Groovy Parallel Patterns: A Library to Support Parallelization
(2016)
Presentation / Conference Contribution
Kerridge, J., Chalmers, K., & Pedersen, M. (2016, June). Groovy Parallel Patterns: A Library to Support Parallelization. Paper presented at GR8Conf EU 2016, Copenhagen, Denmark
Secret shares to protect health records in Cloud-based infrastructures (2016)
Presentation / Conference Contribution
Buchanan, W. J., Ukwandu, E., van Deursen, N., Fan, L., Russell, G., Lo, O., & Thuemmler, C. (2015, October). Secret shares to protect health records in Cloud-based infrastructures. Presented at BCS Health Informatics 2015Increasingly health records are stored in cloud-based systems, and often protected by a private key. Unfortunately the loss of this key can cause large-scale data loss. This paper outlines a novel Cloud-based architecture (SECRET) which supports keyl... Read More about Secret shares to protect health records in Cloud-based infrastructures.
The Internet of Things: a security point of view. (2016)
Journal Article
Li, S., Tryfonas, T., & Li, H. (2016). The Internet of Things: a security point of view. Internet Research, 26(2), 337-359. https://doi.org/10.1108/IntR-07-2014-0173Purpose
-- To provide an in-depth overview of the security requirements and challenges for Internet of Things (IoT) and discuss security solutions for various enabling technologies and implications to various applications.
Design/methodology/approa... Read More about The Internet of Things: a security point of view..
Well-Connected: Promoting Collaboration by Effective Networking (2016)
Presentation / Conference Contribution
Robb, D. A., Methven, T. S., Padilla, S., & Chantler, M. J. (2016, February). Well-Connected: Promoting Collaboration by Effective Networking. Presented at 19th ACM Conference on Computer-Supported Cooperative Work and Social Computing, San Francisco, California, USAWe have developed a method and system that uses mutually agreed problem structuring and self-selection to bring together meeting attendees with complementary interests. The method builds upon previous tools which facilitate structuring and to these w... Read More about Well-Connected: Promoting Collaboration by Effective Networking.
Ethical Issues in Digital Health. (2015)
Book Chapter
Lim Jumelle, A. K., & Ispas, I. (2015). Ethical Issues in Digital Health. In Requirements Engineering for Digital Health (75-93). Springer. https://doi.org/10.1007/978-3-319-09798-5_4With advancement in technology and breakthrough in Internet connectivity, digital health technologies have penetrated all aspects of our lives. Hospital information systems (HIS), electronic health records (EHR), ePrescriptions, eReferrals, personal... Read More about Ethical Issues in Digital Health..
Requirements Engineering for Digital Health (2015)
Book
Fricker, S. A., Thuemmler, C., & Gavras, A. (2015). Requirements Engineering for Digital Health. Springer. https://doi.org/10.1007/978-3-319-09798-5Healthcare and well-being have captured the attention of established software companies, start-ups, and investors. Software is starting to play a central role for addressing the problems of the aging society and the escalating cost of healthcare serv... Read More about Requirements Engineering for Digital Health.
Hyperlocal Government Engagement online (2015)
Report
Cruickshank, P., & Ryan, B. (2015). Hyperlocal Government Engagement online. Edinburgh, Scotland: Communities and Culture NetworkThis report presents a seed research project funded by the CCN+, that investigated digital engagement by three neighbouring Scottish Community Councils (CCs) in a distinct area of a Scottish city. Recent work had shown that CCs generally do not use t... Read More about Hyperlocal Government Engagement online.
When amateurs do the job of a professional, the result is smart grids secured by dumb crypto. (2015)
Newspaper / Magazine
Buchanan, W. J. (2015). When amateurs do the job of a professional, the result is smart grids secured by dumb cryptoSecurity relies upon good programming and correct adherence to well-designed standards. If the standards are sloppy, then security has been compromised from the outset. Smart grids, which include the smart meters being rolled out to millions of homes... Read More about When amateurs do the job of a professional, the result is smart grids secured by dumb crypto..
US hack shows data is the new frontier in cyber security conflict. (2015)
Newspaper / Magazine
Buchanan, W. J. (2015). US hack shows data is the new frontier in cyber security conflictMore than four million personal records of US government workers are thought to have been hacked and stolen, it has been. With US investigators blaming the Chinese government (although the Chinese deny involvement), this incident shows how data could... Read More about US hack shows data is the new frontier in cyber security conflict..
Beats: Tapping Gestures for Smart Watches (2015)
Presentation / Conference Contribution
Oakley, I., Lee, D., Islam, M. R., & Esteves, A. (2015, April). Beats: Tapping Gestures for Smart Watches. Presented at Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems - CHI '15, Seoul, Republic of KoreaInteracting with smartwatches poses new challenges. Although capable of displaying complex content, their extremely small screens poorly match many of the touchscreen interaction techniques dominant on larger mobile devices. Addressing this problem,... Read More about Beats: Tapping Gestures for Smart Watches.
Roll Project Bin Packing Benchmark Problems. (2015)
Data
Hart, E., & Sim, K. (2015). Roll Project Bin Packing Benchmark Problems. [Data]. https://doi.org/10.17869/ENU.2015.9364This document describes two sets of Benchmark Problem Instances for the One Dimensional Bin Packing Problem. The problem instances are supplied as compressed (zipped) SQLITE database files.
