Skip to main content

Research Repository

Advanced Search

Ethical Issues in Digital Health. (2015)
Book Chapter
Lim Jumelle, A. K., & Ispas, I. (2015). Ethical Issues in Digital Health. In Requirements Engineering for Digital Health (75-93). Springer. https://doi.org/10.1007/978-3-319-09798-5_4

With advancement in technology and breakthrough in Internet connectivity, digital health technologies have penetrated all aspects of our lives. Hospital information systems (HIS), electronic health records (EHR), ePrescriptions, eReferrals, personal... Read More about Ethical Issues in Digital Health..

Requirements Engineering for Digital Health (2015)
Book
Fricker, S. A., Thuemmler, C., & Gavras, A. (2015). Requirements Engineering for Digital Health. Springer. https://doi.org/10.1007/978-3-319-09798-5

Healthcare and well-being have captured the attention of established software companies, start-ups, and investors. Software is starting to play a central role for addressing the problems of the aging society and the escalating cost of healthcare serv... Read More about Requirements Engineering for Digital Health.

Hyperlocal Government Engagement online (2015)
Report
Cruickshank, P., & Ryan, B. (2015). Hyperlocal Government Engagement online. Edinburgh, Scotland: Communities and Culture Network

This report presents a seed research project funded by the CCN+, that investigated digital engagement by three neighbouring Scottish Community Councils (CCs) in a distinct area of a Scottish city. Recent work had shown that CCs generally do not use t... Read More about Hyperlocal Government Engagement online.

When amateurs do the job of a professional, the result is smart grids secured by dumb crypto. (2015)
Newspaper / Magazine
Buchanan, W. J. (2015). When amateurs do the job of a professional, the result is smart grids secured by dumb crypto

Security relies upon good programming and correct adherence to well-designed standards. If the standards are sloppy, then security has been compromised from the outset. Smart grids, which include the smart meters being rolled out to millions of homes... Read More about When amateurs do the job of a professional, the result is smart grids secured by dumb crypto..

US hack shows data is the new frontier in cyber security conflict. (2015)
Newspaper / Magazine
Buchanan, W. J. (2015). US hack shows data is the new frontier in cyber security conflict

More than four million personal records of US government workers are thought to have been hacked and stolen, it has been. With US investigators blaming the Chinese government (although the Chinese deny involvement), this incident shows how data could... Read More about US hack shows data is the new frontier in cyber security conflict..

Beats: Tapping Gestures for Smart Watches (2015)
Presentation / Conference Contribution
Oakley, I., Lee, D., Islam, M. R., & Esteves, A. (2015, April). Beats: Tapping Gestures for Smart Watches. Presented at Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems - CHI '15, Seoul, Republic of Korea

Interacting with smartwatches poses new challenges. Although capable of displaying complex content, their extremely small screens poorly match many of the touchscreen interaction techniques dominant on larger mobile devices. Addressing this problem,... Read More about Beats: Tapping Gestures for Smart Watches.

Roll Project Bin Packing Benchmark Problems. (2015)
Data
Hart, E., & Sim, K. (2015). Roll Project Bin Packing Benchmark Problems. [Data]. https://doi.org/10.17869/ENU.2015.9364

This document describes two sets of Benchmark Problem Instances for the One Dimensional Bin Packing Problem. The problem instances are supplied as compressed (zipped) SQLITE database files.

A Dynamic Power Tuning for the Constrained Application Protocol of Internet of Things (2015)
Presentation / Conference Contribution
Qasem, M., Al-Dubai, A., Romdhani, I., & Yassien, M. B. (2015, October). A Dynamic Power Tuning for the Constrained Application Protocol of Internet of Things. Presented at 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing

Constrained application protocol (CoAP) has been designed for M2M and IoT applications. The resource directory (RD) in CoAP requires periodical updates by other nodes. However, a regular update process causes extra signaling overhead and drains the n... Read More about A Dynamic Power Tuning for the Constrained Application Protocol of Internet of Things.

A Decentralized Batch-Based Group Key Management Protocol for Mobile Internet of Things (DBGK) (2015)
Presentation / Conference Contribution
Abdmeziem, M. R., Tandjaoui, D., & Romdhani, I. (2015, October). A Decentralized Batch-Based Group Key Management Protocol for Mobile Internet of Things (DBGK). Presented at 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing

It is anticipated that constrained devices in the Internet of Things (IoT) will often operate in groups to achieve collective monitoring or management tasks. For sensitive and mission-critical sensing tasks, securing multicast applications is therefo... Read More about A Decentralized Batch-Based Group Key Management Protocol for Mobile Internet of Things (DBGK).

RESCUE: Resilient Secret Sharing Cloud-based Architecture. (2015)
Presentation / Conference Contribution
Ukwandu, E., Buchanan, W. J., Fan, L., Russell, G., & Lo, O. (2015, August). RESCUE: Resilient Secret Sharing Cloud-based Architecture. Presented at TrustCom 2015 The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications

This paper presents an architecture (RESCUE) of a system that is capable of implementing: a keyless encryption method; self-destruction of data within a time frame without user’s intervention; and break-glass data recovery, with in-built failover pro... Read More about RESCUE: Resilient Secret Sharing Cloud-based Architecture..

The future internet: a world of secret shares (2015)
Journal Article
Buchanan, W. J., Lanc, D., Ukwandu, E., Fan, L., Russell, G., & Lo, O. (2015). The future internet: a world of secret shares. Future Internet, 7(4), 445-464. https://doi.org/10.3390/fi7040445

The PKI infrastructure is crumbling, especially due to the lack of a strong understanding of how encryption actually works, and in threats around its implementation. This paper outlines an Internet storage using secret sharing methods, and which coul... Read More about The future internet: a world of secret shares.

