Skip to main content

Research Repository

Advanced Search

The UK’s eHealth cloud project: EHR and the cloud: assessing the benefits and mitigating the risks. (2012)
Presentation / Conference Contribution
Buchanan, W. J., Fan, L., Ekonomou, E., Lo, O., Thuemmler, C., & Lawson, A. (2012, January). The UK’s eHealth cloud project: EHR and the cloud: assessing the benefits and mitigating the risks. Paper presented at Arab Health 2012 (Electronic Healthcare Records)

This presentation focuses on: - Using the Cloud to provide geographical flexibility and facilitate information exchange to enable the effective treatment of patients across boundaries. - How the Cloud can improve clinical workflow and provide better... Read More about The UK’s eHealth cloud project: EHR and the cloud: assessing the benefits and mitigating the risks..

New Threats (2012)
Presentation / Conference Contribution
Buchanan, W. J. (2012, January). New Threats. Paper presented at Transatlantic Conference 2012

This presentation provides an overview of some of the new threats that exist within Cyber space, especially around Hacktivism and Social Networks.

Performance and student perception evaluation of cloud-based virtualised security and digital forensics labs. (2011)
Journal Article
Buchanan, W. J., Graves, J., Bose, N., Macfarlane, R., Davison, B., & Ludwiniak, R. (2011). Performance and student perception evaluation of cloud-based virtualised security and digital forensics labs. HEA ICS Conference,

This paper focuses on the integration of virtualised environments within the teaching of computer security and digital forensics, and includes three case studies. The first case study involves assessing student perception on the usage of VMware Works... Read More about Performance and student perception evaluation of cloud-based virtualised security and digital forensics labs..

Minimising collateral damage: privacy-preserving Investigative data acquisition platform. (2011)
Journal Article
Kwecka, Z., Buchanan, W. J., & Spiers, D. A. (2011). Minimising collateral damage: privacy-preserving Investigative data acquisition platform. International Journal of Information Technologies and Systems Approach, 4, 12-31. https://doi.org/10.4018/jitsa.2011070102

Investigators define invasion of privacy during their operations as collateral damage. Inquiries that require gathering data about potential suspects from third parties, such as banks, Internet Service Providers (ISPs) or employers are likely to impa... Read More about Minimising collateral damage: privacy-preserving Investigative data acquisition platform..

Crime risk evaluation within information sharing between the Police and community partners. (2011)
Journal Article
Uthmani, O., Buchanan, W. J., Lawson, A., Scott, R., Schafer, B., & Fan, L. (2011). Crime risk evaluation within information sharing between the Police and community partners. Information and Communications Technology Law, 20, 57-81. https://doi.org/10.1080/13600834.2011.578922

The aim of this paper is to provide profiles for crimes which can be used to model the context for information sharing between the police and community partner organisations. This context can then be integrated with information-sharing syntax used by... Read More about Crime risk evaluation within information sharing between the Police and community partners..

Security and forensic computing: introduction to computer security. (2011)
Digital Artefact
Buchanan, W. J. (2011). Security and forensic computing: introduction to computer security

1 INTRODUCTION 14
1.1 The Industrial and the Information Age 14
1.2 CIA and AAA 15
1.3 Protecting against intruders 16
1.4 Users, systems and data 17
1.5 Security and Forensic Computing 19
1.6 ISO 27002 21
1.7 Risks 22
Annual Loss Expectancy... Read More about Security and forensic computing: introduction to computer security..

Multivariate Correlation Analysis Technique Based on Euclidean Distance Map for Network Traffic Characterization (2011)
Presentation / Conference Contribution
Tan, Z., Jamdagni, A., He, X., Nanda, P., & Liu, R. P. (2011, November). Multivariate Correlation Analysis Technique Based on Euclidean Distance Map for Network Traffic Characterization. Presented at 13th International Conference (ICICS 2011), Beijing, China

The quality of feature has significant impact on the performance of detection techniques used for Denial-of-Service (DoS) attack. The features that fail to provide accurate characterization for network traffic records make the techniques suffer from... Read More about Multivariate Correlation Analysis Technique Based on Euclidean Distance Map for Network Traffic Characterization.

Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis (2011)
Book Chapter
Tan, Z., Jamdagni, A., He, X., Nanda, P., & Liu, R. P. (2011). Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis. In Neural Information Processing; Lecture Notes in Computer Science (756-765). Springer. https://doi.org/10.1007/978-3-642-24965-5_85

The reliability and availability of network services are being threatened by the growing number of Denial-of-Service (DoS) attacks. Effective mechanisms for DoS attack detection are demanded. Therefore, we propose a multivariate correlation analysis... Read More about Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis.

A novel privacy preserving method for the location tracking of mobile devices (2011)
Journal Article
Buchanan, W. J., & Kwecka, Z. (2011). A novel privacy preserving method for the location tracking of mobile devices. Wireless Networks,

Two of the major changes within computing, at the present time, are the move towards serviceoriented architectures and the increasing usage of mobile devices to access these services. Along with this, as these devices are often moving, extra context... Read More about A novel privacy preserving method for the location tracking of mobile devices.

An Integrated Cloud-based Healthcare Infrastructure. (2011)
Presentation / Conference Contribution
Ekonomou, E., Fan, L., Buchanan, W. J., & Thuemmler, C. (2011, November). An Integrated Cloud-based Healthcare Infrastructure

We present a cloud-based healthcare system that integrates a formal care system (DACAR) with an informal care system (Microsoft HealthVault). The system provides high levels of security and privacy within a cloud environment, enabling sharing of both... Read More about An Integrated Cloud-based Healthcare Infrastructure..

Formal security policy implementations in network firewalls. (2011)
Journal Article
Macfarlane, R., Buchanan, W. J., Ekonomou, E., Uthmani, O., Fan, L., & Lo, O. (2012). Formal security policy implementations in network firewalls. Computers and Security, 31(2), 253-270. https://doi.org/10.1016/j.cose.2011.10.003

Network security should be based around security policies. From high-level natural language, non-technical, policies created by management, down to device and vendor specific policies, or configurations, written by network system administrators. Ther... Read More about Formal security policy implementations in network firewalls..

Creation of dynamic environments for virtualised and cloud-based teaching in digital forensics and computer security. (2011)
Presentation / Conference Contribution
Buchanan, W. J. (2011, September). Creation of dynamic environments for virtualised and cloud-based teaching in digital forensics and computer security. Paper presented at CFET: Cybercrime Forensics Education & Training

The use of virtualised and cloud-based environments provides an excellent opportunity to enhance learning and to provide students with skills which match exactly to the requirements of industry, along with integrating with professional certification.... Read More about Creation of dynamic environments for virtualised and cloud-based teaching in digital forensics and computer security..

Cloud-based e-Health System. (2011)
Presentation / Conference Contribution
Buchanan, W. J., Fan, L., Thuemmler, C., Lo, O., & Ekonomou, E. (2011, September). Cloud-based e-Health System. Paper presented at BCS Health Informatics

This paper presents the future of health care system, which uses the newly developed security infrastructure.