Skip to main content

Research Repository

Advanced Search

All Outputs (19)

Information sharing. (2014)
Patent
Buchanan, W. J., Fan, L., Uthmani, O., & Lawson, A. (2014). Information sharing

http://www.google.com/patents/US20140201804 The present disclosure relates to improved information sharing and in particular to formal representations of information sharing policies between organizations. An organization comprises various agents wit... Read More about Information sharing..

Modelling of integrated trust, governance and access safi.re: Information Sharing Architecture. (2013)
Conference Proceeding
Buchanan, W. J., Uthmani, O., Fan, L., Burns, N., Lo, O., Lawson, A., …Anderson, C. (2013). Modelling of integrated trust, governance and access safi.re: Information Sharing Architecture. In M. Felici (Ed.), Cyber Security and Privacy (91-101). https://doi.org/10.1007/978-3-642-41205-9_8

We live in a world where trust relationships are becoming ever more important. This paper outlines how an architecture which abstracts these relationships between domains, organisations and units, into a formal definition, and then implement these as... Read More about Modelling of integrated trust, governance and access safi.re: Information Sharing Architecture..

Evaluation of binary decision diagrams for redundancy, shadowing, generalisation and correlation in an Information sharing model. (2013)
Working Paper
Uthmani, O., Buchanan, W. J., Fan, L., & Lawson, A. Evaluation of binary decision diagrams for redundancy, shadowing, generalisation and correlation in an Information sharing model

This paper defines a structured methodology which is based on the foundational work of Al-Shaer et al. in [1] and that of Hamed and Al-Shaer in [2]. It defines a methodology for the declaration of policy field elements, through to the syntax, ontolog... Read More about Evaluation of binary decision diagrams for redundancy, shadowing, generalisation and correlation in an Information sharing model..

A novel Information sharing model using binary decision diagrams for redundancy, shadowing, generalisation and correlation. (2013)
Working Paper
Uthmani, O., Buchanan, W. J., Fan, L., & Lawson, A. A novel Information sharing model using binary decision diagrams for redundancy, shadowing, generalisation and correlation

This paper outlines a novel information sharing method using Binary Decision Diagrams (BBDs). It is inspired by the work of Al-Shaer and Hamed, who applied BDDs into the modelling of network firewalls. This is applied into an information sharing poli... Read More about A novel Information sharing model using binary decision diagrams for redundancy, shadowing, generalisation and correlation..

Interagency data exchange, privacy protection and governance architecture for Information sharing across domains (2013)
Working Paper
Buchanan, W. J., Fan, L., Uthmani, O., & Schafer, B. Interagency data exchange, privacy protection and governance architecture for Information sharing across domains

This paper discusses privacy enhancing technologies in the field of inter-agency data sharing, a key government objective for efficient public service delivery. We analyse the legal and conceptual framework that governs multi-agency cooperation in pa... Read More about Interagency data exchange, privacy protection and governance architecture for Information sharing across domains.

A scaleable and trusted e-Health eco-system: safi.re (2013)
Presentation / Conference
Buchanan, W. J., Burns, N., Lo, O., Lewis, R., Uthmani, O., & Fan, L. (2013, April). A scaleable and trusted e-Health eco-system: safi.re. Paper presented at Cyber Security and Privacy EU Forum 2013

At present most health and social care systems do not have extendable trust and governance. This presentation outlines the safi.re architecture which uses three main components: a trust framework; governance rules; and strong access controls. The sys... Read More about A scaleable and trusted e-Health eco-system: safi.re.

Computational data protection law: trusting each other offline and online. (2012)
Conference Proceeding
Buchanan, W. J., Fan, L., Lawson, A., Schafer, B., Scott, R., Thuemmler, C., & Uthmani, O. (2012). Computational data protection law: trusting each other offline and online. In Legal Knowledge and Information Systems; JURIX 2012 (31-40). https://doi.org/10.3233/978-1-61499-167-0-31

The paper reports of a collaborative project between computer scientists, lawyers, police officers, medical professionals and social workers to develop a communication in infrastructure that allows information sharing while observing Data Protection... Read More about Computational data protection law: trusting each other offline and online..

SPoC: Protecting Patient Privacy for e-Health Services in the Cloud (2012)
Conference Proceeding
Fan, L., Buchanan, W. J., Lo, O., Thuemmler, C., Lawson, A., Uthmani, O., …Khedim, A. S. (2012). SPoC: Protecting Patient Privacy for e-Health Services in the Cloud. In eTELEMED 2012 (99-104)

The use of digital technologies in providing health care services is in general subsumed under the term e-Health. The Data Capture and Auto Identification Reference (DACAR) project provides an open e-Health service platform that reinforces the integr... Read More about SPoC: Protecting Patient Privacy for e-Health Services in the Cloud.

Information sharing around child protection. (2012)
Presentation / Conference
Buchanan, W. J., Uthmani, O., Lewis, R., Steyven, A., Fan, L., Thuemmler, C., …Lawson, A. (2012, June). Information sharing around child protection. Paper presented at Information Sharing in the Public Sector

Background This presentation focuses on creating a scaleable, robust and secure information architecture for social and health care. At its core is the sa.FIRE (Secure Analysis and FIltering Risk Engine) architecture, which uses SPoC (Single Point of... Read More about Information sharing around child protection..

