Skip to main content

Research Repository

Advanced Search

Outputs (10)

Modelling of integrated trust, governance and access safi.re: Information Sharing Architecture. (2013)
Presentation / Conference Contribution
Buchanan, W. J., Uthmani, O., Fan, L., Burns, N., Lo, O., Lawson, A., Varga, J., & Anderson, C. (2013, April). Modelling of integrated trust, governance and access safi.re: Information Sharing Architecture. Presented at CSP 2013: Cyber Security and Privacy

We live in a world where trust relationships are becoming ever more important. This paper outlines how an architecture which abstracts these relationships between domains, organisations and units, into a formal definition, and then implement these as... Read More about Modelling of integrated trust, governance and access safi.re: Information Sharing Architecture..

Schutz der Anonymität als Gemeinschaftsaufgabe – eine neue Generation von PETs? (2013)
Presentation / Conference Contribution
Kwecka, Z., Buchanan, W. J., Schafer, B., & Rauhofer, J. (2013). Schutz der Anonymität als Gemeinschaftsaufgabe – eine neue Generation von PETs?. In INFORMATIK 2013

Technologies, der seine rechtstheoretische Motivation aus einem Verständnis der Privatsphäre als kollektivem Gut gewinnt. In diesem Modell willigen alle Mitglieder einer Gruppe in eine theoretisches Risiko ein, um gegenseitig ihre Anonymität und dami... Read More about Schutz der Anonymität als Gemeinschaftsaufgabe – eine neue Generation von PETs?.

Evaluation of binary decision diagrams for redundancy, shadowing, generalisation and correlation in an Information sharing model. (2013)
Preprint / Working Paper
Uthmani, O., Buchanan, W. J., Fan, L., & Lawson, A. Evaluation of binary decision diagrams for redundancy, shadowing, generalisation and correlation in an Information sharing model

This paper defines a structured methodology which is based on the foundational work of Al-Shaer et al. in [1] and that of Hamed and Al-Shaer in [2]. It defines a methodology for the declaration of policy field elements, through to the syntax, ontolog... Read More about Evaluation of binary decision diagrams for redundancy, shadowing, generalisation and correlation in an Information sharing model..

A novel Information sharing model using binary decision diagrams for redundancy, shadowing, generalisation and correlation. (2013)
Preprint / Working Paper
Uthmani, O., Buchanan, W. J., Fan, L., & Lawson, A. A novel Information sharing model using binary decision diagrams for redundancy, shadowing, generalisation and correlation

This paper outlines a novel information sharing method using Binary Decision Diagrams (BBDs). It is inspired by the work of Al-Shaer and Hamed, who applied BDDs into the modelling of network firewalls. This is applied into an information sharing poli... Read More about A novel Information sharing model using binary decision diagrams for redundancy, shadowing, generalisation and correlation..

Cyber risk and opportunities in the Cloud. (2013)
Presentation / Conference Contribution
Buchanan, W. J., & Smales, A. (2013, September). Cyber risk and opportunities in the Cloud. Paper presented at Cloud Security Congress 2013

This presentation outlines some of the key risks and opportunities in the Cloud.

Interagency data exchange, privacy protection and governance architecture for Information sharing across domains (2013)
Preprint / Working Paper
Buchanan, W. J., Fan, L., Uthmani, O., & Schafer, B. Interagency data exchange, privacy protection and governance architecture for Information sharing across domains

This paper discusses privacy enhancing technologies in the field of inter-agency data sharing, a key government objective for efficient public service delivery. We analyse the legal and conceptual framework that governs multi-agency cooperation in pa... Read More about Interagency data exchange, privacy protection and governance architecture for Information sharing across domains.

A scaleable and trusted e-Health eco-system: safi.re (2013)
Presentation / Conference Contribution
Buchanan, W. J., Burns, N., Lo, O., Lewis, R., Uthmani, O., & Fan, L. (2013, April). A scaleable and trusted e-Health eco-system: safi.re. Paper presented at Cyber Security and Privacy EU Forum 2013

At present most health and social care systems do not have extendable trust and governance. This presentation outlines the safi.re architecture which uses three main components: a trust framework; governance rules; and strong access controls. The sys... Read More about A scaleable and trusted e-Health eco-system: safi.re.

The challenges of Big Data: future risks, governance and trust. (2013)
Presentation / Conference Contribution
Buchanan, W. J. (2013, March). The challenges of Big Data: future risks, governance and trust. Paper presented at The Future of Cyber Security 2013

The emphasis in computer security is moving from end point security towards data controls, and this is becoming an increasing threat as we move into an era build around Big Data. This presentation thus outlines the change in emphasis of security cont... Read More about The challenges of Big Data: future risks, governance and trust..

Building a new nation: risk, goverance and trust. (2013)
Presentation / Conference Contribution
Buchanan, W. J. (2013, January). Building a new nation: risk, goverance and trust. Presented at Cyber Security 2013

This presentation outlines some of the opportunities and threats that Scotland faces within an Information Age.

Public perceptions in health care security. (2013)
Presentation / Conference Contribution
Buchanan, W. J., & Smales, A. (2013, January). Public perceptions in health care security. Paper presented at Health Informatics 2013

Over the past few years many industries have been revolutionized by the application of Information Technology, in fact, we are now moving from an Industrial Age into an Information Age, where almost every part of our lives involves some form of integ... Read More about Public perceptions in health care security..