Skip to main content

Research Repository

Advanced Search

Outputs (682)

A next generation Cloud-based health care platform. (2011)
Presentation / Conference Contribution
Buchanan, W. J. (2011, May). A next generation Cloud-based health care platform. Paper presented at Innovation in Healthcare

This presentation outlines a novel Cloud-based e-Health Platform which integrates security within every single transaction. It involves a TSB/EPSRC funded project with Edinburgh Napier University, Chelsea and Westminster Hospital, and a number of col... Read More about A next generation Cloud-based health care platform..

Cloud-based e-Health System. (2011)
Presentation / Conference Contribution
Buchanan, W. J., Fan, L., Thuemmler, C., Lo, O., & Ekonomou, E. (2011, September). Cloud-based e-Health System. Paper presented at BCS Health Informatics

This paper presents the future of health care system, which uses the newly developed security infrastructure.

D-FET – A community cloud for enhancing skills using virtualised environments and cloud-based infrastructures. (2011)
Presentation / Conference Contribution
Buchanan, W. J., & Macfarlane, R. (2011, June). D-FET – A community cloud for enhancing skills using virtualised environments and cloud-based infrastructures. Paper presented at Scottish Higher Education Employability Conference: Strengthening Partnerships with Employers

The use of virtualised and cloud-based environments provide an excellent opportunity to enhance learning and to provide students with skills which match exactly to the requirements of industry, along with integrating with professional certification.... Read More about D-FET – A community cloud for enhancing skills using virtualised environments and cloud-based infrastructures..

Cloud-based digital forensics evaluation test (D-FET) platform. (2011)
Presentation / Conference Contribution
Buchanan, W. J., Macfarlane, R., Flandrin, F., Graves, J., Fan, L., Ekonomou, E., …Ludwiniak, R. (2011, June). Cloud-based digital forensics evaluation test (D-FET) platform. Paper presented at Cyberforensics 2011

This paper outlines the specification of the Cloud-based DFET platform which is used to evaluate the performance of digital forensics tools, which aim to detect the presence of trails of evidence, such as for the presence of illicit images and determ... Read More about Cloud-based digital forensics evaluation test (D-FET) platform..

An Integrated Cloud-based Healthcare Infrastructure. (2011)
Presentation / Conference Contribution
Ekonomou, E., Fan, L., Buchanan, W. J., & Thuemmler, C. (2011, November). An Integrated Cloud-based Healthcare Infrastructure

We present a cloud-based healthcare system that integrates a formal care system (DACAR) with an informal care system (Microsoft HealthVault). The system provides high levels of security and privacy within a cloud environment, enabling sharing of both... Read More about An Integrated Cloud-based Healthcare Infrastructure..

A comparative review of information security risk assessment methodologies for health care. (2011)
Presentation / Conference Contribution
Hazelhoff Roelfzema, N. (2011, March). A comparative review of information security risk assessment methodologies for health care. Paper presented at IADIS e-Society

Health care organizations face major compliance challenges as they need to secure patient information. An important compliance requirement is the performance of regular risk assessments and the implementation of controls to secure data. In theory, an... Read More about A comparative review of information security risk assessment methodologies for health care..

Student project performance management system for effective final year and dissertation projects supervision. (2011)
Presentation / Conference Contribution
Romdhani, I., Tawse, M., & Habibullah, S. (2011, November). Student project performance management system for effective final year and dissertation projects supervision. Paper presented at London International Conference on Education LICE-2011

This paper presents the features of a new integrated and collaborative online supervision system for final year and dissertation projects. The system is currently under development and it aims to ease the supervision process, federate the tasks of al... Read More about Student project performance management system for effective final year and dissertation projects supervision..

Intelligence information sharing between the police and their community partners. (2011)
Presentation / Conference Contribution
Scott, R., Uthmani, O., Buchanan, W. J., & Lawson, A. (2011, June). Intelligence information sharing between the police and their community partners. Paper presented at Symposium on Security and Cybercrime

This presentation will show a newly developed system for information, and will outline the three "R"s involved in information sharing: RISK. Identify and managing risks to ensure a balanced approach to operational management and organisational develo... Read More about Intelligence information sharing between the police and their community partners..

