Skip to main content

Research Repository

Advanced Search

Outputs (328)

Mobile User Authentication System for E-commerce Applications. (2014)
Presentation / Conference Contribution
Molla, R., Romdhani, I., Buchanan, W. J., & Fadel, E. Y. (2014, June). Mobile User Authentication System for E-commerce Applications. Paper presented at International Conference on Advanced Networking, Distributed Systems and Applications 2014

E-commerce applications provide on-line clients and merchants with a quick and convenient way to exchange goods and services. However, the deployment of these applications is still facing many problems such as security threats; and on-line attacks. T... Read More about Mobile User Authentication System for E-commerce Applications..

Efficient road topology based broadcast protocol for VANETs (2014)
Presentation / Conference Contribution
Al-Kubati, G., Al-Dubai, A., Mackenzie, L., & Pezaros, D. (2014). Efficient road topology based broadcast protocol for VANETs. In 2014 IEEE Wireless Communications and Networking Conference (WCNC). https://doi.org/10.1109/WCNC.2014.6952857

Intelligent Transportation Systems have been instrumental in reshaping transportation towards safer roads, seamless logistics, and digital business-oriented services under the umbrella of smart city platforms. Broadcasting transmission is an essentia... Read More about Efficient road topology based broadcast protocol for VANETs.

Specification for Generic Enablers as Software (2014)
Presentation / Conference Contribution
Brogan, J. P., & Thuemmler, C. (2014, April). Specification for Generic Enablers as Software. Presented at 2014 11th International Conference on Information Technology: New Generations

Generic Enablers are a specialism of software engineering. They are components used for providing reusable building blocks that enable the construction of applications for future internet technology. The Generic Enablers satisfy requirements of appli... Read More about Specification for Generic Enablers as Software.

Discrete Logarithms within Computer and Network Security. (2014)
Presentation / Conference Contribution
Buchanan, W. J. (2014, April). Discrete Logarithms within Computer and Network Security. Presented at Napier 400 - Numerical Algorithms and Intelligent Software Symposium

As we move into an Information Age, the requirement for computer security increases by the day, only in terms of privacy, but also in terms of proving identity and in verifying the integrity of data. Unfortunately many of the most widely used public... Read More about Discrete Logarithms within Computer and Network Security..

Embedding programming skills to support the student journey in networking, security and digital forensics. (2014)
Presentation / Conference Contribution
Lawson, A., & Macfarlane, R. (2014, April). Embedding programming skills to support the student journey in networking, security and digital forensics. Paper presented at HEA STEM Annual Learning and Teaching Conference 2014: Enhancing the STEM Student Journey

The development of programming skills by Networking graduates, and Security and Digital Forensics graduates is highly sought after by employers, both in industry, and in academia for staffing research and knowledge exchange projects. Placements offer... Read More about Embedding programming skills to support the student journey in networking, security and digital forensics..

The Risks and Opportunities of Mobile Working within Cloud Environments. (2014)
Presentation / Conference Contribution
Buchanan, W. J., & Smales, A. (2014, February). The Risks and Opportunities of Mobile Working within Cloud Environments. Paper presented at Practical Perspectives on Secure Mobile Working

This presentation outlines the changing architecture of business systems, and with the increasing use of Cloud-based systems. It outlines some of the key risks around using mobile devices for business and social uses, and define some best practice me... Read More about The Risks and Opportunities of Mobile Working within Cloud Environments..

Norms and standards in modular medical architectures. (2014)
Presentation / Conference Contribution
Fricker, S., Fiedler, M., Grottland, A., Jell, T., Magedanz, T., Thuemmler, C., Mival, O., Benyon, D., Buchanan, W. J., & Paulin, A. (2013, October). Norms and standards in modular medical architectures. Presented at 2013 IEEE 15th International Conference on e-Health Networking, Applications and Services (Healthcom 2013)

Recent Internet of Things (IoT) research has been aiming at interoperability of devices and the integration of sensor networks. The Future Internet - Private Public Partnership (FI-PPP) has created a whole array of different purpose-oriented modules... Read More about Norms and standards in modular medical architectures..

An architecture for designing Future Internet (FI) applications in sensitive domains: Expressing the software to data paradigm by utilizing hybrid cloud technology (2014)
Presentation / Conference Contribution
Sotiriadis, S., Petrakis, E. G. M., Covaci, S., Zampognaro, P., Georga, E., & Thuemmler, C. (2013, November). An architecture for designing Future Internet (FI) applications in sensitive domains: Expressing the software to data paradigm by utilizing hybrid cloud technology. Presented at 13th IEEE International Conference on BioInformatics and BioEngineering, Chania, Greece

The emergency of cloud computing and Generic Enablers (GEs) as the building blocks of Future Internet (FI) applications highlights new requirements in the area of cloud services. Though, due to the current restrictions of various certification standa... Read More about An architecture for designing Future Internet (FI) applications in sensitive domains: Expressing the software to data paradigm by utilizing hybrid cloud technology.

Creating engaging and stimulating Web based material (2014)
Presentation / Conference Contribution
Buchanan, W. J. (2014, January). Creating engaging and stimulating Web based material. Presented at LTT 2014

This presentation outlines the collaboration between Edinburgh Napier University and Bright Red Publishing

The New Enlightenment in Scotland. (2014)
Presentation / Conference Contribution
Buchanan, W. J. (2014, January). The New Enlightenment in Scotland. Paper presented at Secure Scotland

Scotland, as a nation, has been built on enterprise and innovation, and, at one time, led the world in terms of enlightenment for its scientific and cultural approach. This presentation outlines the current growth of confidence in Scotland as a place... Read More about The New Enlightenment in Scotland..

