Software agents and computer network security.
Pikoulas, J., Mannion, M., & Buchanan, W. J. (2000)
Software agents and computer network security. In Engineering of Computer Based Systems, 2000. (ECBS 2000) Proceedings. Seventh IEEE International Conference and Workshopon the, 211-217. https://doi.org/10.1109/ECBS.2000.839879
Preventing unauthorised access to corporate information systems is essential for many organisations. To address this problem we built a security enhancement software system us...
Secret shares to protect health records in Cloud-based infrastructures
Buchanan, W. J., Ukwandu, E., van Deursen, N., Fan, L., Russell, G., Lo, O., & Thuemmler, C. (2016)
Secret shares to protect health records in Cloud-based infrastructures. In 2015 17th International Conference on E-health Networking, Application & Services (HealthCom)https://doi.org/10.1109/HealthCom.2015.7454589
Increasingly health records are stored in cloud-based systems, and often protected by a private key. Unfortunately the loss of this key can cause large-scale data loss. This p...
Security issues of a publicly accessible cloud computing infrastructure.
Russell, G., & Macfarlane, R. (2012)
Security issues of a publicly accessible cloud computing infrastructure. In Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2012), 1210-1216. https://doi.org/10.1109/TrustCom.2012.259
Edinburgh Napier University runs a custom cloud computing infrastructure for both student and public use. Such access carries dangers, both reputational and legal, as accident...
Privacy-preserving data acquisition protocol.
Kwecka, Z., Buchanan, W. J., & Spiers, D. A. (2010)
Privacy-preserving data acquisition protocol. In IEEE International Conference of Computational Methods in Electrical and Electronics Engineering, 131 - 136. https://doi.org/10.1109/SIBIRCON.2010.5555325
Current investigative data acquisition techniques often breach human and natural rights of the data subject and can jeopardize an investigation. Often the investigators need t...
Public perceptions in health care security.
Presentation / Conference
Buchanan, W. J., & Smales, A. (2013, January)
Public perceptions in health care security. Paper presented at Health Informatics 2013, Heriot-Watt University, Edinburgh
Over the past few years many industries have been revolutionized by the application of Information Technology, in fact, we are now moving from an Industrial Age into an Inform...
Protecting mobile agents from external replay attacks
Garrigues, C., Migas, N., Buchanan, W., Robles, S., & Borrell, J. (2009)
Protecting mobile agents from external replay attacks. Journal of Systems and Software, 82(2), 197-206. https://doi.org/10.1016/j.jss.2008.05.018
This paper presents a protocol for the protection of mobile agents against external replay attacks. This kind of attacks are performed by malicious platforms when dispatching ...
Radio frequency identification (RFID) in pervasive healthcare
Fekri, A. H., Thuemmler, C., Buchanan, W., Fekri, H., & Lawson, A. (2009)
Radio frequency identification (RFID) in pervasive healthcare. International Journal of Healthcare Technology and Management, 10(1/2), 119. doi:10.1504/ijhtm.2009.023731
Active and passive RFID (Radio Frequency Identification) technology are available and licensed for the use in hospitals, and can be used to establish highly reliable pervasive...
Sticky policy enabled authenticated OOXML
Spyra, G., Buchanan, W. J., & Ekonomou, E. (2016)
Sticky policy enabled authenticated OOXML. In Conference Proceedings of the IEEE Technically Sponsored SAI Computing Conference 2016doi:10.1109/SAI.2016.7556117
This paper proposes a secure document sharing construction, which addresses confidentiality and authenticity concerns related to cloud-based data sharing. The goal of this res...
A Stateful Mechanism for the Tree-Rule Firewall
Chomsiri, T., He, X., Nanda, P., & Tan, Z. (2014)
A Stateful Mechanism for the Tree-Rule Firewall. In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, (122-129). https://doi.org/10.1109/trustcom.2014.20
In this paper, we propose a novel connection tracking mechanism for Tree-rule firewall which essentially organizes firewall rules in a designated Tree structure. A new firewal...
Towards Designing an Email Classification System Using Multi-view Based Semi-supervised Learning
Li, W., Meng, W., Tan, Z., & Xiang, Y. (2014)
Towards Designing an Email Classification System Using Multi-view Based Semi-supervised Learning. In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications,, (174-181). https://doi.org/10.1109/trustcom.2014.26
The goal of email classification is to classify user emails into spam and legitimate ones. Many supervised learning algorithms have been invented in this domain to accomplish ...