7 results

Sticky policy enabled authenticated OOXML

Conference Proceeding
Spyra, G., Buchanan, W. J., & Ekonomou, E. (2016)
Sticky policy enabled authenticated OOXML. In Conference Proceedings of the IEEE Technically Sponsored SAI Computing Conference 2016. https://doi.org/10.1109/SAI.2016.7556117
This paper proposes a secure document sharing construction, which addresses confidentiality and authenticity concerns related to cloud-based data sharing. The goal of this res...

Cloud4Health.

Presentation / Conference
Buchanan, W. J., Fan, L., Ekonomou, E., & Lo, O. (2012, May)
Cloud4Health. Paper presented at Symposium on the Future of e-Health, Edinburgh Napier University, Edinburgh
The cloud4health platform focuses on creating a next generation infrastructure which aims to integrate assisted living with primary and secondary health care, in order to redu...

Integrating assisted living with primary and secondary health care.

Presentation / Conference
Buchanan, W. J., Fan, L., Ekonomou, E., Lo, O., Uthmani, O., & Thuemmler, C. (2012, May)
Integrating assisted living with primary and secondary health care. Paper presented at Data Handling in Health and Social Care: Striking the balance between confidentiality, security and information sharing, Edinburgh
This presentation outlines the Cloud4Health platform.

An Integrated Cloud-based Healthcare Infrastructure.

Conference Proceeding
Ekonomou, E., Fan, L., Buchanan, W. J., & Thuemmler, C. (2011)
An Integrated Cloud-based Healthcare Infrastructure. In 2011 IEEE Third International Conference on Cloud Computing Technology and Science (CloudCom), (532-536). https://doi.org/10.1109/CloudCom.2011.80
We present a cloud-based healthcare system that integrates a formal care system (DACAR) with an informal care system (Microsoft HealthVault). The system provides high levels o...

Formal security policy implementations in network firewalls.

Journal Article
Macfarlane, R., Buchanan, W. J., Ekonomou, E., Uthmani, O., Fan, L., & Lo, O. (2012)
Formal security policy implementations in network firewalls. Computers and Security, 31(2), 253-270. https://doi.org/10.1016/j.cose.2011.10.003
Network security should be based around security policies. From high-level natural language, non-technical, policies created by management, down to device and vendor specific ...

Cloud-based e-Health System.

Presentation / Conference
Buchanan, W. J., Fan, L., Thuemmler, C., Lo, O., & Ekonomou, E. (2011, September)
Cloud-based e-Health System. Paper presented at BCS Health Informatics, Edinburgh
This paper presents the future of health care system, which uses the newly developed security infrastructure.

Cloud-based digital forensics evaluation test (D-FET) platform.

Presentation / Conference
Buchanan, W. J., Macfarlane, R., Flandrin, F., Graves, J., Fan, L., Ekonomou, E., …Ludwiniak, R. (2011, June)
Cloud-based digital forensics evaluation test (D-FET) platform. Paper presented at Cyberforensics 2011, University of Strathclyde, Glasgow
This paper outlines the specification of the Cloud-based DFET platform which is used to evaluate the performance of digital forensics tools, which aim to detect the presence o...