Skip to main content

Research Repository

Advanced Search

All Outputs (31)

An applied pattern-driven corpus to predictive analytics in mitigating SQL injection attack (2017)
Presentation / Conference Contribution
Uwagbole, S. O., Buchanan, W. J., & Fan, L. (2017). An applied pattern-driven corpus to predictive analytics in mitigating SQL injection attack. In 2017 Seventh International Conference on Emerging Security Technologies (EST),. https://doi.org/10.1109/es

Emerging computing relies heavily on secure back-end storage for the massive size of big data originating from the Internet of Things (IoT) smart devices to the Cloud-hosted web applications. Structured Query Language (SQL) Injection Attack (SQLIA) r... Read More about An applied pattern-driven corpus to predictive analytics in mitigating SQL injection attack.

Applied Machine Learning predictive analytics to SQL Injection Attack detection and prevention (2017)
Presentation / Conference Contribution
Uwagbole, S. O., Buchanan, W. J., & Fan, L. (2017). Applied Machine Learning predictive analytics to SQL Injection Attack detection and prevention. In 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM),. https://doi.org/10.23919/I

The back-end database is pivotal to the storage of the massive size of big data Internet exchanges stemming from cloud-hosted web applications to Internet of Things (IoT) smart devices. Structured Query Language (SQL) Injection Attack (SQLIA) remains... Read More about Applied Machine Learning predictive analytics to SQL Injection Attack detection and prevention.

Numerical Encoding to Tame SQL Injection Attacks (2017)
Presentation / Conference Contribution
Uwagbole, S. O., Buchanan, W. J., & Fan, L. (in press). Numerical Encoding to Tame SQL Injection Attacks.

Recent years have seen an astronomical rise in SQL Injection Attacks (SQLIAs) used to compromise the confidentiality, authentication and integrity of organisations' databases. Intruders becoming smarter in obfuscating web requests to evade detection... Read More about Numerical Encoding to Tame SQL Injection Attacks.

Applied web traffic analysis for numerical encoding of SQL Injection attack features (2016)
Presentation / Conference Contribution
Uwagbole, S., Buchanan, W., & Fan, L. (2016, July). Applied web traffic analysis for numerical encoding of SQL Injection attack features. Presented at 15th European Conference on Cyber Warfare and Security ECCWS-2016

SQL Injection Attack (SQLIA) remains a technique used by a computer network intruder to pilfer an organisation’s confidential data. This is done by an intruder re-crafting web form’s input and query strings used in web requests with malicious intent... Read More about Applied web traffic analysis for numerical encoding of SQL Injection attack features.

Numerical encoding to tame SQL injection attacks (2016)
Presentation / Conference Contribution
Uwagbole, S., Buchanan, W. J., & Fan, L. (2016, April). Numerical encoding to tame SQL injection attacks. Presented at 2ND IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies (DISSECT)

Recent years have seen an astronomical rise in SQL Injection Attacks (SQLIAs) used to compromise the confidentiality, authentication and integrity of organisations’ databases. Intruders becoming smarter in obfuscating web requests to evade detection... Read More about Numerical encoding to tame SQL injection attacks.

Secret shares to protect health records in Cloud-based infrastructures (2016)
Presentation / Conference Contribution
Buchanan, W. J., Ukwandu, E., van Deursen, N., Fan, L., Russell, G., Lo, O., & Thuemmler, C. (2016). Secret shares to protect health records in Cloud-based infrastructures. In 2015 17th International Conference on E-health Networking, Application & Servi

Increasingly health records are stored in cloud-based systems, and often protected by a private key. Unfortunately the loss of this key can cause large-scale data loss. This paper outlines a novel Cloud-based architecture (SECRET) which supports keyl... Read More about Secret shares to protect health records in Cloud-based infrastructures.

RESCUE: Resilient Secret Sharing Cloud-based Architecture. (2015)
Presentation / Conference Contribution
Ukwandu, E., Buchanan, W. J., Fan, L., Russell, G., & Lo, O. (2015, August). RESCUE: Resilient Secret Sharing Cloud-based Architecture. Presented at TrustCom 2015 The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Commu

This paper presents an architecture (RESCUE) of a system that is capable of implementing: a keyless encryption method; self-destruction of data within a time frame without user’s intervention; and break-glass data recovery, with in-built failover pro... Read More about RESCUE: Resilient Secret Sharing Cloud-based Architecture..

Modelling of integrated trust, governance and access safi.re: Information Sharing Architecture. (2013)
Presentation / Conference Contribution
Buchanan, W. J., Uthmani, O., Fan, L., Burns, N., Lo, O., Lawson, A., …Anderson, C. (2013). Modelling of integrated trust, governance and access safi.re: Information Sharing Architecture. In M. Felici (Ed.), Cyber Security and Privacy (91-101). https://

We live in a world where trust relationships are becoming ever more important. This paper outlines how an architecture which abstracts these relationships between domains, organisations and units, into a formal definition, and then implement these as... Read More about Modelling of integrated trust, governance and access safi.re: Information Sharing Architecture..

A scaleable and trusted e-Health eco-system: safi.re (2013)
Presentation / Conference Contribution
Buchanan, W. J., Burns, N., Lo, O., Lewis, R., Uthmani, O., & Fan, L. (2013, April). A scaleable and trusted e-Health eco-system: safi.re. Paper presented at Cyber Security and Privacy EU Forum 2013

At present most health and social care systems do not have extendable trust and governance. This presentation outlines the safi.re architecture which uses three main components: a trust framework; governance rules; and strong access controls. The sys... Read More about A scaleable and trusted e-Health eco-system: safi.re.

