with Creutzfeldt- Jakob disease (CJD). Case presentation: Here, we report a 58-year-old woman who presented with cognitive impairment rapidly deteriorating over the last 6 months prior to admission. Brain MRI and EEG were indicative of CJD. However, CSF 14-3-3 and tau/phospho tau ratio were within normal limits and therefore alternative diagnoses were considered. Blood tests were significant for positive antinuclear antibodies, anti-ENA, and anti-SSA and a lip biopsy was consistent with pSS. The patient was started on intravenous steroids followed by oral prednisone taper, which prevented further deterioration. Conclusions: This rare case expands the spectrum of neurological manifestations in pSS and highlights the importance of considering pSS in the differential diagnosis of RPDs in order to avoid misdiagnosis and provide appropriate treatment in a timely fashion.
- Published
- 2022
4. FDXR Gene Expression after
- Author
-
Ellas, Spyratou, Agapi, Ploussi, Panagiotis, Alafogiannis, Hector, Katifelis, Sotiria, Apostolopoulou, Georgios, Bagenakis, Spyridon, Rammos, Ioannis, Papagiannis, Maria, Gazouli, Ioannis, Seimenis, Alexandros G, Georgakilas, and Efstathios P, Efstathopoulos
- Subjects
Cardiology ,Ferredoxins ,Gene Expression ,Humans ,Radiation Exposure ,Child ,Oxidoreductases ,Biomarkers - Abstract
Ferredoxin reductase (FDXR) has already been reported as a promising biomarker for estimating radiation doses in radiotherapy. This study aimed to investigate the responsiveness of FDXR on pediatric population exposed to ionizing radiation (X-rays) during pediatric interventional cardiology (IC) procedures.Peripheral blood was collected by venipuncture from 24 pediatric donors before and 24 hours after the IC procedure. To estimate the effective dose, demographic data and Air Kerma-Area Product (PKA) were recorded for each patient. The relative quantification (RQ) of the FDXR gene in irradiated patient blood samples compared to the non-irradiated blood samples was determined using qPCR analysis. The relative values of FDXR were log- transformed.The effective dose ranged from 0.002 mSv to 8.004 mSv. Over this radiation exposure range, the FDXR gene expression varied randomly with the effective dose. Up-regulation in FDXR expression was observed in 17 patients and down-regulation in 7 patients.Further studies in a larger cohort of pediatric patients along with the record of clinical data are needed to determine whether FDXR gene expression is an effective biomarker for radiation exposure estimation in pediatric imaging.
- Published
- 2022
5. Rapid right ventricular pacing for balloon aortic valvuloplasty: expanding its routine use in neonates and infants
- Author
-
Dimosthenis Avramidis, Charalampos Kavvouras, David Anderson, Fotios Mitropoulos, Panagiota Karouli, Konstantinos S. Mylonas, Ioannis Papagiannis, and Aphrodite Tzifa
- Subjects
Balloon Valvuloplasty ,medicine.medical_specialty ,medicine.medical_treatment ,Regurgitation (circulation) ,030204 cardiovascular system & hematology ,Balloon ,03 medical and health sciences ,0302 clinical medicine ,Internal medicine ,medicine ,Humans ,Ventricular outflow tract ,030212 general & internal medicine ,Child ,Retrospective Studies ,business.industry ,Infant, Newborn ,Infant ,Retrospective cohort study ,Aortic Valve Stenosis ,General Medicine ,medicine.disease ,Aortic valvuloplasty ,Stenosis ,Treatment Outcome ,Aortic Valve ,Pediatrics, Perinatology and Child Health ,Ventricular fibrillation ,cardiovascular system ,Cardiology ,Unicuspid ,Cardiology and Cardiovascular Medicine ,business - Abstract
Objective:Rapid right ventricular pacing during balloon aortic valvuloplasty is commonly used to achieve balloon stability in children and adults. There is no consensus for the use of the technique in neonates and infants. We sought to review our institutional experience with rapid right ventricular pacing-assisted balloon aortic valvuloplasty across all age groups and evaluate the safety and effectiveness of the technique in the sub-group of neonates and infants Methods:Retrospective study between February, 2011 and February, 2020.Results:A total of 37 patients (Group I: 21 neonates/infants Conclusions:Rapid right ventricular pacing can be expanded in neonates and infants to potentially decrease the incidence of aortic regurgitation and reintervention rates, hence avoiding high-risk surgical bail-out procedures for severe aortic regurgitation in the first year of life. Myocardial ischemia may predispose to ventricular dysrhythmias during rapid right ventricular pacing.
