Skip to main content

Research Repository

Advanced Search

All Outputs (44)

Cognitive Internet of Everything (CIoE): State of the Art and Approaches (2017)
Book Chapter
Jamnal, G. S., Liu, X., Fan, L., & Ramachandran, M. (2017). Cognitive Internet of Everything (CIoE): State of the Art and Approaches. In R. Mihajlovic, M. Ramachandran, R. Behringer, & P. Kocovic (Eds.), Emerging Trends and Applications of the Internet of Things; Advances in Wireless Technologies and Telecommunication (277-309). IGI Global. https://doi.org/10.4018/978-1-5225-2437-3.ch010

In today's world, we are living in busy metropolitan cities and want our homes to be ambient intelligent enough towards our cognitive requirements for assisted living in smart space environment and an excellent smart home control system should not re... Read More about Cognitive Internet of Everything (CIoE): State of the Art and Approaches.

An applied pattern-driven corpus to predictive analytics in mitigating SQL injection attack (2017)
Conference Proceeding
Uwagbole, S. O., Buchanan, W. J., & Fan, L. (2017). An applied pattern-driven corpus to predictive analytics in mitigating SQL injection attack. In 2017 Seventh International Conference on Emerging Security Technologies (EST),. https://doi.org/10.1109/est.2017.8090392

Emerging computing relies heavily on secure back-end storage for the massive size of big data originating from the Internet of Things (IoT) smart devices to the Cloud-hosted web applications. Structured Query Language (SQL) Injection Attack (SQLIA) r... Read More about An applied pattern-driven corpus to predictive analytics in mitigating SQL injection attack.

Applied Machine Learning predictive analytics to SQL Injection Attack detection and prevention (2017)
Conference Proceeding
Uwagbole, S. O., Buchanan, W. J., & Fan, L. (2017). Applied Machine Learning predictive analytics to SQL Injection Attack detection and prevention. In 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM),. https://doi.org/10.23919/INM.2017.7987433

The back-end database is pivotal to the storage of the massive size of big data Internet exchanges stemming from cloud-hosted web applications to Internet of Things (IoT) smart devices. Structured Query Language (SQL) Injection Attack (SQLIA) remains... Read More about Applied Machine Learning predictive analytics to SQL Injection Attack detection and prevention.

Numerical Encoding to Tame SQL Injection Attacks (2017)
Conference Proceeding
Uwagbole, S. O., Buchanan, W. J., & Fan, L. (in press). Numerical Encoding to Tame SQL Injection Attacks.

Recent years have seen an astronomical rise in SQL Injection Attacks (SQLIAs) used to compromise the confidentiality, authentication and integrity of organisations' databases. Intruders becoming smarter in obfuscating web requests to evade detection... Read More about Numerical Encoding to Tame SQL Injection Attacks.

Applied web traffic analysis for numerical encoding of SQL Injection attack features (2016)
Conference Proceeding
Uwagbole, S., Buchanan, W., & Fan, L. (2016). Applied web traffic analysis for numerical encoding of SQL Injection attack features. In ECCWS-2016

SQL Injection Attack (SQLIA) remains a technique used by a computer network intruder to pilfer an organisation’s confidential data. This is done by an intruder re-crafting web form’s input and query strings used in web requests with malicious intent... Read More about Applied web traffic analysis for numerical encoding of SQL Injection attack features.

Numerical encoding to tame SQL injection attacks (2016)
Conference Proceeding
Uwagbole, S., Buchanan, W. J., & Fan, L. (2016). Numerical encoding to tame SQL injection attacks. In 2016 IEEE/IFIP Network Operations and Management Symposium (NOMS),. https://doi.org/10.1109/NOMS.2016.7502997

Recent years have seen an astronomical rise in SQL Injection Attacks (SQLIAs) used to compromise the confidentiality, authentication and integrity of organisations’ databases. Intruders becoming smarter in obfuscating web requests to evade detection... Read More about Numerical encoding to tame SQL injection attacks.