A Dynamic Power Tuning for the Constrained Application Protocol of Internet of Things (2015)
Presentation / Conference Contribution
Qasem, M., Al-Dubai, A., Romdhani, I., & Yassien, M. B. (2015, October). A Dynamic Power Tuning for the Constrained Application Protocol of Internet of Things. Presented at 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and ComputingConstrained application protocol (CoAP) has been designed for M2M and IoT applications. The resource directory (RD) in CoAP requires periodical updates by other nodes. However, a regular update process causes extra signaling overhead and drains the n... Read More about A Dynamic Power Tuning for the Constrained Application Protocol of Internet of Things.
A Decentralized Batch-Based Group Key Management Protocol for Mobile Internet of Things (DBGK) (2015)
Presentation / Conference Contribution
Abdmeziem, M. R., Tandjaoui, D., & Romdhani, I. (2015, October). A Decentralized Batch-Based Group Key Management Protocol for Mobile Internet of Things (DBGK). Presented at 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and ComputingIt is anticipated that constrained devices in the Internet of Things (IoT) will often operate in groups to achieve collective monitoring or management tasks. For sensitive and mission-critical sensing tasks, securing multicast applications is therefo... Read More about A Decentralized Batch-Based Group Key Management Protocol for Mobile Internet of Things (DBGK).
RESCUE: Resilient Secret Sharing Cloud-based Architecture. (2015)
Presentation / Conference Contribution
Ukwandu, E., Buchanan, W. J., Fan, L., Russell, G., & Lo, O. (2015, August). RESCUE: Resilient Secret Sharing Cloud-based Architecture. Presented at TrustCom 2015 The 14th IEEE International Conference on Trust, Security and Privacy in Computing and CommunicationsThis paper presents an architecture (RESCUE) of a system that is capable of implementing: a keyless encryption method; self-destruction of data within a time frame without user’s intervention; and break-glass data recovery, with in-built failover pro... Read More about RESCUE: Resilient Secret Sharing Cloud-based Architecture..
The future internet: a world of secret shares (2015)
Journal Article
Buchanan, W. J., Lanc, D., Ukwandu, E., Fan, L., Russell, G., & Lo, O. (2015). The future internet: a world of secret shares. Future Internet, 7(4), 445-464. https://doi.org/10.3390/fi7040445The PKI infrastructure is crumbling, especially due to the lack of a strong understanding of how encryption actually works, and in threats around its implementation. This paper outlines an Internet storage using secret sharing methods, and which coul... Read More about The future internet: a world of secret shares.
Supporting the meeting journey: understanding and designing collaborative device ecologies (2015)
Presentation / Conference Contribution
Ammeloot, A. (2015, November). Supporting the meeting journey: understanding and designing collaborative device ecologies. Presented at 2015 International Conference on Interactive Tabletops & SurfacesThe combination of personal and mobile technologies (Bring Your Own Device) with technology-augmented spaces designed for collaboration offers new design challenges for the HCI community. This paper is a summary of a doctoral work-in-progress aiming... Read More about Supporting the meeting journey: understanding and designing collaborative device ecologies.
Roll Project Rich Vehicle Routing benchmark problems. (2015)
Data
Hart, E., & Sim, K. (2015). Roll Project Rich Vehicle Routing benchmark problems. [Data]. https://doi.org/10.17869/ENU.2015.9367This document describes a large set of Benchmark Problem Instances for the Rich Vehicle Routing Problem. All files are supplied as a single compressed (zipped) archive containing the instances, in XML format, an Object-Oriented Model supplied in XSD... Read More about Roll Project Rich Vehicle Routing benchmark problems..
Roll Project Job Shop scheduling benchmark problems. (2015)
Data
Hart, E., & Sim, K. (2015). Roll Project Job Shop scheduling benchmark problems. [Data]. https://doi.org/10.17869/ENU.2015.9365This document describes two sets of benchmark problem instances for the job shop scheduling problem. Each set of instances is supplied as a compressed (zipped) archive containing a single CSV file for each problem instance using the format described... Read More about Roll Project Job Shop scheduling benchmark problems..
The impact of head movements on user involvement in mediated interaction (2015)
Journal Article
Bamoallem, B. S., Wodehouse, A. J., Mair, G. M., & Vasantha, G. A. (2016). The impact of head movements on user involvement in mediated interaction. Computers in Human Behavior, 55(A), 424-431. https://doi.org/10.1016/j.chb.2015.09.016Communication takes place not only through speech, but also through gestures such as facial expressions, gaze, head movements, hand movements and body posture. Although developing rapidly, current communication platforms do not facilitate the types o... Read More about The impact of head movements on user involvement in mediated interaction.
Evaluation of TFTP DDoS amplification attack (2015)
Journal Article
Sieklik, B., Macfarlane, R., & Buchanan, W. J. (2016). Evaluation of TFTP DDoS amplification attack. Computers and Security, 57, 67-92. https://doi.org/10.1016/j.cose.2015.09.006Web threats are becoming a major issue for both governments and companies. Generally, web threats increased as much as 600% during last year (WebSense, 2013). This appears to be a significant issue, since many major businesses seem to provide these s... Read More about Evaluation of TFTP DDoS amplification attack.
Showing 61 - 80 of 500 results