- Published
- 2020
6. West Nile neuroinvasive disease. Report of four cases in Northern Greece, 2018
- Author
-
Pantelis Haloudis, Eleni Antoniadi, Konstantinos Notas, Athina Myrou, Apostolos I. Hatzitolios, Evangelia Liougka, Dimitrios Fotiou, Andreas Kiryttopoulos, Magda Tsolaki, Thomas Tegos, Anna Papa, Maria Papaioannou, Ioannis Papagiannis, Martha Spilioti, and Chrysanthi Kyriakogianni
- Subjects
Male ,West Nile virus ,animal diseases ,viruses ,medicine.disease_cause ,Tertiary Care Centers ,03 medical and health sciences ,Sex Factors ,0302 clinical medicine ,Neuroinvasive disease ,Virology ,medicine ,Humans ,Encephalitis, Viral ,030212 general & internal medicine ,Biochemical markers ,Aged ,Greece ,biology ,Transmission (medicine) ,business.industry ,Age Factors ,virus diseases ,Middle Aged ,medicine.disease ,biology.organism_classification ,Meningitis, Viral ,nervous system diseases ,Flavivirus ,Infectious Diseases ,Population Surveillance ,Etiology ,Female ,030211 gastroenterology & hepatology ,business ,Meningitis ,Biomarkers ,West Nile Fever ,Encephalitis - Abstract
West Nile virus (WNV) is a mosquito-borne RNA flavivirus which caused several epidemics worldwide. The year 2018 was a WNV record year for Europe, including Greece, with earlier and longer transmission season with higher than the previous number of cases. It has been proposed that some simple biochemical markers may be helpful for the recognition of WNV neuroinvasive disease, its differential from other neurological infectious diseases and prognosis. We describe four cases that suffered from WNV meningitis and/or encephalitis hospitalized in 2018 in a tertiary hospital in Thessaloniki, Greece, and investigate the importance of simple biomarkers for the recognition of WNV etiology.
- Published
- 2020
7. Comparison of the effect of one-way and two-way fire-wind coupling on the modelling of wildland fire propagation dynamics
- Author
-
Mohammad T. Sadrabadi, Mauro S. Innocente, Evangelos Gkanas, and Ioannis Papagiannis
- Abstract
Operational wildland fire propagation models typically are uncoupled from the wind field or rely solely on estimations from an atmospheric model and/or meteorological observations. This leads to a frozen wind field with a high degree of uncertainty, and therefore to results drifting from the ground truth. On the other hand, a fully-coupled model is not viable for operational use due to the enormous computing effort required. This article proposes the use of real-time measurements from a drone swarm to enhance the results of a one-way coupled physics-based model (FireProM-F) to mimic the two-way coupling of fire and atmosphere. In the absence of actual measurements, synthetic data is used at the early stages of this research. The latter is generated using the WFDS levelset model with two-way fire-atmosphere coupling at various phases of the fire. Finally, the 'measured' wind field will be integrated into the target model to determine its effect on the outcomes.
