Skip to main content

Research Repository

Advanced Search

Outputs (38)

Secret shares to protect health records in Cloud-based infrastructures (2016)
Presentation / Conference Contribution
Buchanan, W. J., Ukwandu, E., van Deursen, N., Fan, L., Russell, G., Lo, O., & Thuemmler, C. (2015, October). Secret shares to protect health records in Cloud-based infrastructures. Presented at BCS Health Informatics 2015

Increasingly health records are stored in cloud-based systems, and often protected by a private key. Unfortunately the loss of this key can cause large-scale data loss. This paper outlines a novel Cloud-based architecture (SECRET) which supports keyl... Read More about Secret shares to protect health records in Cloud-based infrastructures.

RESCUE: Resilient Secret Sharing Cloud-based Architecture. (2015)
Presentation / Conference Contribution
Ukwandu, E., Buchanan, W. J., Fan, L., Russell, G., & Lo, O. (2015, August). RESCUE: Resilient Secret Sharing Cloud-based Architecture. Presented at TrustCom 2015 The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications

This paper presents an architecture (RESCUE) of a system that is capable of implementing: a keyless encryption method; self-destruction of data within a time frame without user’s intervention; and break-glass data recovery, with in-built failover pro... Read More about RESCUE: Resilient Secret Sharing Cloud-based Architecture..

The future internet: a world of secret shares (2015)
Journal Article
Buchanan, W. J., Lanc, D., Ukwandu, E., Fan, L., Russell, G., & Lo, O. (2015). The future internet: a world of secret shares. Future Internet, 7(4), 445-464. https://doi.org/10.3390/fi7040445

The PKI infrastructure is crumbling, especially due to the lack of a strong understanding of how encryption actually works, and in threats around its implementation. This paper outlines an Internet storage using secret sharing methods, and which coul... Read More about The future internet: a world of secret shares.

Real-time monitoring of privacy abuses and intrusion detection in android system (2015)
Presentation / Conference Contribution
Li, S., Chen, J., Spyridopoulos, T., Andriotis, P., Ludwiniak, R., & Russell, G. (2015, August). Real-time monitoring of privacy abuses and intrusion detection in android system. Presented at International Conference on Human Aspects of Information Security, Privacy, and Trust, Los Angeles, CA, USA

In this paper, we investigated the definition of privacy, privacy abuse behaviours, and the privacy abuse in Android systems, which may be very useful for identifying the malicious apps from 'normal' apps. We also investigated the injection technolog... Read More about Real-time monitoring of privacy abuses and intrusion detection in android system.

Teaching penetration and malware analysis in a cloud-based environment. (2015)
Presentation / Conference Contribution
Buchanan, W. J., Ramsay, B., Macfarlane, R., Smales, A., & Russell, G. (2015, June). Teaching penetration and malware analysis in a cloud-based environment. Paper presented at UK Workshop on Cybersecurity Training & Education

This paper outlines evaluation of running a private Cloud-based system over two semesters at Edinburgh Napier University for two modules: Security Testing and Advanced Network Forensics (BEng (Hons) level and focused on Penetration testing and Malwar... Read More about Teaching penetration and malware analysis in a cloud-based environment..

Security issues of a publicly accessible cloud computing infrastructure. (2012)
Presentation / Conference Contribution
Russell, G., & Macfarlane, R. (2012, June). Security issues of a publicly accessible cloud computing infrastructure

Edinburgh Napier University runs a custom cloud computing infrastructure for both student and public use. Such access carries dangers, both reputational and legal, as accidental or deliberate acts by users can be dangerous to other systems. This pape... Read More about Security issues of a publicly accessible cloud computing infrastructure..

A forensic image description language for generating test images. (2012)
Presentation / Conference Contribution
Russell, G., Macfarlane, R., & Ludwiniak, R. (2012, September). A forensic image description language for generating test images

Digital Forensics is a fast developing job market, as well as being topical and interesting, and as such is an area in which University students are keen to develop and study. At Edinburgh Napier University this topic has been taught with flexible an... Read More about A forensic image description language for generating test images..

