Skip to main content

Research Repository

Advanced Search

Prof Bill Buchanan's Outputs (400)

Public perceptions in health care security. (2013)
Presentation / Conference Contribution
Buchanan, W. J., & Smales, A. (2013, January). Public perceptions in health care security. Paper presented at Health Informatics 2013

Over the past few years many industries have been revolutionized by the application of Information Technology, in fact, we are now moving from an Industrial Age into an Information Age, where almost every part of our lives involves some form of integ... Read More about Public perceptions in health care security..

Building a new nation: risk, goverance and trust. (2013)
Presentation / Conference Contribution
Buchanan, W. J. (2013, January). Building a new nation: risk, goverance and trust. Presented at Cyber Security 2013

This presentation outlines some of the opportunities and threats that Scotland faces within an Information Age.

Future risks – Including the rise of the hacktivism. (2012)
Presentation / Conference Contribution
Buchanan, W. J. (2012, June). Future risks – Including the rise of the hacktivism. Presented at National Information Security Conference (NISC)

As organisations move towards infrastructures which are highly dependent on their Web infrastructure, they are now at great risk from external parties who can use a number of motivations, such as for a political agenda, to compromise their activities... Read More about Future risks – Including the rise of the hacktivism..

SPoC: Protecting Patient Privacy for e-Health Services in the Cloud (2012)
Presentation / Conference Contribution
Fan, L., Buchanan, W. J., Lo, O., Thuemmler, C., Lawson, A., Uthmani, O., Ekonomou, E., & Khedim, A. S. (2012, January). SPoC: Protecting Patient Privacy for e-Health Services in the Cloud

The use of digital technologies in providing health care services is in general subsumed under the term e-Health. The Data Capture and Auto Identification Reference (DACAR) project provides an open e-Health service platform that reinforces the integr... Read More about SPoC: Protecting Patient Privacy for e-Health Services in the Cloud.

Technical evaluation of an e-health platform. (2012)
Presentation / Conference Contribution
Lo, O., Fan, L., Buchanan, W. J., & Thuemmler, C. (2012, July). Technical evaluation of an e-health platform. Presented at IADIS International Conference e-Health 2012

Methodologies for evaluation of e-Health platforms are still lacking. We propose an e-Health evaluation framework that aims to provide a concise methodology for the evaluation of e-Health platforms under three main categories: usability evaluation, l... Read More about Technical evaluation of an e-health platform..

E-Health: chances and challenges of distributed, service oriented architectures (2012)
Journal Article
Thuemmler, C., Fan, L., Buchanan, W. J., Lo, O., Ekonomou, E., & Khedim, A. S. (2012). E-Health: chances and challenges of distributed, service oriented architectures. Journal of cyber security and mobility, 37,

Societies are undergoing unprecedented demographic and socio-economical changes on a pace that has never been experienced before. Health care models are in transition to remain affordable for governments and individuals. Mobile technology and cloud c... Read More about E-Health: chances and challenges of distributed, service oriented architectures.

Novel tracking of rogue network packets using danger theory approach (2012)
Journal Article
Uwagbole, S., Buchanan, W. J., & Fan, L. (2012). Novel tracking of rogue network packets using danger theory approach. Proceedings of the ... international conference on information warfare and security, 277-286

Recently there has been heightened, continuous, and intrusive activity by remotely located rogue hacking groups, such as Anonymous and Lulzsec. These groups often aim to disrupt computer networks and gain access to private confidential data. A typica... Read More about Novel tracking of rogue network packets using danger theory approach.

Computational data protection law: trusting each other offline and online (2012)
Presentation / Conference Contribution
Buchanan, W. J., Fan, L., Lawson, A., Schafer, B., Scott, R., Thuemmler, C., & Uthmani, O. (2012, December). Computational data protection law: trusting each other offline and online

The paper reports of a collaborative project between computer scientists, lawyers, police officers, medical professionals and social workers to develop a communication in infrastructure that allows information sharing while observing Data Protection... Read More about Computational data protection law: trusting each other offline and online.