- Published
- 2022
8. FDXR Gene Expression after in Vivo Radiation Exposure of Pediatric Patients Undergoing Interventional Cardiology Procedures
- Author
-
Efstathios P. Efstathopoulos, Alexandros G. Georgakilas, Ioannis Seimenis, Maria Gazouli, Ioannis Papagiannis, Spyridon Rammos, Georgios Bagenakis, Sotiria Apostolopoulou, Hector Katifelis, Panagiotis Alafogiannis, Agapi Ploussi, and Ellas Spyratou
- Subjects
General Immunology and Microbiology ,General Medicine ,General Biochemistry, Genetics and Molecular Biology - Published
- 2022
9. Effects of secondary biological treatment plant effluent administration, as drinking water, to rats' urogenital system in relation to cadmium and lead accumulation
- Author
-
Vasiliki Kalfakakou, Evangelos Kontargiris, Dimitrios Peschos, Angelos M. Evangelou, X. Giannakopoulos, Patra Vezyraki, Yannis V. Simos, Nikolaos Sofikitis, and Ioannis Papagiannis
- Subjects
Male ,Health, Toxicology and Mutagenesis ,chemistry.chemical_element ,Sewage ,Urogenital System ,Urine ,010501 environmental sciences ,01 natural sciences ,Water Purification ,Animal science ,medicine ,Environmental Chemistry ,Ecotoxicology ,Animals ,Rats, Wistar ,Effluent ,0105 earth and related environmental sciences ,Cadmium ,Kidney ,Urinary bladder ,Genitourinary system ,business.industry ,Drinking Water ,General Medicine ,Pollution ,Rats ,medicine.anatomical_structure ,chemistry ,Lead ,business ,Water Pollutants, Chemical - Abstract
The aim of this study was to examine the effect of the secondary biological treatment plant effluent administration on the kidneys, urinary bladder, and testis of Wistar rats in relation to lead (Pb) and cadmium (Cd) accumulation, since such an effluent is used for irrigation of edible plants. Male Wistar rats, randomly assigned into 5 groups, were treated with domestic sewage effluent (DSE) for 24 months. Cadmium and lead concentrations in the DSE, rats' tissues, and urine were estimated by means of atomic spectroscopy. Lead was rapidly accumulated in high amounts in rats' kidney and to a lesser extent in the testis whereas Cd concentration was raised in all tissues examined. Deposition of Cd and Pd in the kidney of the rats resulted in profound damage over time. The results showed that long-term administration to DSE as drinking water exposes living organisms to urogenital stress related to heavy metal concentration and pH of the effluent.
- Published
- 2018
10. Photoelectrocatalytic production of hydrogen peroxide using a photo(catalytic) fuel cell
- Author
-
Yiannis Deligiannakis, Anastasios D. Keramidas, Ioannis Papagiannis, Panagiotis Lianos, and Panagiota Stathi
- Subjects
Chemistry ,General Chemical Engineering ,General Physics and Astronomy ,02 engineering and technology ,General Chemistry ,Electrolyte ,Carbon black ,Photoelectrochemical cell ,010402 general chemistry ,021001 nanoscience & nanotechnology ,Solar fuel ,01 natural sciences ,Cathode ,0104 chemical sciences ,Catalysis ,law.invention ,chemistry.chemical_compound ,Chemical engineering ,law ,0210 nano-technology ,Hydrogen peroxide ,Faraday efficiency - Abstract
Photoelectrochemical production of hydrogen peroxide has been studied by using a two-compartment photoelectrochemical cell operating in the Photo(catalytic) Fuel Cell mode, i.e. it run without any external bias, simply by shining light and generating current. The photoanode was made of CdS quantum dots deposited on nanocrystalline titania, which was first formed on a transparent fluorine doped tin oxide electrode. The photoanode operated in an alkaline environment with added ethanol as model fuel. An air-breathing cathode was made by depositing carbon black on carbon cloth, without any additives of particular functionalities. Best results were obtained by using a neutral electrolyte (Na2SO4) in the cathode compartment. Hydrogen peroxide was produced during cell operation in a cumulative manner adding up to 1400 mg/l (41 mM) in three hours of operation. The rate of hydrogen peroxide production during this period of time remained practically constant and was 5.7 μmole/min, which corresponds to an average Faradaic efficiency of 74%. These data characterize a system with satisfactory performance that may be used for solar fuel production.
