Software agents and computer network security.
Pikoulas, J., Mannion, M., & Buchanan, W. J. (2000)
Software agents and computer network security. In Engineering of Computer Based Systems, 2000. (ECBS 2000) Proceedings. Seventh IEEE International Conference and Workshopon the, 211-217. https://doi.org/10.1109/ECBS.2000.839879
Preventing unauthorised access to corporate information systems is essential for many organisations. To address this problem we built a security enhancement software system us...
Software reuse in the emerging cloud computing era.
Yang, H., & Liu, X. (2012)
Software reuse in the emerging cloud computing era. IGI Global Publishing. https://doi.org/10.4018/978-1-4666-0897-9
With the rapid development of computing hardware, high-speed network, web programming, distributed and parallel computing, and other technologies, cloud computing has recently...
Software development for engineers.
Buchanan, W. J. (1996)
Software development for engineers. Butterworth-Heinemann Newton, MA, USA
Specialisation in software has become a thing of the past. With the move towards graphical user interface programming, engineers must have a sound knowledge of several program...
Social Media Adoption in Adult Education ‒ Administrators' Experience
Šliogerienė, J., Valūnaitė Oleškevičienė, G., Fotheringham, J., & Palfreyman, K. J. (2015)
Social Media Adoption in Adult Education ‒ Administrators' Experience. Public Policy and Administration, 13(4), 690-703. https://doi.org/10.13165/VPA-14-13-4-11
The rapid development of social media poses a multitude of considerations on this technology adoption. The emphasis in literature is put mainly on student or teacher perspecti...
Secret shares to protect health records in Cloud-based infrastructures
Buchanan, W. J., Ukwandu, E., van Deursen, N., Fan, L., Russell, G., Lo, O., & Thuemmler, C. (2016)
Secret shares to protect health records in Cloud-based infrastructures. In 2015 17th International Conference on E-health Networking, Application & Services (HealthCom)https://doi.org/10.1109/HealthCom.2015.7454589
Increasingly health records are stored in cloud-based systems, and often protected by a private key. Unfortunately the loss of this key can cause large-scale data loss. This p...
Security and Routing Scoped IP Multicast Addresses
Romdhani, I., Al-Dubai, A., & Kellil, M. (2009)
Security and Routing Scoped IP Multicast Addresses. In International Conference on Parallel Processing Workshops, 2009. ICPPW '09, (228 - 235). https://doi.org/10.1109/icppw.2009.81
IP multicast is an efficient and scalable network layer delivering method for multimedia content to a large number of receivers across the Internet. It saves the network bandw...
Security issues of a publicly accessible cloud computing infrastructure.
Russell, G., & Macfarlane, R. (2012)
Security issues of a publicly accessible cloud computing infrastructure. In Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2012), 1210-1216. https://doi.org/10.1109/TrustCom.2012.259
Edinburgh Napier University runs a custom cloud computing infrastructure for both student and public use. Such access carries dangers, both reputational and legal, as accident...
SCRAN: The Network
Cruickshank, P. (2011)
SCRAN: The Network. Journal of Urban Technology, 18, 83-97. https://doi.org/10.1080/10630732.2011.601121
This paper outlines the relationship between the Smart Cities (inter)Regional Academic Network (SCRAN) and the triple-helix model of knowledge production, a model encompassing...
Semantic integrity for persistent objects
Barclay, P. J., & Kennedy, J. (1992)
Semantic integrity for persistent objects. Information and Software Technology, 34(8), 533-541. https://doi.org/10.1016/0950-5849%2892%2990147-H
Modelling constructs for specifying semantic integrity are reviewed,
and their implicit execution semantics discussed. An integrity mainte-
nance model based on these construc...
Semantic description of cloud service agreements
Greenwell, R., Liu, X., & Chalmers, K. (2015)
Semantic description of cloud service agreements. In Science and Information Conference (SAI), 2015, (823-831). https://doi.org/10.1109/sai.2015.7237239
To provide cloud services as a utility there must be
a mechanism for comprehensively and precisely specifying cloud
service agreements to reduce differences in service percept...