Spyra, G., Buchanan, W. J. & Ekonomou, E. (in press). Sticky policies approach within cloud computing. Computers and Security. 70, 366-375. doi:10.1016/j.cose.2017.07.005
This paper discusses a secure document sharing
approach, which addresses confidentiality, integrity and
authenticity concerns related to cloud-based data sharing. This
Buchanan, W., Thuemmler, C., Spyra, G., Smales, A. & Prajapati, B. (2016). Towards Trust and Governance in Integrated Health and Social Care Platforms. In Health 4.0: How Virtualization and Big Data are Revolutionizing Healthcare, 219-231. (1). Springer Verlag. doi:10.1007/978-3-319-47617-9_11. ISBN 978-3-319-47616-2; 978-3-319-47617-9
The way we are sharing health and care data will be changing considerably over the years to come. One of the reasons is an increasing move towards patient-centric approaches w...
Spyra, G., Buchanan, W. J. & Ekonomou, E. (2017, November). Blockchain and Git repositories for sticky policies protected OOXML. Presented at FTC 2017 - Future Technologies Conference 2017, Vancouver, Canada
The paper discuss possible cloud-based
Information Rights Management (IRM) model extension with
enhanced accountability for both a sticky policy and an attached
data. This wor...
Prajapati, B., Buchanan, W. J., Smales, A., Macfarlane, R. & Spyra, G. (2014). Review of e-Health Frameworks. In Health Informatics Conference 2015
In order to improve the quality of health care and widen the accessibility, health care providers are consistently looking to inject information and communication technology t...
Spyra, G., Buchanan, W. J. & Ekonomou, E. (2015). Sticky policy enabled authenticated OOXML. In Conference Proceedings of the IEEE Technically Sponsored SAI Computing Conference 2016
Sticky policy enabled authenticated OOXML.
Spyra, G. & Buchanan, W. J. (2016). Protecting Documents with Sticky Policies and Identity-Based Encryption. In Proceedings of the Future Technologies Conference (FTC) 2016
Documents are increasingly being held in public cloud-based systems, and there thus increasingly exposed to accesses from malicious entities. This paper focuses on the integra...
As we move into storing data within a public cloud infrastructure we reduce the defences and must embed security into the data. Along with this we need to find w...