- Published
- 2020
11. IVD: Automatic Learning and Enforcement of Authorization Rules in Online Social Networks
- Author
-
Paul Dan Marinescu, Ioannis Papagiannis, Marjori Pomarole, Patrick Tague, Yuan Tian, and Chad Parry
- Subjects
Graph database ,Exploit ,Social network ,business.industry ,Computer science ,Data manipulation language ,Cross-site scripting ,Authorization ,Vulnerability ,020207 software engineering ,02 engineering and technology ,Computer security ,computer.software_genre ,World Wide Web ,Software bug ,Data model ,0202 electrical engineering, electronic engineering, information engineering ,Web application ,020201 artificial intelligence & image processing ,business ,computer ,Block (data storage) - Abstract
Authorization bugs, when present in online social networks, are usually caused by missing or incorrect authorization checks and can allow attackers to bypass the online social network's protections. Unfortunately, there is no practical way to fully guarantee that an authorization bug will never be introduced—even with good engineering practices—as a web application and its data model become more complex. Unlike other web application vulnerabilities such as XSS and CSRF, there is no practical general solution to prevent missing or incorrect authorization checks. In this paper we propose Invariant Detector (IVD), a defense-in-depth system that automatically learns authorization rules from normal data manipulation patterns and distills them into likely invariants. These invariants, usually learned during the testing or pre-release stages of new features, are then used to block any requests that may attempt to exploit bugs in the social network's authorization logic. IVD acts as an additional layer of defense, working behind the scenes, complementary to privacy frameworks and testing. We have designed and implemented IVD to handle the unique challenges posed by modern online social networks. IVD is currently running at Facebook, where it infers and evaluates daily more than 200,000 invariants from a sample of roughly 500 million client requests, and checks the resulting invariants every second against millions of writes made to a graph database containing trillions of entities. Thus far IVD has detected several high impact authorization bugs and has successfully blocked attempts to exploit them before code fixes were deployed.
- Published
- 2017
12. Information Flow Control for Secure Cloud Computing
- Author
-
Peter Pietzuch, David Eyers, Ioannis Papagiannis, Jean Bacon, Thomas Pasquier, and Jatinder Singh
- Subjects
Cloud computing security ,Computer Networks and Communications ,Computer science ,business.industry ,Software as a service ,Data security ,Cloud computing ,Access control ,Computer security ,computer.software_genre ,Security policy ,Mandatory access control ,Cloud testing ,Electrical and Electronic Engineering ,business ,computer - Abstract
Security concerns are widely seen as an obstacle to the adoption of cloud computing solutions. Information Flow Control (IFC) is a well understood Mandatory Access Control methodology. The earliest IFC models targeted security in a centralised environment, but decentralised forms of IFC have been designed and implemented, often within academic research projects. As a result, there is potential for decentralised IFC to achieve better cloud security than is available today. In this paper we describe the properties of cloud computing—Platform-as-a-Service clouds in particular—and review a range of IFC models and implementations to identify opportunities for using IFC within a cloud computing context. Since IFC security is linked to the data that it protects, both tenants and providers of cloud services can agree on security policy, in a manner that does not require them to understand and rely on the particulars of the cloud software stack in order to effect enforcement.
