7 results

Design Issues for Peer-to-Peer Massively Multiplayer Online Games.

Journal Article
Fan, L., Trinder, P., & Taylor, H. (2010)
Design Issues for Peer-to-Peer Massively Multiplayer Online Games. International Journal of Advanced Media and Communication, 4, 108-125. https://doi.org/10.1504/IJAMC.2010.032138
Massively Multiplayer Online Games (MMOGs) are increasing in both popularity and scale, and while classical Client/Server (C/S) architectures convey some benefits, they suffer...

Deadline-Driven Auctions for NPC Host Allocation on P2P MMOGs.

Journal Article
Fan, L., Trinder, P., & Taylor, H. (2010)
Deadline-Driven Auctions for NPC Host Allocation on P2P MMOGs. International Journal of Advanced Media and Communication, 4, 140-153. https://doi.org/10.1504/IJAMC.2010.032140
We present the design, implementation and evaluation of Deadline-Driven Auctions (DDAs), a novel task-mapping infrastructure for heterogeneous distributed environments. DDA is...

E-Health: chances and challenges of distributed, service oriented architectures

Journal Article
Thuemmler, C., Fan, L., Buchanan, W. J., Lo, O., Ekonomou, E., & Khedim, A. S. (2012)
E-Health: chances and challenges of distributed, service oriented architectures. Journal of cyber security and mobility, 37,
Societies are undergoing unprecedented demographic and socio-economical changes on a pace that has never been experienced before. Health care models are in transition to remai...

The future internet: a world of secret shares

Journal Article
Buchanan, W. J., Lanc, D., Ukwandu, E., Fan, L., Russell, G., & Lo, O. (2015)
The future internet: a world of secret shares. Future Internet, 7(4), 445-464. https://doi.org/10.3390/fi7040445
The PKI infrastructure is crumbling, especially due to the lack of a strong understanding of how encryption actually works, and in threats around its implementation. This pape...

Formal security policy implementations in network firewalls.

Journal Article
Macfarlane, R., Buchanan, W. J., Ekonomou, E., Uthmani, O., Fan, L., & Lo, O. (2012)
Formal security policy implementations in network firewalls. Computers and Security, 31(2), 253-270. https://doi.org/10.1016/j.cose.2011.10.003
Network security should be based around security policies. From high-level natural language, non-technical, policies created by management, down to device and vendor specific ...

Crime risk evaluation within information sharing between the Police and community partners.

Journal Article
Uthmani, O., Buchanan, W. J., Lawson, A., Scott, R., Schafer, B., & Fan, L. (2011)
Crime risk evaluation within information sharing between the Police and community partners. Information and Communications Technology Law, 20, 57-81. https://doi.org/10.1080/13600834.2011.578922
The aim of this paper is to provide profiles for crimes which can be used to model the context for information sharing between the police and community partner organisations. ...

Novel tracking of rogue network packets using danger theory approach

Journal Article
Uwagbole, S., Buchanan, W. J., & Fan, L. (2012)
Novel tracking of rogue network packets using danger theory approach. Proceedings of the ... international conference on information warfare and security, 277-286
Recently there has been heightened, continuous, and intrusive activity by remotely located rogue hacking groups, such as Anonymous and Lulzsec. These groups often aim to disru...