Secret shares to protect health records in Cloud-based infrastructures (2016)
Conference Proceeding
Buchanan, W. J., Ukwandu, E., van Deursen, N., Fan, L., Russell, G., Lo, O., & Thuemmler, C. (2016). Secret shares to protect health records in Cloud-based infrastructures. In 2015 17th International Conference on E-health Networking, Application & Services (HealthCom). https://doi.org/10.1109/HealthCom.2015.7454589

Increasingly health records are stored in cloud-based systems, and often protected by a private key. Unfortunately the loss of this key can cause large-scale data loss. This paper outlines a novel Cloud-based architecture (SECRET) which supports keyl... Read More about Secret shares to protect health records in Cloud-based infrastructures.

RESCUE: Resilient Secret Sharing Cloud-based Architecture. (2015)
Conference Proceeding
Ukwandu, E., Buchanan, W. J., Fan, L., Russell, G., & Lo, O. (2015). RESCUE: Resilient Secret Sharing Cloud-based Architecture. In 2015 IEEE Trustcom/BigDataSE/ISPA Vol. 1 (872-879). https://doi.org/10.1109/Trustcom.2015.459

This paper presents an architecture (RESCUE) of a system that is capable of implementing: a keyless encryption method; self-destruction of data within a time frame without user’s intervention; and break-glass data recovery, with in-built failover pro... Read More about RESCUE: Resilient Secret Sharing Cloud-based Architecture..

The future internet: a world of secret shares (2015)
Journal Article
Buchanan, W. J., Lanc, D., Ukwandu, E., Fan, L., Russell, G., & Lo, O. (2015). The future internet: a world of secret shares. Future Internet, 7(4), 445-464. https://doi.org/10.3390/fi7040445

The PKI infrastructure is crumbling, especially due to the lack of a strong understanding of how encryption actually works, and in threats around its implementation. This paper outlines an Internet storage using secret sharing methods, and which coul... Read More about The future internet: a world of secret shares.

Information sharing. (2014)
Patent
Buchanan, W. J., Fan, L., Uthmani, O., & Lawson, A. (2014). Information sharing

http://www.google.com/patents/US20140201804 The present disclosure relates to improved information sharing and in particular to formal representations of information sharing policies between organizations. An organization comprises various agents wit... Read More about Information sharing..

A novel Information sharing model using binary decision diagrams for redundancy, shadowing, generalisation and correlation. (2013)
Working Paper
Uthmani, O., Buchanan, W. J., Fan, L., & Lawson, A. A novel Information sharing model using binary decision diagrams for redundancy, shadowing, generalisation and correlation

This paper outlines a novel information sharing method using Binary Decision Diagrams (BBDs). It is inspired by the work of Al-Shaer and Hamed, who applied BDDs into the modelling of network firewalls. This is applied into an information sharing poli... Read More about A novel Information sharing model using binary decision diagrams for redundancy, shadowing, generalisation and correlation..

Conducting Performance Evaluation of an e-Health Platform (2013)
Book Chapter
Lo, O., Fan, L., Buchanan, W. J., & Thuemmler, C. (2013). Conducting Performance Evaluation of an e-Health Platform. In T. Issa, P. Isaías, & P. Kommers (Eds.), Advances in Business Information Systems and Analytics; Information Systems and Technology for Organizations in a Networked Society (295-315). IGI Global Publishing. https://doi.org/10.4018/978-1-4666-4062-7.ch016

For increased awareness and adoption of e-Health implementations, results from evaluation must be catered towards three primary perspectives: organizational, end-user and technical perspective. This chapter addresses the issue of conducting performan... Read More about Conducting Performance Evaluation of an e-Health Platform.

Modelling of integrated trust, governance and access safi.re: Information Sharing Architecture. (2013)
Conference Proceeding
Buchanan, W. J., Uthmani, O., Fan, L., Burns, N., Lo, O., Lawson, A., …Anderson, C. (2013). Modelling of integrated trust, governance and access safi.re: Information Sharing Architecture. In M. Felici (Ed.), Cyber Security and Privacy (91-101). https://doi.org/10.1007/978-3-642-41205-9_8

We live in a world where trust relationships are becoming ever more important. This paper outlines how an architecture which abstracts these relationships between domains, organisations and units, into a formal definition, and then implement these as... Read More about Modelling of integrated trust, governance and access safi.re: Information Sharing Architecture..