- Published
- 2014
13. BrowserFlow: imprecise data flow tracking to prevent accidental data disclosure
- Author
-
Peter Pietzuch, Pijika Watcharapichat, Divya Muthukumaran, Ioannis Papagiannis, and Engineering & Physical Science Research Council (EPSRC)
- Subjects
020203 distributed computing ,Cloud computing security ,business.industry ,Computer science ,Control (management) ,Tracking system ,Cloud computing ,02 engineering and technology ,Computer security ,computer.software_genre ,World Wide Web ,Data flow diagram ,020204 information systems ,Middleware (distributed applications) ,Similarity (psychology) ,0202 electrical engineering, electronic engineering, information engineering ,Tracking (education) ,business ,computer - Abstract
With the use of external cloud services such as Google Docs or Evernote in an enterprise setting, the loss of control over sensitive data becomes a major concern for organisations. It is typical for regular users to violate data disclosure policies accidentally, e.g. when sharing text between documents in browser tabs. Our goal is to help such users comply with data disclosure policies: we want to alert them about potentially unauthorised data disclosure from trusted to untrusted cloud services. This is particularly challenging when users can modify data in arbitrary ways, they employ multiple cloud services, and cloud services cannot be changed. To track the propagation of text data robustly across cloud services, we introduce imprecise data flow tracking, which identifies data flows implicitly by detecting and quantifying the similarity between text fragments. To reason about violations of data disclosure policies, we describe a new text disclosure model that, based on similarity, associates text fragments in web browsers with security tags and identifies unauthorised data flows to untrusted services. We demonstrate the applicability of imprecise data tracking through BrowserFlow, a browser-based middleware that alerts users when they expose potentially sensitive text to an untrusted cloud service. Our experiments show that BrowserFlow can robustly track data flows and manage security tags for documents with no noticeable performance impact.
- Published
- 2016
14. Photoelectrocatalytic vs. Photocatalytic Degradation of Organic Water Born Pollutants
- Author
-
Panagiotis Lianos, Georgia Koutsikou, Dionissios Mantzavinos, Zacharias Frontistis, Ioannis Konstantinou, Ioannis Papagiannis, and George Avgouropoulos
- Subjects
Materials science ,chemistry.chemical_element ,photocatalytic degradation ,02 engineering and technology ,010501 environmental sciences ,lcsh:Chemical technology ,medicine.disease_cause ,01 natural sciences ,Catalysis ,lcsh:Chemistry ,medicine ,lcsh:TP1-1185 ,Physical and Theoretical Chemistry ,0105 earth and related environmental sciences ,Pollutant ,piroxicam ,Doping ,021001 nanoscience & nanotechnology ,Tin oxide ,photoelectrocatalytic degradation ,lcsh:QD1-999 ,Chemical engineering ,chemistry ,Electrode ,Fluorine ,Photocatalysis ,Degradation (geology) ,Basic Blue 41 ,0210 nano-technology ,Ultraviolet - Abstract
The azo dye Basic Blue 41 was subjected to photocatalytic and photoelectrocatalytic degradation using nanopararticulate titania films deposited on either glass slides or Fluorine doped Tin Oxide (FTO) transparent electrodes. The degradation was carried out by irradiating titania films with weak ultraviolet (UVA) radiation. The degradation was faster when using FTO as a titania support even without bias and was further accelerated under forward electric bias. This result was explained by enhanced electron-hole separation even in the case of the unbiased titania/FTO combination. This system for organic material photocatalytic degradation was also successfully applied to the degradation of the anti-inflammatory drug piroxicam, which demonstrated a well distinguished degradation behavior in going from a plain glass support to unbiased and biased FTO. The degradation pathway of piroxicam has been additionally studied using liquid chromatography-accurate mass spectrometry analysis.