Integrating assisted living with primary and secondary health care. (2012)
Presentation / Conference
Buchanan, W. J., Fan, L., Ekonomou, E., Lo, O., Uthmani, O., & Thuemmler, C. (2012, May). Integrating assisted living with primary and secondary health care. Paper presented at Data Handling in Health and Social Care: Striking the balance between confidentiality, security and information sharing

This presentation outlines the Cloud4Health platform.

DACAR platform for eHealth services cloud. (2011)
Conference Proceeding
Fan, L., Buchanan, W. J., Thuemmler, C., Lo, O., Khedim, A. S., Uthmani, O., …Bell, D. (2011). DACAR platform for eHealth services cloud. . https://doi.org/10.1109/CLOUD.2011.31

The use of digital technologies in providing health care services is collectively known as eHealth. Considerable progress has been made in the development of eHealth services, but concerns over service integration, large scale deployment, and securit... Read More about DACAR platform for eHealth services cloud..

Crime risk evaluation within information sharing between the Police and community partners. (2011)
Journal Article
Uthmani, O., Buchanan, W. J., Lawson, A., Scott, R., Schafer, B., & Fan, L. (2011). Crime risk evaluation within information sharing between the Police and community partners. Information and Communications Technology Law, 20, 57-81. https://doi.org/10.1080/13600834.2011.578922

The aim of this paper is to provide profiles for crimes which can be used to model the context for information sharing between the police and community partner organisations. This context can then be integrated with information-sharing syntax used by... Read More about Crime risk evaluation within information sharing between the Police and community partners..

Formal security policy implementations in network firewalls. (2011)
Journal Article
Macfarlane, R., Buchanan, W. J., Ekonomou, E., Uthmani, O., Fan, L., & Lo, O. (2012). Formal security policy implementations in network firewalls. Computers and Security, 31(2), 253-270. https://doi.org/10.1016/j.cose.2011.10.003

Network security should be based around security policies. From high-level natural language, non-technical, policies created by management, down to device and vendor specific policies, or configurations, written by network system administrators. Ther... Read More about Formal security policy implementations in network firewalls..

Risk analysis for criminal context in information sharing policies. (2011)
Presentation / Conference
Uthmani, O., Buchanan, W. J., & Lawson, A. (2011, August). Risk analysis for criminal context in information sharing policies. Paper presented at SCONE - the Scottish Networking event

This presentation outlines of a novel system which maps the information sharing between two domains. It involves the definition of a formalized information sharing policy, which maps the organisation infrastructure which is exposed for the sharing be... Read More about Risk analysis for criminal context in information sharing policies..

Intelligence information sharing between the police and their community partners. (2011)
Presentation / Conference
Scott, R., Uthmani, O., Buchanan, W. J., & Lawson, A. (2011, June). Intelligence information sharing between the police and their community partners. Paper presented at Symposium on Security and Cybercrime

This presentation will show a newly developed system for information, and will outline the three "R"s involved in information sharing: RISK. Identify and managing risks to ensure a balanced approach to operational management and organisational develo... Read More about Intelligence information sharing between the police and their community partners..

Interagency data exchange protocols as computational data protection law. (2010)
Conference Proceeding
Buchanan, W. J., Fan, L., Lawson, A., Schafer, B., Scott, R., Thuemmler, C., & Uthmani, O. (2010). Interagency data exchange protocols as computational data protection law.

The paper describes a collaborative project between computer scientist, police officers, medical professionals and social workers to develop a communication infrastructure that allows information sharing while observing Data Protection law “by design... Read More about Interagency data exchange protocols as computational data protection law..

Novel information sharing syntax for data sharing between police and community partners, using role-based security. (2010)
Conference Proceeding
Uthmani, O., Buchanan, W. J., Lawson, A., Thuemmler, C., Fan, L., Scott, R., …Mooney, C. (2010). Novel information sharing syntax for data sharing between police and community partners, using role-based security.

The exchange of information between the police and community partners forms a central aspect of effective community service provision. In the context of policing, a robust and timely communications mechanism is required between police agencies and co... Read More about Novel information sharing syntax for data sharing between police and community partners, using role-based security..

Novel information sharing architecture between the Police and their community partners. (2010)
Conference Proceeding
Uthmani, O., Buchanan, W. J., & Lawson, A. (2010). Novel information sharing architecture between the Police and their community partners.

The exchange of information between the police and community partners forms a central aspect of effective community service provision. In the context of policing, a robust and timely communications mechanism is required between police agencies and co... Read More about Novel information sharing architecture between the Police and their community partners..

Who would you trust to identify you in accessing your health record?
Presentation / Conference
Buchanan, W. J., Anderson, C., Smales, A., Varga, J., Burns, N., Uthmani, O., …Lawson, A. Who would you trust to identify you in accessing your health record?

Within health and social care there is a strong need to provide access to highly sensitive information, and one which requires high levels of identity assurance. This paper outlines a joint project between Edinburgh Napier University and miiCard [10]... Read More about Who would you trust to identify you in accessing your health record?.