Building a new nation: risk, goverance and trust.
Presentation / Conference
Buchanan, W. J. (2013, January)
Building a new nation: risk, goverance and trust. Presented at Cyber Security 2013, Edinburgh
This presentation outlines some of the opportunities and threats that Scotland faces within an Information Age.
Advanced persistent threat and Insiders.
Presentation / Conference
Buchanan, W. J. (2015, January)
Advanced persistent threat and Insiders. Paper presented at Advanced Persistent Threat, London
With an increase in the range and mobility of devices which connect to the network, there are now so many opportunities for intruders to compromise systems. Leading with the r...
GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture
Journal Article
Lo, O., Buchanan, W., Sayeed, S., Papadopoulos, P., Pitropakis, N., & Chrysoulas, C. (2022)
GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture. Sensors, 22(6), Article 2291. https://doi.org/10.3390/s22062291
E-governance is a process that aims to enhance a government’s ability to simplify all the processes that may involve government, citizens, businesses, and so on. The rapid evo...
HI-risk: A method to analyse health information risk intelligence
Conference Proceeding
Buchanan, W. J., & van Deursen, N. (2016)
HI-risk: A method to analyse health information risk intelligence. In 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom)https://doi.org/10.1109/healthcom.2016.7749536
Information security threat intelligence is a prevalent topic amongst researchers, long-established IT-vendors and start-ups. The possibilities of Big Data analytics to securi...
Embedded document security using sticky policies and identity based encryption
Thesis
Spyra, G. K. Embedded document security using sticky policies and identity based encryption. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/Output/2090564
Data sharing domains have expanded over several, both trusted and insecure environments. At the same time, the data security boundaries have shrunk from internal network perim...
Cyber security challenges for cloud based services.
Presentation / Conference
Buchanan, W. J. (2015, June)
Cyber security challenges for cloud based services. Paper presented at Scot-Cloud 2015, Dynamic Earth, Edinburgh
Areas covered - IoT security - Data loss detection and prevention - Cryptography in the Cloud
Who would you trust to identify you in accessing your health record?
Conference Proceeding
Buchanan, W. J., Anderson, C., Smales, A., Varga, J., Burns, N., Uthmani, O., …Lawson, A. (2013)
Who would you trust to identify you in accessing your health record?
Within health and social care there is a strong need to provide access to highly sensitive information, and one which requires high levels of identity assurance. This paper ou...
How the love of one teenager brought Tweetdeck to its knees.
Other
Buchanan, W. J. (2014)
How the love of one teenager brought Tweetdeck to its knees
TweetDeck, a Twitter app with millions of users, is back online after a rather surprising security scare. For several hours, the service was taken down all because a 19-year-o...
A Privacy-Preserving Secure Framework for Electric Vehicles in IoT using Matching Market and Signcryption
Journal Article
Kumar, G., Rai, M., Saha, R., Buchanan, W. J., Thomas, R., Geetha, G., …Rodrigues, J. (2020)
A Privacy-Preserving Secure Framework for Electric Vehicles in IoT using Matching Market and Signcryption. IEEE Transactions on Vehicular Technology, 69(7), 7707-7722. https://doi.org/10.1109/tvt.2020.2989817
The present world of vehicle technology is inclined to develop Electric Vehicles (EVs) with various optimized features. These vehicles need frequent charging which takes a lon...
If you seek to ‘switch off’ encryption, you may as well switch off the whole internet.
Other
Buchanan, W. J. (2015)
If you seek to ‘switch off’ encryption, you may as well switch off the whole internet
Prime Minister David Cameron has stated that the UK government will look at “switching off” some forms of encryption in order to make society safer from terror attacks. This m...