- Published
- 2018
15. Atrial natriuretic peptide relation to plasma and heart zinc concentrations of wistar rats exposed to cold and hot ambients
- Author
-
Patra Vezyraki, Vicky Kalfakakoy, Angelos Evangelou, and Ioannis Papagiannis
- Subjects
Male ,inorganic chemicals ,medicine.medical_specialty ,Hot Temperature ,Endocrinology, Diabetes and Metabolism ,Clinical Biochemistry ,Cold exposure ,chemistry.chemical_element ,Zinc ,Biochemistry ,Acclimatization ,Inorganic Chemistry ,Atrial Natriuretic Factor/*blood ,Cold Temperature ,Atrial natriuretic peptide ,Internal medicine ,Myocardium/*metabolism ,medicine ,Animals ,Rats, Wistar ,Plasma zinc ,Chemistry ,Myocardium ,Biochemistry (medical) ,Radioimmunoassay ,General Medicine ,Plasma ,Adaptation, Physiological ,Rats ,Endocrinology ,Zinc/blood/*metabolism ,cardiovascular system ,Atrial Natriuretic Factor ,hormones, hormone substitutes, and hormone antagonists - Abstract
Plasma atrial natriuretic peptide (ANP) and zinc levels, as well as heart tissue zinc concentrations were determined, in male Wistar rats after the exposure of 114 rats at low temperature (4 degrees C) and 95 rats at high temperature (35-36 degrees C) for 28 d. Plasma ANP was estimated by radioimmunoassay and Zn2+ concentrations by atomic absorption spectrometry. Values were compared to a control group exposed at 20-22 degrees C (76 rats). Plasma ANP and Zn2+ levels, as well as heart tissue Zn2+ concentrations of control rats did not show statistically significant variations during the study, whereas rats exposed to cold and hot ambients showed significant variations of the parameters. A significant increase of plasma ANP and plasma zinc and heart tissue Zn2+ concentrations developed during cold exposure, whereas a gradual decrease of plasma ANP and Zn2+ levels was revealed during hot adaptation. Results also indicate that plasma ANP and zinc levels are proportionally related, whereas there is an inverse relationship between plasma ANP levels and heart Zn2+ concentrations, in both cold and hot exposed rats. In conclusion, our results show that ANP in relation to zinc probably play an important role in cold and hot acclimatization of rats. Biol Trace Elem Res
- Published
- 1999
16. CloudFilter
- Author
-
Ioannis Papagiannis and Peter Pietzuch
- Subjects
Cloud computing security ,Computer science ,business.industry ,Services computing ,Cloud computing ,Computer security ,computer.software_genre ,Enterprise data management ,Upload ,business ,Cloud storage ,computer ,Protocol (object-oriented programming) ,Block (data storage) - Abstract
A major obstacle for the adoption of cloud services in enterprises is the potential loss of control over sensitive data. Companies often have to safeguard a subset of their data because it is crucial to their business or they are required to do so by law. In contrast, cloud service providers handle enterprise data without providing guarantees and may put confidentiality at risk. In order to maintain control over their sensitive data, companies typically block all access to a wide range of cloud services at the network level. Such restrictions significantly reduce employee productivity while offering limited practical protection in the presence of malicious employees.In this paper, we suggest a practical mechanism to ensure that an enterprise maintains control of its sensitive data while employees are allowed to use cloud services. We observe that most cloud services use HTTP as a transport protocol. Since HTTP offers well-defined methods to transfer files, inspecting HTTP messages allows the propagation of data between the enterprise and cloud services to be monitored independently of the implementation of specific cloud services. Our system, CloudFilter, intercepts file transfers to cloud services, performs logging and enforces data propagation policies. CloudFilter controls where files propagate after they have been uploaded to the cloud and ensures that only authorised users may gain access. We show that CloudFilter can be applied to control data propagation to Dropbox and GSS, describing the realistic data propagation policies that it can enforce.
- Published
- 2012
17. Beta-Cell Changes in an Insulin Resistance Model Persist Despite Improved Glycemic Control
- Author
-
Ioannis Papagiannis, Dai Chunhua, Greg Poffenberger, and Alvin C Powers
- Published
- 2011
18. Glucagon-Like Peptide-1 Promotes Beta-Cell Proliferation and Improves Glycemic Control in a Murine Model of Neonatal Diabetes
- Author
-
Michael A Spinner, Ioannis Papagiannis, Chunhua Dai, and Alvin C Powers
- Published
- 2011
19. Security Policy and Information Sharing in Distributed Event-Based Systems
- Author
-
Ken Moody, Peter Pietzuch, Jean Bacon, Brian Shand, Ioannis Papagiannis, David Eyers, and Matteo Migliavacca
- Subjects
Distributed System Security Architecture ,Security service ,Computer science ,Distributed computing ,Network security policy ,Information security ,Computer security model ,Computer security ,computer.software_genre ,Asset (computer security) ,Security policy ,computer ,Security information and event management - Abstract
Linking security policy into event-based systems allows formal reasoning about information security. In the applications we address, highly confidential data must be shared both dynamically and for historical analysis. Principals with rights to access the data may be widely distributed, existing in a federation of independent administrative domains. Domain managers are responsible for the data held within domains and transmitted from them; security policy must be specified and enforced in order to meet these obligations. We motivate the event-driven paradigm and take healthcare as a running example, because the confidentiality of healthcare data must be guaranteed over many years. We first consider how to enforce authorisation policy at the client level through parametrised role-based access control (RBAC), taking context into account. We then discuss the additional requirements for secure information flow through the infrastructure components that contribute to communication within and between distributed domains. Finally, we show how this approach supports reasoning about event security in large-scale distributed systems.