Evaluation of binary decision diagrams for redundancy, shadowing, generalisation and correlation in an Information sharing model. (2013)
Working Paper
Uthmani, O., Buchanan, W. J., Fan, L., & Lawson, A. Evaluation of binary decision diagrams for redundancy, shadowing, generalisation and correlation in an Information sharing model

This paper defines a structured methodology which is based on the foundational work of Al-Shaer et al. in [1] and that of Hamed and Al-Shaer in [2]. It defines a methodology for the declaration of policy field elements, through to the syntax, ontolog... Read More about Evaluation of binary decision diagrams for redundancy, shadowing, generalisation and correlation in an Information sharing model..

Interagency data exchange, privacy protection and governance architecture for Information sharing across domains (2013)
Working Paper
Buchanan, W. J., Fan, L., Uthmani, O., & Schafer, B. Interagency data exchange, privacy protection and governance architecture for Information sharing across domains

This paper discusses privacy enhancing technologies in the field of inter-agency data sharing, a key government objective for efficient public service delivery. We analyse the legal and conceptual framework that governs multi-agency cooperation in pa... Read More about Interagency data exchange, privacy protection and governance architecture for Information sharing across domains.

A scaleable and trusted e-Health eco-system: safi.re (2013)
Presentation / Conference
Buchanan, W. J., Burns, N., Lo, O., Lewis, R., Uthmani, O., & Fan, L. (2013, April). A scaleable and trusted e-Health eco-system: safi.re. Paper presented at Cyber Security and Privacy EU Forum 2013

At present most health and social care systems do not have extendable trust and governance. This presentation outlines the safi.re architecture which uses three main components: a trust framework; governance rules; and strong access controls. The sys... Read More about A scaleable and trusted e-Health eco-system: safi.re.

SPoC: Protecting Patient Privacy for e-Health Services in the Cloud (2012)
Conference Proceeding
Fan, L., Buchanan, W. J., Lo, O., Thuemmler, C., Lawson, A., Uthmani, O., …Khedim, A. S. (2012). SPoC: Protecting Patient Privacy for e-Health Services in the Cloud. In eTELEMED 2012 (99-104)

The use of digital technologies in providing health care services is in general subsumed under the term e-Health. The Data Capture and Auto Identification Reference (DACAR) project provides an open e-Health service platform that reinforces the integr... Read More about SPoC: Protecting Patient Privacy for e-Health Services in the Cloud.

Novel tracking of rogue network packets using danger theory approach (2012)
Journal Article
Uwagbole, S., Buchanan, W. J., & Fan, L. (2012). Novel tracking of rogue network packets using danger theory approach. Proceedings of the ... international conference on information warfare and security, 277-286

Recently there has been heightened, continuous, and intrusive activity by remotely located rogue hacking groups, such as Anonymous and Lulzsec. These groups often aim to disrupt computer networks and gain access to private confidential data. A typica... Read More about Novel tracking of rogue network packets using danger theory approach.

E-Health: chances and challenges of distributed, service oriented architectures (2012)
Journal Article
Thuemmler, C., Fan, L., Buchanan, W. J., Lo, O., Ekonomou, E., & Khedim, A. S. (2012). E-Health: chances and challenges of distributed, service oriented architectures. Journal of cyber security and mobility, 37,

Societies are undergoing unprecedented demographic and socio-economical changes on a pace that has never been experienced before. Health care models are in transition to remain affordable for governments and individuals. Mobile technology and cloud c... Read More about E-Health: chances and challenges of distributed, service oriented architectures.

Computational data protection law: trusting each other offline and online. (2012)
Conference Proceeding
Buchanan, W. J., Fan, L., Lawson, A., Schafer, B., Scott, R., Thuemmler, C., & Uthmani, O. (2012). Computational data protection law: trusting each other offline and online. In Legal Knowledge and Information Systems; JURIX 2012 (31-40). https://doi.org/10.3233/978-1-61499-167-0-31

The paper reports of a collaborative project between computer scientists, lawyers, police officers, medical professionals and social workers to develop a communication in infrastructure that allows information sharing while observing Data Protection... Read More about Computational data protection law: trusting each other offline and online..