Risk analysis for criminal context in information sharing policies. (2011)
Presentation / Conference Contribution
Uthmani, O., Buchanan, W. J., & Lawson, A. (2011, August). Risk analysis for criminal context in information sharing policies. Paper presented at SCONE - the Scottish Networking event

This presentation outlines of a novel system which maps the information sharing between two domains. It involves the definition of a formalized information sharing policy, which maps the organisation infrastructure which is exposed for the sharing be... Read More about Risk analysis for criminal context in information sharing policies..

An evaluation of the power consumption and carbon footprint of a cloud infrastructure (2010)
Thesis
Yampolsky, V. (2010). An evaluation of the power consumption and carbon footprint of a cloud infrastructure. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/3973

The Information and Communication Technology (ICT) sector represent two to three percents of the world energy consumption and about the same percentage of GreenHouse Gas(GHG) emission. Moreover the IT-related costs represent fifty per-cents of the el... Read More about An evaluation of the power consumption and carbon footprint of a cloud infrastructure.

3DES Encryption and Decryption in Microsoft .NET. (2010)
Report
Buchanan, W. J. (2010). 3DES Encryption and Decryption in Microsoft .NET

This paper outlines the usage of 3DES in Microsoft .NET. It provides a basic overview of the 3-DES method, along with a review of other popular encryption methods and some sample code which can be used to implement 3DES.

AES Encryption and Decryption in Microsoft .NET. (2010)
Report
Buchanan, W. J. (2010). AES Encryption and Decryption in Microsoft .NET

This paper outlines the usage of AES in Microsoft .NET. It provides a basic overview of the AES method, along with a review of other popular encryption methods and some sample code which can be used to implement AES.

Advanced security and network forensics: network forensics. (2011)
Other
Buchanan, W. J. (2011). Advanced security and network forensics: network forensics. [Educational toolkit]. Edinburgh Napier University

3 NETWORK FORENSICS 3.1 Objectives 3.2 Introduction 3.3 The key protocols 3.4 Ethernet, IP and TCP headers 3.5 TCP connection 3.6 ARP 3.7 SYN 3.8 Application Layer Analysis - FTP 3.9 ICMP 3.10 DNS 3.11 Port scan 3.12 SYN flood... Read More about Advanced security and network forensics: network forensics..

Advanced security and network forensics: obfuscation and data hiding. (2011)
Other
Buchanan, W. J. (2011). Advanced security and network forensics: obfuscation and data hiding. [Educational resource]. Edinburgh Napier University

4 DATA HIDING AND OBFUSCATION 4.1 Objectives 4.2 Introduction 4.3 Obfuscation using Encryption Private-key data hiding Public-key data hiding Hashing Encoding Ex-OR encoding Coding 4.4 Obfuscation through tunneling 4.5 Covert ch... Read More about Advanced security and network forensics: obfuscation and data hiding..

Advanced security and network forensics: web Infrastructures. (2011)
Other
Buchanan, W. J. (2011). Advanced security and network forensics: web Infrastructures. [Educational Resource]. Edinburgh Napier University

5 WEB INFRASTRUCTURES 5.1 Objectives 5.2 Introduction 5.3 Identity 2.0 5.4 SOAP over HTTP 5.5 LDAP X.500 5.6 Authentication Infrastructures 5.7 802.1x Authentication Infrastructure Authentication techniques Security weaknesses of... Read More about Advanced security and network forensics: web Infrastructures..

RC2 Encryption and Decryption in Microsoft .NET. (2010)
Preprint / Working Paper
Buchanan, W. J. RC2 Encryption and Decryption in Microsoft .NET

This paper outlines the usage of RC2 in Microsoft .NET. It provides a basic overview of the RC2 method, along with a review of other popular encryption methods and some sample code which can be used to implement RC2.