Who would you trust to identify you in accessing your health record?
Conference Proceeding
Buchanan, W. J., Anderson, C., Smales, A., Varga, J., Burns, N., Uthmani, O., …Lawson, A. (2013)
Who would you trust to identify you in accessing your health record?
Within health and social care there is a strong need to provide access to highly sensitive information, and one which requires high levels of identity assurance. This paper ou...
Modelling of integrated trust, governance and access safi.re: Information Sharing Architecture.
Conference Proceeding
Buchanan, W. J., Uthmani, O., Fan, L., Burns, N., Lo, O., Lawson, A., …Anderson, C. (2013)
Modelling of integrated trust, governance and access safi.re: Information Sharing Architecture. In M. Felici (Ed.), Cyber Security and Privacy, (91-101). https://doi.org/10.1007/978-3-642-41205-9_8
We live in a world where trust relationships are becoming ever more important. This paper outlines how an architecture which abstracts these relationships between domains, org...
Information sharing.
Patent
Buchanan, W. J., Fan, L., Uthmani, O. & Lawson, A. (2013)
Information sharing.
http://www.google.com/patents/US20140201804 The present disclosure relates to improved information sharing and in particular to formal representations of information sharing p...
Interagency data exchange, privacy protection and governance architecture for Information sharing across domains
Working Paper
Buchanan, W. J., Fan, L., Uthmani, O., & Schafer, B. Interagency data exchange, privacy protection and governance architecture for Information sharing across domains)
Buchanan, W. J., Fan, L., Uthmani, O., & Schafer, B. Interagency data exchange, privacy protection and governance architecture for Information sharing across domains
This paper discusses privacy enhancing technologies in the field of inter-agency data sharing, a key government objective for efficient public service delivery. We analyse the...
A novel Information sharing model using binary decision diagrams for redundancy, shadowing, generalisation and correlation.
Working Paper
Uthmani, O., Buchanan, W. J., Fan, L. & Lawson, A. (2012)
A novel Information sharing model using binary decision diagrams for redundancy, shadowing, generalisation and correlation
This paper outlines a novel information sharing method using Binary Decision Diagrams (BBDs). It is inspired by the work of Al-Shaer and Hamed, who applied BDDs into the model...
Evaluation of binary decision diagrams for redundancy, shadowing, generalisation and correlation in an Information sharing model.
Working Paper
Uthmani, O., Buchanan, W. J., Fan, L. & Lawson, A. (2012)
Evaluation of binary decision diagrams for redundancy, shadowing, generalisation and correlation in an Information sharing model
This paper defines a structured methodology which is based on the foundational work of Al-Shaer et al. in [1] and that of Hamed and Al-Shaer in [2]. It defines a methodology f...
Integrating assisted living with primary and secondary health care.
Presentation / Conference
Buchanan, W. J., Fan, L., Ekonomou, E., Lo, O., Uthmani, O., & Thuemmler, C. (2012, May)
Integrating assisted living with primary and secondary health care. Paper presented at Data Handling in Health and Social Care: Striking the balance between confidentiality, security and information sharing, Edinburgh
This presentation outlines the Cloud4Health platform.
Crime risk evaluation within information sharing between the Police and community partners.
Journal Article
Uthmani, O., Buchanan, W. J., Lawson, A., Scott, R., Schafer, B., & Fan, L. (2011)
Crime risk evaluation within information sharing between the Police and community partners. Information and Communications Technology Law, 20, 57-81. https://doi.org/10.1080/13600834.2011.578922
The aim of this paper is to provide profiles for crimes which can be used to model the context for information sharing between the police and community partner organisations. ...
DACAR platform for eHealth services cloud.
Conference Proceeding
Fan, L., Buchanan, W. J., Thuemmler, C., Lo, O., Khedim, A. S., Uthmani, O., …Bell, D. (2011)
DACAR platform for eHealth services cloud. https://doi.org/10.1109/CLOUD.2011.31
The use of digital technologies in providing health care services is collectively known as eHealth. Considerable progress has been made in the development of eHealth services,...
Formal security policy implementations in network firewalls.
Journal Article
Macfarlane, R., Buchanan, W. J., Ekonomou, E., Uthmani, O., Fan, L., & Lo, O. (2012)
Formal security policy implementations in network firewalls. Computers and Security, 31(2), 253-270. https://doi.org/10.1016/j.cose.2011.10.003
Network security should be based around security policies. From high-level natural language, non-technical, policies created by management, down to device and vendor specific ...