The future of computer science education and observations from on-line learning. (2014)
Presentation / Conference Contribution
Buchanan, W. J. (2014, January). The future of computer science education and observations from on-line learning. Paper presented at Higher Computing Science National Qualifications Support

This session will look at the opportunities at the present time and in the future for Computing, and provide key pointer to the skills that are required to undertake a career in related areas. Along with this Bill will outline the results of the work... Read More about The future of computer science education and observations from on-line learning..

Fast and reliable hybrid routing for vehicular ad hoc networks. (2013)
Presentation / Conference Contribution
Al-Kubati, G., Al-Dubai, A., Mackenzie, L., & Pezaros, D. (2013). Fast and reliable hybrid routing for vehicular ad hoc networks. In 13th International Conference on ITS Telecommunications (ITST) (20-25). https://doi.org/10.1109/ITST.2013.6685515

Intelligent Transportation Systems (ITSs) have been attracting tremendous attention in both academia and industry due to emerging applications that pave the way towards safer enjoyable journeys and inclusive digital partnerships. Undoubtedly, these I... Read More about Fast and reliable hybrid routing for vehicular ad hoc networks..

Modelling of integrated trust, governance and access safi.re: Information Sharing Architecture. (2013)
Presentation / Conference Contribution
Buchanan, W. J., Uthmani, O., Fan, L., Burns, N., Lo, O., Lawson, A., Varga, J., & Anderson, C. (2013, April). Modelling of integrated trust, governance and access safi.re: Information Sharing Architecture. Presented at CSP 2013: Cyber Security and Privacy

We live in a world where trust relationships are becoming ever more important. This paper outlines how an architecture which abstracts these relationships between domains, organisations and units, into a formal definition, and then implement these as... Read More about Modelling of integrated trust, governance and access safi.re: Information Sharing Architecture..

Schutz der Anonymität als Gemeinschaftsaufgabe – eine neue Generation von PETs? (2013)
Presentation / Conference Contribution
Kwecka, Z., Buchanan, W. J., Schafer, B., & Rauhofer, J. (2013). Schutz der Anonymität als Gemeinschaftsaufgabe – eine neue Generation von PETs?. In INFORMATIK 2013

Technologies, der seine rechtstheoretische Motivation aus einem Verständnis der Privatsphäre als kollektivem Gut gewinnt. In diesem Modell willigen alle Mitglieder einer Gruppe in eine theoretisches Risiko ein, um gegenseitig ihre Anonymität und dami... Read More about Schutz der Anonymität als Gemeinschaftsaufgabe – eine neue Generation von PETs?.

Experimental evaluation of disk sector hash comparison for forensic triage using a Bloom filter. (2013)
Presentation / Conference Contribution
Buchanan, W. J., Macfarlane, R., & Clayton, J. (2013, June). Experimental evaluation of disk sector hash comparison for forensic triage using a Bloom filter. Presented at Cyberforensics 2013, Cardiff, UK

There is a problem in the world of digital forensics. The demands on digital forensic investigators and resources will continue to increase as the use of computers and other electronic devices increases, and as the storage capacity of these devices i... Read More about Experimental evaluation of disk sector hash comparison for forensic triage using a Bloom filter..

Applying the Software-to-Data Paradigm in Next Generation E-Health Hybrid Clouds (2013)
Presentation / Conference Contribution
Thuemmler, C., Mueller, J., Covaci, S., Magedanz, T., de Panfilis, S., Jell, T., Schneider, A., & Gavras, A. (2013, April). Applying the Software-to-Data Paradigm in Next Generation E-Health Hybrid Clouds. Presented at 2013 10th International Conference on Information Technology: New Generations, Las Vegas, NV, USA

Health care providers have over years continuously rejected Public Cloud technology for understandable concerns regarding privacy and confidentiality. The pick up rate on cloud computing in health care has been very poor reminding at the typical hype... Read More about Applying the Software-to-Data Paradigm in Next Generation E-Health Hybrid Clouds.

Cyber risk and opportunities in the Cloud. (2013)
Presentation / Conference Contribution
Buchanan, W. J., & Smales, A. (2013, September). Cyber risk and opportunities in the Cloud. Paper presented at Cloud Security Congress 2013

This presentation outlines some of the key risks and opportunities in the Cloud.

A scaleable and trusted e-Health eco-system: safi.re (2013)
Presentation / Conference Contribution
Buchanan, W. J., Burns, N., Lo, O., Lewis, R., Uthmani, O., & Fan, L. (2013, April). A scaleable and trusted e-Health eco-system: safi.re. Paper presented at Cyber Security and Privacy EU Forum 2013

At present most health and social care systems do not have extendable trust and governance. This presentation outlines the safi.re architecture which uses three main components: a trust framework; governance rules; and strong access controls. The sys... Read More about A scaleable and trusted e-Health eco-system: safi.re.

Generation of Network Behaviour Descriptions Using MCA Based on TAM (2013)
Presentation / Conference Contribution
Tan, Z. (2013, March). Generation of Network Behaviour Descriptions Using MCA Based on TAM. Paper presented at Kaspersky Lab's 2013 Annual Student Cyber Security Conference

In this paper, a multivariate correlation analysis technique based on triangle area map is introduced. The technique is applied for network traffic characterization and provides quality network behaviour descriptors for intrusion detectors to use. Th... Read More about Generation of Network Behaviour Descriptions Using MCA Based on TAM.

The challenges of Big Data: future risks, governance and trust. (2013)
Presentation / Conference Contribution
Buchanan, W. J. (2013, March). The challenges of Big Data: future risks, governance and trust. Paper presented at The Future of Cyber Security 2013

The emphasis in computer security is moving from end point security towards data controls, and this is becoming an increasing threat as we move into an era build around Big Data. This presentation thus outlines the change in emphasis of security cont... Read More about The challenges of Big Data: future risks, governance and trust..