Skip to main content

Research Repository

Advanced Search

All Outputs (375)

If you seek to ‘switch off’ encryption, you may as well switch off the whole internet. (2015)
Newspaper / Magazine
Buchanan, W. J. (2015). If you seek to ‘switch off’ encryption, you may as well switch off the whole internet

Prime Minister David Cameron has stated that the UK government will look at “switching off” some forms of encryption in order to make society safer from terror attacks. This might make a grand statement but it is impossible to implement and extremely... Read More about If you seek to ‘switch off’ encryption, you may as well switch off the whole internet..

Advanced persistent threat and Insiders. (2015)
Presentation / Conference Contribution
Buchanan, W. J. (2015, January). Advanced persistent threat and Insiders. Paper presented at Advanced Persistent Threat

With an increase in the range and mobility of devices which connect to the network, there are now so many opportunities for intruders to compromise systems. Leading with the recent Sony hack, Bill explores the pitfalls of their defences and how they... Read More about Advanced persistent threat and Insiders..

An Analysis of N5 and Higher Computing. (2015)
Presentation / Conference Contribution
Buchanan, W. J. (2015, January). An Analysis of N5 and Higher Computing. Paper presented at Computing at School

This presentation outlined an analysis of N5 and Higher Computing in Scotland.

Review of e-Frailty evaluation frameworks. (2015)
Presentation / Conference Contribution
Smales, A., Buchanan, W. J., & Thuemmler, C. (2015, January). Review of e-Frailty evaluation frameworks. Paper presented at HIS 2015

This paper outlines some of the key methods used to evaluate frailty and provide important metrics for the implementation of an e-Frailty framework. Frailty is an emergent property of the aging process, as measured using quantification of accumulatio... Read More about Review of e-Frailty evaluation frameworks..

How the love of one teenager brought Tweetdeck to its knees. (2014)
Newspaper / Magazine
Buchanan, W. J. (2014). How the love of one teenager brought Tweetdeck to its knees

TweetDeck, a Twitter app with millions of users, is back online after a rather surprising security scare. For several hours, the service was taken down all because a 19-year-old user tried to add a cute heart to his messages.

Traffic light hacking shows the Internet of Things must come with better security. (2014)
Newspaper / Magazine
Buchanan, W. J. (2014). Traffic light hacking shows the Internet of Things must come with better security

The growing extent to which our day-to-day infrastructure is computer-controlled and internet-connected leaves it open to the possibility that malicious hackers could intercept data or take control of devices. Often this sort of critical infrastructu... Read More about Traffic light hacking shows the Internet of Things must come with better security..

Information sharing. (2014)
Patent
Buchanan, W. J., Fan, L., Uthmani, O., & Lawson, A. (2014). Information sharing

http://www.google.com/patents/US20140201804 The present disclosure relates to improved information sharing and in particular to formal representations of information sharing policies between organizations. An organization comprises various agents wit... Read More about Information sharing..

Cloud-based identity and identity meta-data: secure and control own data in globalization era. (2014)
Journal Article
Spyra, G., Buchanan, W. J., Cruickshank, P., & Ekonomou, E. (2014). Cloud-based identity and identity meta-data: secure and control own data in globalization era. International Journal of Reliable and Quality E-Healthcare, 3, https://doi.org/10.4018/ijrqeh.2014010105

This paper proposes a new identity, and its underlying meta-data, model. The approach enables secure spanning of identity meta-data across many boundaries such as health-care, financial and educational institutions, including all others that store an... Read More about Cloud-based identity and identity meta-data: secure and control own data in globalization era..

Codebreaking has moved on since Turing’s day, with dangerous implications. (2014)
Newspaper / Magazine
Buchanan, W. J. (2014). Codebreaking has moved on since Turing’s day, with dangerous implications

We have always been been intrigued by keeping secrets and uncovering the secrets of others, whether that’s childhood secret messages, or secrets and codebreaking of national importance. With a film, The Imitation Game, reprising the life of Alan Turi... Read More about Codebreaking has moved on since Turing’s day, with dangerous implications..

