8 results

Who would you trust to identify you in accessing your health record?

Conference Proceeding
Buchanan, W. J., Anderson, C., Smales, A., Varga, J., Burns, N., Uthmani, O., …Lawson, A. (2013)
Who would you trust to identify you in accessing your health record?
Within health and social care there is a strong need to provide access to highly sensitive information, and one which requires high levels of identity assurance. This paper ou...

Modelling of integrated trust, governance and access safi.re: Information Sharing Architecture.

Conference Proceeding
Buchanan, W. J., Uthmani, O., Fan, L., Burns, N., Lo, O., Lawson, A., …Anderson, C. (2013)
Modelling of integrated trust, governance and access safi.re: Information Sharing Architecture. In M. Felici (Ed.), Cyber Security and Privacy, (91-101). https://doi.org/10.1007/978-3-642-41205-9_8
We live in a world where trust relationships are becoming ever more important. This paper outlines how an architecture which abstracts these relationships between domains, org...

A scaleable and trusted e-Health eco-system: safi.re

Presentation / Conference
Buchanan, W. J., Burns, N., Lo, O., Lewis, R., Uthmani, O., & Fan, L. (2013, April)
A scaleable and trusted e-Health eco-system: safi.re. Paper presented at Cyber Security and Privacy EU Forum 2013, European Commission, Brussels
At present most health and social care systems do not have extendable trust and governance. This presentation outlines the safi.re architecture which uses three main component...

Evaluation of binary decision diagrams for redundancy, shadowing, generalisation and correlation in an Information sharing model.

Working Paper
Uthmani, O., Buchanan, W. J., Fan, L. & Lawson, A. (2012)
Evaluation of binary decision diagrams for redundancy, shadowing, generalisation and correlation in an Information sharing model
This paper defines a structured methodology which is based on the foundational work of Al-Shaer et al. in [1] and that of Hamed and Al-Shaer in [2]. It defines a methodology f...

A novel Information sharing model using binary decision diagrams for redundancy, shadowing, generalisation and correlation.

Working Paper
Uthmani, O., Buchanan, W. J., Fan, L. & Lawson, A. (2012)
A novel Information sharing model using binary decision diagrams for redundancy, shadowing, generalisation and correlation
This paper outlines a novel information sharing method using Binary Decision Diagrams (BBDs). It is inspired by the work of Al-Shaer and Hamed, who applied BDDs into the model...

Information sharing around child protection.

Presentation / Conference
Buchanan, W. J., Uthmani, O., Lewis, R., Steyven, A., Fan, L., Thuemmler, C., …Lawson, A. (2012, June)
Information sharing around child protection. Paper presented at Information Sharing in the Public Sector, Edinburgh
Background This presentation focuses on creating a scaleable, robust and secure information architecture for social and health care. At its core is the sa.FIRE (Secure Analysi...

Scenario Analysis using Out-of-line Firewall Evaluation Framework.

Conference Proceeding
Saliou, L., Buchanan, W. J., Graves, J., & Munoz, J. (2007)
Scenario Analysis using Out-of-line Firewall Evaluation Framework
Distributed Denial-of-Service (DDoS) attacks against corporate networks and assets are increasing, and their potential risk for future attacks is also a major concern. These a...

Novel Framework for Automated Security Abstraction, Modelling, Implementation and Verification

Conference Proceeding
Saliou, L., Buchanan, W. J., Graves, J. & Munoz, J. (2005)
Novel Framework for Automated Security Abstraction, Modelling, Implementation and Verification. In Hutchinson, W. (Ed.
This paper presents a novel framework for network security, and provides a complete solution to integrated security policies, which meets the objectives of an organisation, an...