Skip to main content

Research Repository

Advanced Search

All Outputs (375)

AES Encryption and Decryption in Microsoft .NET. (2010)
Report
Buchanan, W. J. (2010). AES Encryption and Decryption in Microsoft .NET

This paper outlines the usage of AES in Microsoft .NET. It provides a basic overview of the AES method, along with a review of other popular encryption methods and some sample code which can be used to implement AES.

RC2 Encryption and Decryption in Microsoft .NET. (2010)
Preprint / Working Paper
Buchanan, W. J. RC2 Encryption and Decryption in Microsoft .NET

This paper outlines the usage of RC2 in Microsoft .NET. It provides a basic overview of the RC2 method, along with a review of other popular encryption methods and some sample code which can be used to implement RC2.

Privacy-preserving data acquisition protocol. (2010)
Presentation / Conference Contribution
Kwecka, Z., Buchanan, W. J., & Spiers, D. A. (2010, July). Privacy-preserving data acquisition protocol

Current investigative data acquisition techniques often breach human and natural rights of the data subject and can jeopardize an investigation. Often the investigators need to reveal to the data controller precise details of their suspect’s identity... Read More about Privacy-preserving data acquisition protocol..

Modelling infection spread using location tracking. (2010)
Journal Article
Mason, A. M., Dingle, N. J., Knottenbelt, W. J., Bell, D., Buchanan, W. J., & Thuemmler, C. (2010). Modelling infection spread using location tracking. International Journal of Healthcare Technology and Management, 11, 442-461. https://doi.org/10.1504/IJHTM.2010.036925

The precision of location tracking technology has improved greatly over the last few decades. We aim to show that by tracking the locations of individuals in a closed environment, it is now possible to record the nature and frequency of interactions... Read More about Modelling infection spread using location tracking..

Analysis of malicious affiliate network activity as a test case for an investigatory framework. (2010)
Presentation / Conference Contribution
Miehling, M. J., Buchanan, W. J., Old, L. J., Batey, A., & Rahman, A. (2010, July). Analysis of malicious affiliate network activity as a test case for an investigatory framework

Currently there is a great deal of literature surrounding methods that can be used to de-tect click-fraud, but there is very little published work on actual cases of click-through fraud. The aim of this paper is to present the details of a real-life... Read More about Analysis of malicious affiliate network activity as a test case for an investigatory framework..

Analysis of Information governance and patient data protection within primary health care (2010)
Journal Article
Smith, M., Buchanan, W. J., Thuemmler, C., Bell, D., & Hazelhoff Roelfzema, N. (2010). Analysis of Information governance and patient data protection within primary health care. International Journal for Quality in Health Care,

The introduction of Information Governance throughout the NHS in Great Britain from 2004 onwards, saw Pri-mary Care Medicine subject to a regulatory regime aligning current practice with codes, ethics, legislation and standa... Read More about Analysis of Information governance and patient data protection within primary health care.

Information sharing framework: next generation e-Health cloud. (2010)
Presentation / Conference Contribution
Buchanan, W. J., Thuemmler, C., Fan, L., Lo, O., & Khedim, A. S. (2010). Information sharing framework: next generation e-Health cloud.

This presentation outlines the novel e-Health Cloud. See: http://www.soc.napier.ac.uk/~bill/e_presentations/healthcloud01/healthcloud01.html

An e-Health cloud. (2010)
Presentation / Conference Contribution
Buchanan, W. J., Thuemmler, C., Fan, L., Lo, O., & Khedim, A. S. (2010). An e-Health cloud.

A significant weakness within cloud-based systems is often their security. This presentation shows how a health care cloud has been created which preserves the rights of the patient to control access to their captured data, and then how this is used... Read More about An e-Health cloud..

Student perception of on-line lectures with a blended learning environment. (2010)
Presentation / Conference Contribution
Buchanan, W. J., Macfarlane, R., & Ludwiniak, R. (2010). Student perception of on-line lectures with a blended learning environment.

Educational institutions are increasingly moving towards enhancing learning through the use of integrated information technology. Blended, or augmented, learning, aims to support the traditional learning environment – where the instructor blends onli... Read More about Student perception of on-line lectures with a blended learning environment..

Interagency data exchange protocols as computational data protection law. (2010)
Presentation / Conference Contribution
Buchanan, W. J., Fan, L., Lawson, A., Schafer, B., Scott, R., Thuemmler, C., & Uthmani, O. (2010). Interagency data exchange protocols as computational data protection law.

The paper describes a collaborative project between computer scientist, police officers, medical professionals and social workers to develop a communication infrastructure that allows information sharing while observing Data Protection law “by design... Read More about Interagency data exchange protocols as computational data protection law..

Novel information sharing syntax for data sharing between police and community partners, using role-based security. (2010)
Presentation / Conference Contribution
Uthmani, O., Buchanan, W. J., Lawson, A., Thuemmler, C., Fan, L., Scott, R., …Mooney, C. (2010). Novel information sharing syntax for data sharing between police and community partners, using role-based security.

The exchange of information between the police and community partners forms a central aspect of effective community service provision. In the context of policing, a robust and timely communications mechanism is required between police agencies and co... Read More about Novel information sharing syntax for data sharing between police and community partners, using role-based security..

Towards a framework for the generation of enhanced attack/background network traffic for evaluation of network-based intrusion detection systems (2010)
Presentation / Conference Contribution
Lo, O. C. W., Graves, J. R., & Buchanan, W. J. (2010, July). Towards a framework for the generation of enhanced attack/background network traffic for evaluation of network-based intrusion detection systems. Presented at European Conference on Information Warfare and Security

There are a multitude of threats faced in computer networks such as viruses, worms, trojans, attempted user privilege gain, data theft and denial of service attacks. To combat such threats, multiple lines of defence are applied to a network including... Read More about Towards a framework for the generation of enhanced attack/background network traffic for evaluation of network-based intrusion detection systems.

Novel information sharing architecture between the Police and their community partners. (2010)
Presentation / Conference Contribution
Uthmani, O., Buchanan, W. J., & Lawson, A. (2010). Novel information sharing architecture between the Police and their community partners.

The exchange of information between the police and community partners forms a central aspect of effective community service provision. In the context of policing, a robust and timely communications mechanism is required between police agencies and co... Read More about Novel information sharing architecture between the Police and their community partners..

Application and analysis of private matching schemes based on commutative cryptosystems. (2009)
Presentation / Conference Contribution
Kwecka, Z., Buchanan, W. J., & Spiers, D. A. (2009). Application and analysis of private matching schemes based on commutative cryptosystems.

Privacy issues are becoming a key focus with software systems. Surveys show that the invasion of privacy is among the things peo-ple fear the most from the coming years. These fears seem to be justified, in the light of recent events involving the UK... Read More about Application and analysis of private matching schemes based on commutative cryptosystems..

Radio frequency identification (RFID) in pervasive healthcare (2009)
Journal Article
Fekri, A. H., Thuemmler, C., Buchanan, W., Fekri, H., & Lawson, A. (2009). Radio frequency identification (RFID) in pervasive healthcare. International Journal of Healthcare Technology and Management, 10(1/2), 119. https://doi.org/10.1504/ijhtm.2009.023731

Active and passive RFID (Radio Frequency Identification) technology are available and licensed for the use in hospitals, and can be used to establish highly reliable pervasive environments within healthcare facilities. They should not be understood a... Read More about Radio frequency identification (RFID) in pervasive healthcare.