Better locks to secure our data are the inevitable result of too many prying eyes (2014)
Newspaper / Magazine
Buchanan, W. J. (2014). Better locks to secure our data are the inevitable result of too many prying eyes

Robert Hannigan, the new head of British signals intelligence agency GCHQ, has accused technology companies of aiding terrorists and criminals by providing them secure communications through their products and networks. Far from adopting a conciliato... Read More about Better locks to secure our data are the inevitable result of too many prying eyes.

Complete anatomy of Heartbleed, Truecrypt and large-scale vulnerabilities. (2014)
Presentation / Conference Contribution
Buchanan, W. J. (2014, September). Complete anatomy of Heartbleed, Truecrypt and large-scale vulnerabilities. Paper presented at 7th International Conference on Security of Information and Networks (SIN 2014)

This presentation will outline some new research related to the Heartbleed vulnerability, and cover the full technical details of the threat, with a live demo. Along with it will show how Heartbleed is detected on networked device, and some new resea... Read More about Complete anatomy of Heartbleed, Truecrypt and large-scale vulnerabilities..

Evaluating Digital Forensic Tools (DFTs). (2014)
Presentation / Conference Contribution
Flandrin, F., Buchanan, W. J., Macfarlane, R., Ramsay, B., & Smales, A. (2014). Evaluating Digital Forensic Tools (DFTs). In 7th International Conference : Cybercrime Forensics Education & Training

This paper outlines the key methods used in the evaluation of digital forensics tools.

Mobile User Authentication System for E-commerce Applications. (2014)
Presentation / Conference Contribution
Molla, R., Romdhani, I., Buchanan, W. J., & Fadel, E. Y. (2014, June). Mobile User Authentication System for E-commerce Applications. Paper presented at International Conference on Advanced Networking, Distributed Systems and Applications 2014

E-commerce applications provide on-line clients and merchants with a quick and convenient way to exchange goods and services. However, the deployment of these applications is still facing many problems such as security threats; and on-line attacks. T... Read More about Mobile User Authentication System for E-commerce Applications..

Discrete Logarithms within Computer and Network Security. (2014)
Presentation / Conference Contribution
Buchanan, W. J. (2014, April). Discrete Logarithms within Computer and Network Security. Presented at Napier 400 - Numerical Algorithms and Intelligent Software Symposium

As we move into an Information Age, the requirement for computer security increases by the day, only in terms of privacy, but also in terms of proving identity and in verifying the integrity of data. Unfortunately many of the most widely used public... Read More about Discrete Logarithms within Computer and Network Security..

“I am Spartacus”: privacy enhancing technologies, collaborative obfuscation and privacy as a public good (2014)
Journal Article
Kwecka, Z., Buchanan, W. J., Schafer, B., & Rauhofer, J. (2014). “I am Spartacus”: privacy enhancing technologies, collaborative obfuscation and privacy as a public good. Artificial Intelligence and Law, 22(2), 113-139. https://doi.org/10.1007/s10506-014-9155-5

The paper introduces an approach to privacy enhancing technologies that sees privacy not merely as an individual right, but as a public good. This understanding of privacy has recently gained ground in the debate on appropriate legal protection for p... Read More about “I am Spartacus”: privacy enhancing technologies, collaborative obfuscation and privacy as a public good.

The Risks and Opportunities of Mobile Working within Cloud Environments. (2014)
Presentation / Conference Contribution
Buchanan, W. J., & Smales, A. (2014, February). The Risks and Opportunities of Mobile Working within Cloud Environments. Paper presented at Practical Perspectives on Secure Mobile Working

This presentation outlines the changing architecture of business systems, and with the increasing use of Cloud-based systems. It outlines some of the key risks around using mobile devices for business and social uses, and define some best practice me... Read More about The Risks and Opportunities of Mobile Working within Cloud Environments..

Norms and standards in modular medical architectures. (2014)
Presentation / Conference Contribution
Fricker, S., Fiedler, M., Grottland, A., Jell, T., Magedanz, T., Thuemmler, C., Mival, O., Benyon, D., Buchanan, W. J., & Paulin, A. (2013, October). Norms and standards in modular medical architectures. Presented at 2013 IEEE 15th International Conference on e-Health Networking, Applications and Services (Healthcom 2013)

Recent Internet of Things (IoT) research has been aiming at interoperability of devices and the integration of sensor networks. The Future Internet - Private Public Partnership (FI-PPP) has created a whole array of different purpose-oriented modules... Read More about Norms and standards in modular medical architectures..