Supporting the meeting journey: understanding and designing collaborative device ecologies (2015)
Presentation / Conference Contribution
Ammeloot, A. (2015, November). Supporting the meeting journey: understanding and designing collaborative device ecologies. Presented at 2015 International Conference on Interactive Tabletops & Surfaces

The combination of personal and mobile technologies (Bring Your Own Device) with technology-augmented spaces designed for collaboration offers new design challenges for the HCI community. This paper is a summary of a doctoral work-in-progress aiming... Read More about Supporting the meeting journey: understanding and designing collaborative device ecologies.

Roll Project Rich Vehicle Routing benchmark problems. (2015)
Data
Hart, E., & Sim, K. (2015). Roll Project Rich Vehicle Routing benchmark problems. [Data]. https://doi.org/10.17869/ENU.2015.9367

This document describes a large set of Benchmark Problem Instances for the Rich Vehicle Routing Problem. All files are supplied as a single compressed (zipped) archive containing the instances, in XML format, an Object-Oriented Model supplied in XSD... Read More about Roll Project Rich Vehicle Routing benchmark problems..

Roll Project Job Shop scheduling benchmark problems. (2015)
Data
Hart, E., & Sim, K. (2015). Roll Project Job Shop scheduling benchmark problems. [Data]. https://doi.org/10.17869/ENU.2015.9365

This document describes two sets of benchmark problem instances for the job shop scheduling problem. Each set of instances is supplied as a compressed (zipped) archive containing a single CSV file for each problem instance using the format described... Read More about Roll Project Job Shop scheduling benchmark problems..

The impact of head movements on user involvement in mediated interaction (2015)
Journal Article
Bamoallem, B. S., Wodehouse, A. J., Mair, G. M., & Vasantha, G. A. (2016). The impact of head movements on user involvement in mediated interaction. Computers in Human Behavior, 55(A), 424-431. https://doi.org/10.1016/j.chb.2015.09.016

Communication takes place not only through speech, but also through gestures such as facial expressions, gaze, head movements, hand movements and body posture. Although developing rapidly, current communication platforms do not facilitate the types o... Read More about The impact of head movements on user involvement in mediated interaction.

Evaluation of TFTP DDoS amplification attack (2015)
Journal Article
Sieklik, B., Macfarlane, R., & Buchanan, W. J. (2016). Evaluation of TFTP DDoS amplification attack. Computers and Security, 57, 67-92. https://doi.org/10.1016/j.cose.2015.09.006

Web threats are becoming a major issue for both governments and companies. Generally, web threats increased as much as 600% during last year (WebSense, 2013). This appears to be a significant issue, since many major businesses seem to provide these s... Read More about Evaluation of TFTP DDoS amplification attack.

Sticky-Policy enabled authenticated OOXML for Health Care (2015)
Presentation / Conference Contribution
Spyra, G., Buchanan, W. J., & Ekonomou, E. (2015, October). Sticky-Policy enabled authenticated OOXML for Health Care. Presented at BCS Health Informatics 2015

This paper proposes a secure medical document sharing construction, which addresses confidentiality and authenticity concerns related to cloud-based data protection issues. The paper extends the popular Office Open XML (OOXML) document format with eX... Read More about Sticky-Policy enabled authenticated OOXML for Health Care.

5G-PPP White Paper on eHealth Vertical Sector (2015)
Report
Thuemmler, C., Jumelle, A. K. L., Paulin, A., Sadique, A., Schneider, A., Fedell, C., Abraham, D., Trossen, D., Strinati, E. C., Cavallo, F., Feussner, H., Hay, I., Bedo, J.-S., Micocci, S., Nunziata, S., Gallelli, T., & Covaci, S. (2015). 5G-PPP White Paper on eHealth Vertical Sector. Brussels: EU Commission

Gaston Crommenlaan 1 PO box: 101 9050 Gent Belgium www.5g-ppp.eu 5G and e-Health 1 Socioeconomic drivers of e-Health in Horizon 2020 Although socioeconomically the sector addressed by this white paper is the health sector, the detailed analysis will... Read More about 5G-PPP White Paper on eHealth Vertical Sector.

Service evolution in clouds for dementia patient monitoring system usability enhancement. (2015)
Book Chapter
Wang, Z., & Cheng, G. (2015). Service evolution in clouds for dementia patient monitoring system usability enhancement. In E-Health and Telemedicine : Concepts, Methodologies, Tools, and Applications (1606-1634). IGI Global. https://doi.org/10.4018/978-1-4666-8756-1.ch080

The authors present an analysis which concludes that most e-health system are packaged for large-scale access through cloud-based services shared in a real-time service deployment environment. The service, which has already been deployed in the cloud... Read More about Service evolution in clouds for dementia patient monitoring system usability enhancement..

ATP: Adaptive Tuning Protocol for Service Discovery in Internet of Things (2015)
Presentation / Conference Contribution
Qasem, M., Al-Dubai, A., Imed, R., & Yassien, M. B. (2015, September). ATP: Adaptive Tuning Protocol for Service Discovery in Internet of Things. Presented at Proceedings of the The International Conference on Engineering & MIS 2015 - ICEMIS '15

Energy is a precious resource in Internet of Things (IoT) especially with battery operated nodes, the overhead that consumes the battery power of the sensor nodes is a fundamental problem. This overhead is mainly caused by the frequent update message... Read More about ATP: Adaptive Tuning Protocol for Service Discovery in Internet of Things.