Creation of an online virtual Cisco router learning environment. (2011)
Presentation / Conference Contribution
Rietsche, R., Russell, G., & Karduck, A. P. (2011, July). Creation of an online virtual Cisco router learning environment. Presented at Computers and Advanced Technology in Education

Online learning environments are an important aspect to many University courses. They allow flexibility in student approaches, and permit students from a range of backgrounds to take part in education. This paper considers an online learning environm... Read More about Creation of an online virtual Cisco router learning environment..

Student behaviour in a flexible learning course framework. (2011)
Presentation / Conference Contribution
Russell, G., & Cumming, A. (2011, July). Student behaviour in a flexible learning course framework

Flexible learning approaches to education are important in modern Universities. Students should be able to choose how they will study their courses, and educators should be prepared to support students in their choices, and guide students to employ s... Read More about Student behaviour in a flexible learning course framework..

A universal character model and ontology of defined terms for taxonomic description. (2004)
Presentation / Conference Contribution
Paterson, T., Kennedy, J., Pullan, M. R., Cannon, A., Armstrong, K. E., Watson, M. F., Raguenaud, C., McDonald, S. M., & Russell, G. (2004, March). A universal character model and ontology of defined terms for taxonomic description. Presented at Data Integration in the Life Sciences. First International Workshop, DILS 2004

Taxonomists classify biological specimens into groups (taxa) on the basis of similarities between their observed features (characters). The description of these characters is therefore central to taxonomy, but there is currently no agreed model, defi... Read More about A universal character model and ontology of defined terms for taxonomic description..

A methodology for composing well-defined character descriptions. (2003)
Report
Paterson, T., Cannon, A., Raguenaud, C., Russell, G., Armstrong, K. E., MacDonald, S. M., Pullan, M. R., Watson, M. F., & Kennedy, J. (2003). A methodology for composing well-defined character descriptions

Taxonomy has been described as “the science of documenting biodiversity”, which involves collecting, naming, describing, identifying and classifying specimens of organisms (Keogh, 1995). Descriptions are the fundamental information units used in the... Read More about A methodology for composing well-defined character descriptions..

The Prometheus II Description Model: an objective approach to representing taxonomic descriptions (2002)
Preprint / Working Paper
MacDonald, S. M., Raguenaud, C., Pullan, M. R., Kennedy, J., Russell, G., & Watson, M. F. The Prometheus II Description Model: an objective approach to representing taxonomic descriptions

A model for improving the storage and communication of plant descriptions is presented. The model is flexible and yet reduces the ambiguity often present in text descriptions. The fundamental idea behind the model is the necessity for clear represent... Read More about The Prometheus II Description Model: an objective approach to representing taxonomic descriptions.

Multiple traffic signal control using a genetic algorithm (1999)
Presentation / Conference Contribution
Kalganova, T., Russell, G., & Cumming, A. (1999, December). Multiple traffic signal control using a genetic algorithm. Presented at 4th International Conference on Artificial Neural Networks and Genetic Algorithms, ICANNGA '99

Optimising traffic signal timings for a multiple-junction road network is a difficult but important problem. The essential difficulty of this problem is that the traffic signals need to coordinate their behaviours to achieve the common goal of optimi... Read More about Multiple traffic signal control using a genetic algorithm.

Lightweight threads for portable software (1993)
Presentation / Conference Contribution
Russell, G. (1993, January). Lightweight threads for portable software. Presented at Networking-the Next Generation, UKUUG/SUKUG Conference

No abstract available.

Architectures for persistence (1993)
Journal Article
Russell, G., & Cockshott, W. P. (1993). Architectures for persistence. Microprocessors and Microsystems, 17(3), 117-130. https://doi.org/10.1016/0141-9331%2893%2990042-6

Persistent object oriented architectures have been researched for many years, deriving initially from the Manchester University Atlas machine. In reality, however, few actual implementations of persistent architectures exist. In the first half of thi... Read More about Architectures for persistence.