- Published
- 2011
20. PrivateFlow
- Author
-
Ioannis Papagiannis, David Eyers, Peter Pietzuch, Matteo Migliavacca, Jean Bacon, and Brian Shand
- Subjects
Information sensitivity ,SIMPLE (military communications protocol) ,Software deployment ,Computer science ,Middleware (distributed applications) ,Distributed computing ,Event based ,Control (management) ,Information flow (information theory) ,computer.software_genre ,computer - Abstract
Complex middleware frameworks are made out of interacting components which may include bugs. These frameworks are often extended to provide additional features by third-party extensions that may not be completely trusted and, as a result, compromise the security of the whole platform. Aiming to minimize these problems, we propose a demonstration of PrivateFlow, a publish/subscribe prototype supported by Decentralized Information Flow Control (DIFC). DIFC is a taint-tracking mechanism that can prevent components from leaking information. We will showcase a simple deployment of PrivateFlow that incorporates third-party untrusted components. In our demonstration, one of these components will try to leak sensitive information about the system's operation and it will fail once DIFC is activated.
- Published
- 2009
21. A QoS-Based Selection Mechanism Exploiting Business Relationships in Workflows
- Author
-
Kleopatra Konstanteli, Ioannis Papagiannis, Theodora Varvarigou, Konstantinos Tserpes, and Dimosthenis Kyriazis
- Subjects
Process management ,Knowledge management ,Computer science ,Artifact-centric business process model ,business.industry ,Service design ,Service level objective ,Enhanced Telecom Operations Map ,Service level requirement ,Service provider ,Differentiated service ,business ,Value-added network - Abstract
This paper deals with the problem of selecting service instances to execute workflow processes by not only taking into consideration Quality of Service (QoS) constraints, posed by the end-users, but also the business relationships between different service providers. These business / strategic relationships, the providers have, may affect the parameters of the service instances regarding the offered QoS level, and therefore the relationships need to be modeled and expressed with specific metrics. In this paper we present an innovative algorithm that maps workflow processes to service instances by taking into account the aforementioned metrics during the selection process. We also demonstrate the operation of the implemented algorithm and evaluate its effectiveness using a scenario, based on a 3D image rendering application.
- Published
- 2009
22. Business Relationships in Grid Workflows
- Author
-
Dimosthenis Kyriazis, Theodora Varvarigou, Magdalini Kardara, Ioannis Papagiannis, and Vassiliki Andronikou
- Subjects
Knowledge management ,Artifact-centric business process model ,Computer science ,business.industry ,Business service provider ,Service provider ,computer.software_genre ,Value-added network ,Business domain ,Grid computing ,Enhanced Telecom Operations Map ,business ,computer ,Workflow management system - Abstract
Although initially designed to cover the needs of computationally-intensive applications, Grid technology of nowadays aims at providing an infrastructure that can also serve the needs of the business domain. Taking into consideration that the available service providers may have business / strategic relationships, this paper focuses on describing an approach for modeling these relationships. Furthermore and since these relationships may affect the parameters regarding the offered Quality of Service (QoS) level, we present a metric for characterizing a service providers "friendliness". The latter can be used to promote the most positively influential providers and put aside those with a negative influence during a QoS-based selection process in Grid workflow management systems.
- Published
- 2008
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.