A new efficient distributed route discovery for wireless mobile ad hoc networks. (2012)
Presentation / Conference Contribution
Bani Khalaf, M., Al-Dubai, A., & Buchanan, W. J. (2012, April). A new efficient distributed route discovery for wireless mobile ad hoc networks. Presented at Wireless Telecommunications Symposium (WTS), 2012

High performance group communication, such as broadcast, requires matching efficient broadcast algorithms to effective route discovery approach. Broadcast communication in MANETs is essential for a wide range of important applications. Nevertheless,... Read More about A new efficient distributed route discovery for wireless mobile ad hoc networks..

Towards simulation of patient data for evaluation of E-health platform and services. (2012)
Presentation / Conference Contribution
Lo, O., Fan, L., Buchanan, W. J., Thuemmler, C., & Lawson, A. (2012, June). Towards simulation of patient data for evaluation of E-health platform and services. Paper presented at 13th Annual Post Graduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting

This paper presents the design and implementation of the Patient Simulator, a software application used for the simulation of patient data. The simulator aims to evaluate e- Health platforms and services in regards to efficiency, reliability, securit... Read More about Towards simulation of patient data for evaluation of E-health platform and services..

Training the next generation. (2012)
Presentation / Conference Contribution
Buchanan, W. J. (2012, June). Training the next generation

This presentation outlines how cloud infrastructures could be used to deliver the in-depth skills required for a cyber professional.

Innovation in cloud environments. (2012)
Presentation / Conference Contribution
Buchanan, W. J. (2012, June). Innovation in cloud environments. Paper presented at Future of Technology

This presentation outlines the future of technology.

Introducing Cloud-based virtualised environments and their use in supporting learning and teaching. (2012)
Presentation / Conference Contribution
Buchanan, W. J. (2012, June). Introducing Cloud-based virtualised environments and their use in supporting learning and teaching. Paper presented at Enhancing, extending and empowering student learning within online environments

There is a major challenge faced in running distance and blended learning modules, especially in giving students an equivalent learning environment than to face-to-face students. To overcome this problem, a number of modules have been run within 2011... Read More about Introducing Cloud-based virtualised environments and their use in supporting learning and teaching..

Information sharing around child protection. (2012)
Presentation / Conference Contribution
Buchanan, W. J., Uthmani, O., Lewis, R., Steyven, A., Fan, L., Thuemmler, C., Ekonomou, E., Lo, O., & Lawson, A. (2012, June). Information sharing around child protection. Paper presented at Information Sharing in the Public Sector

Background This presentation focuses on creating a scaleable, robust and secure information architecture for social and health care. At its core is the sa.FIRE (Secure Analysis and FIltering Risk Engine) architecture, which uses SPoC (Single Point of... Read More about Information sharing around child protection..

Education & training for future threats. (2012)
Presentation / Conference Contribution
Buchanan, W. J. (2012, May). Education & training for future threats. Paper presented at ITEC 2012

This presentation gives an outline of the aspects for virtualised training for security and cybercrime.

Cloud4Health. (2012)
Presentation / Conference Contribution
Buchanan, W. J., Fan, L., Ekonomou, E., & Lo, O. (2012, May). Cloud4Health. Paper presented at Symposium on the Future of e-Health

The cloud4health platform focuses on creating a next generation infrastructure which aims to integrate assisted living with primary and secondary health care, in order to reduce patient risks. This presentation outlines how it integrates assisted liv... Read More about Cloud4Health..

Integrating assisted living with primary and secondary health care. (2012)
Presentation / Conference Contribution
Buchanan, W. J., Fan, L., Ekonomou, E., Lo, O., Uthmani, O., & Thuemmler, C. (2012, May). Integrating assisted living with primary and secondary health care. Paper presented at Data Handling in Health and Social Care: Striking the balance between confidentiality, security and information sharing

This presentation outlines the Cloud4Health platform.