11 results

Controlling a simulated Khepera with an XCS classifier system with memory.

Conference Proceeding
Webb, A., Hart, E., Ross, P. & Lawson, A. (2003)
Controlling a simulated Khepera with an XCS classifier system with memory. ISBN 9783540200574
Autonomous agents commonly suffer from perceptual aliasing in which differing situations are perceived as identical by the robots sensors, yet require different courses of act...

Novel information sharing syntax for data sharing between police and community partners, using role-based security.

Conference Proceeding
Uthmani, O., Buchanan, W. J., Lawson, A., Thuemmler, C., Fan, L., Scott, R., …Mooney, C. (2010)
Novel information sharing syntax for data sharing between police and community partners, using role-based security
The exchange of information between the police and community partners forms a central aspect of effective community service provision. In the context of policing, a robust and...

DACAR platform for eHealth services cloud.

Conference Proceeding
Fan, L., Buchanan, W. J., Thuemmler, C., Lo, O., Khedim, A. S., Uthmani, O., …Bell, D. (2011)
DACAR platform for eHealth services cloud. https://doi.org/10.1109/CLOUD.2011.31
The use of digital technologies in providing health care services is collectively known as eHealth. Considerable progress has been made in the development of eHealth services,...

Who would you trust to identify you in accessing your health record?

Conference Proceeding
Buchanan, W. J., Anderson, C., Smales, A., Varga, J., Burns, N., Uthmani, O., …Lawson, A. (2013)
Who would you trust to identify you in accessing your health record?
Within health and social care there is a strong need to provide access to highly sensitive information, and one which requires high levels of identity assurance. This paper ou...

Modelling of integrated trust, governance and access safi.re: Information Sharing Architecture.

Conference Proceeding
Buchanan, W. J., Uthmani, O., Fan, L., Burns, N., Lo, O., Lawson, A., …Anderson, C. (2013)
Modelling of integrated trust, governance and access safi.re: Information Sharing Architecture. In M. Felici (Ed.), Cyber Security and Privacy, (91-101). https://doi.org/10.1007/978-3-642-41205-9_8
We live in a world where trust relationships are becoming ever more important. This paper outlines how an architecture which abstracts these relationships between domains, org...

Interagency data exchange protocols as computational data protection law.

Conference Proceeding
Buchanan, W. J., Fan, L., Lawson, A., Schafer, B., Scott, R., Thuemmler, C. & Uthmani, O. (2010)
Interagency data exchange protocols as computational data protection law
The paper describes a collaborative project between computer scientist, police officers, medical professionals and social workers to develop a communication infrastructure tha...

Novel information sharing architecture between the Police and their community partners.

Conference Proceeding
Uthmani, O., Buchanan, W. J. & Lawson, A. (2010)
Novel information sharing architecture between the Police and their community partners
The exchange of information between the police and community partners forms a central aspect of effective community service provision. In the context of policing, a robust and...

Computational data protection law: trusting each other offline and online.

Conference Proceeding
Buchanan, W. J., Fan, L., Lawson, A., Schafer, B., Scott, R., Thuemmler, C. & Uthmani, O. (2011)
Computational data protection law: trusting each other offline and online. In Legal Knowledge and Information Systems; JURIX 2012, 31-40. doi:10.3233/978-1-61499-167-0-31. ISBN 978-1-61499-166-3
The paper reports of a collaborative project between computer scientists, lawyers, police officers, medical professionals and social workers to develop a communication in infr...

Affliate advertising fraud and an investigatory fraud framework.

Conference Proceeding
Miehling, M. J., Buchanan, W. J. & Lawson, A. (2010)
Affliate advertising fraud and an investigatory fraud framework. In CyberForensics 2011
This paper outlines the details of a real-life scam, which involves creating fraudulent Web sites which pretend to sell goods, but are actually used to perform click-through c...

SPoC: Protecting Patient Privacy for e-Health Services in the Cloud

Conference Proceeding
Fan, L., Buchanan, W. J., Lo, O., Thuemmler, C., Lawson, A., Uthmani, O., …Khedim, A. S. (2011)
SPoC: Protecting Patient Privacy for e-Health Services in the Cloud. In eTELEMED 2012, 99-104. ISBN 978-1-61208-179-3
The use of digital technologies in providing health care services is in general subsumed under the term e-Health. The Data Capture and Auto Identification Reference (DACAR) pr...