Computational data protection law: trusting each other offline and online. (2012)
Presentation / Conference Contribution
Buchanan, W. J., Fan, L., Lawson, A., Schafer, B., Scott, R., Thuemmler, C., & Uthmani, O. (2012). Computational data protection law: trusting each other offline and online. In Legal Knowledge and Information Systems; JURIX 2012 (31-40). https://doi.org/

The paper reports of a collaborative project between computer scientists, lawyers, police officers, medical professionals and social workers to develop a communication in infrastructure that allows information sharing while observing Data Protection... Read More about Computational data protection law: trusting each other offline and online..

SPoC: Protecting Patient Privacy for e-Health Services in the Cloud (2012)
Presentation / Conference Contribution
Fan, L., Buchanan, W. J., Lo, O., Thuemmler, C., Lawson, A., Uthmani, O., …Khedim, A. S. (2012). SPoC: Protecting Patient Privacy for e-Health Services in the Cloud. In eTELEMED 2012 (99-104)

The use of digital technologies in providing health care services is in general subsumed under the term e-Health. The Data Capture and Auto Identification Reference (DACAR) project provides an open e-Health service platform that reinforces the integr... Read More about SPoC: Protecting Patient Privacy for e-Health Services in the Cloud.

Technical evaluation of an e-health platform. (2012)
Presentation / Conference Contribution
Lo, O., Fan, L., Buchanan, W. J., & Thuemmler, C. (2012). Technical evaluation of an e-health platform. In M. Macedo (Ed.), Proceedings of the IADIS International Conference e-Health 2012

Methodologies for evaluation of e-Health platforms are still lacking. We propose an e-Health evaluation framework that aims to provide a concise methodology for the evaluation of e-Health platforms under three main categories: usability evaluation, l... Read More about Technical evaluation of an e-health platform..

Towards simulation of patient data for evaluation of E-health platform and services. (2012)
Presentation / Conference Contribution
Lo, O., Fan, L., Buchanan, W. J., Thuemmler, C., & Lawson, A. (2012, June). Towards simulation of patient data for evaluation of E-health platform and services. Paper presented at 13th Annual Post Graduate Symposium on the Convergence of Telecommunication

This paper presents the design and implementation of the Patient Simulator, a software application used for the simulation of patient data. The simulator aims to evaluate e- Health platforms and services in regards to efficiency, reliability, securit... Read More about Towards simulation of patient data for evaluation of E-health platform and services..

Information sharing around child protection. (2012)
Presentation / Conference Contribution
Buchanan, W. J., Uthmani, O., Lewis, R., Steyven, A., Fan, L., Thuemmler, C., …Lawson, A. (2012, June). Information sharing around child protection. Paper presented at Information Sharing in the Public Sector

Background This presentation focuses on creating a scaleable, robust and secure information architecture for social and health care. At its core is the sa.FIRE (Secure Analysis and FIltering Risk Engine) architecture, which uses SPoC (Single Point of... Read More about Information sharing around child protection..

Cloud4Health. (2012)
Presentation / Conference Contribution
Buchanan, W. J., Fan, L., Ekonomou, E., & Lo, O. (2012, May). Cloud4Health. Paper presented at Symposium on the Future of e-Health

The cloud4health platform focuses on creating a next generation infrastructure which aims to integrate assisted living with primary and secondary health care, in order to reduce patient risks. This presentation outlines how it integrates assisted liv... Read More about Cloud4Health..

Integrating assisted living with primary and secondary health care. (2012)
Presentation / Conference Contribution
Buchanan, W. J., Fan, L., Ekonomou, E., Lo, O., Uthmani, O., & Thuemmler, C. (2012, May). Integrating assisted living with primary and secondary health care. Paper presented at Data Handling in Health and Social Care: Striking the balance between confiden

This presentation outlines the Cloud4Health platform.

Cloud Forensics. (2012)
Presentation / Conference Contribution
Buchanan, W. J., Macfarlane, R., Graves, J., Fan, L., Ekonomou, E., & Bose, N. (2012, March). Cloud Forensics. Paper presented at International Seminar on Policing Digital Crime

This presentation outlines the usage of digital forensics in the Cloud.

Case Study: moving towards an e-health platform to store NHS patient Information in the cloud. (2012)
Presentation / Conference Contribution
Buchanan, W. J., Fan, L., Ekonomou, E., Lo, O., & Thuemmler, C. (2012, February). Case Study: moving towards an e-health platform to store NHS patient Information in the cloud. Paper presented at Cloud Computing in the Public Sector: The Way Forward

Case Study: Moving Towards an e-health Platform to Store NHS Patient Information in the Cloud The NHS pilot scheme to store patient information in the Cloud How can the health sector can gain greater value from its infrastructure by moving services i... Read More about Case Study: moving towards an e-health platform to store NHS patient Information in the cloud..

Patient centric health care: an integrated and secure, cloud-based, e-Health platform. (2012)
Presentation / Conference Contribution
Buchanan, W. J., Fan, L., Ekonomou, E., Lo, O., & Thuemmler, C. (2012, February). Patient centric health care: an integrated and secure, cloud-based, e-Health platform. Paper presented at BCS Branch Meeting

There are many issues related to health care infrastructure within the UK, including the lack of integration of data between the different parts of the health and social care system, and around an aging population. This presentation outlines a new Cl... Read More about Patient centric health care: an integrated and secure, cloud-based, e-Health platform..