15 results

Secret shares to protect health records in Cloud-based infrastructures

Conference Proceeding
Buchanan, W. J., Ukwandu, E., van Deursen, N., Fan, L., Russell, G., Lo, O., & Thuemmler, C. (2016)
Secret shares to protect health records in Cloud-based infrastructures. In 2015 17th International Conference on E-health Networking, Application & Services (HealthCom)https://doi.org/10.1109/HealthCom.2015.7454589
Increasingly health records are stored in cloud-based systems, and often protected by a private key. Unfortunately the loss of this key can cause large-scale data loss. This p...

Privacy-Preserving Passive DNS

Journal Article
Papadopoulos, P., Pitropakis, N., Buchanan, W. J., Lo, O., & Katsikas, S. (2020)
Privacy-Preserving Passive DNS. Computers, 9(3), https://doi.org/10.3390/computers9030064
The Domain Name System (DNS) was created to resolve the IP addresses of web servers to easily remembered names. When it was initially created, security was not a major concern...

Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform

Journal Article
Ali, H., Ahmad, J., Jaroucheh, Z., Papadopoulos, P., Pitropakis, N., Lo, O., …Buchanan, W. J. (2022)
Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform. Entropy, 24(10), Article 1379. https://doi.org/10.3390/e24101379
Historically, threat information sharing has relied on manual modelling and centralised network systems, which can be inefficient, insecure, and prone to errors. Alternatively...

Distance Measurement Methods for Improved Insider Threat Detection

Journal Article
Lo, O., Buchanan, W. J., Griffiths, P., & Macfarlane, R. (2018)
Distance Measurement Methods for Improved Insider Threat Detection. Security and Communication Networks, 2018, 1-18. https://doi.org/10.1155/2018/5906368
Insider threats are a considerable problem within cyber security and it is often difficult to detect these threats using signature detection. Increasing machine learning can p...

A scaleable and trusted e-Health eco-system: safi.re

Presentation / Conference
Buchanan, W. J., Burns, N., Lo, O., Lewis, R., Uthmani, O., & Fan, L. (2013, April)
A scaleable and trusted e-Health eco-system: safi.re. Paper presented at Cyber Security and Privacy EU Forum 2013, European Commission, Brussels
At present most health and social care systems do not have extendable trust and governance. This presentation outlines the safi.re architecture which uses three main component...

Cloud4Health.

Presentation / Conference
Buchanan, W. J., Fan, L., Ekonomou, E., & Lo, O. (2012, May)
Cloud4Health. Paper presented at Symposium on the Future of e-Health, Edinburgh Napier University, Edinburgh
The cloud4health platform focuses on creating a next generation infrastructure which aims to integrate assisted living with primary and secondary health care, in order to redu...

Towards a framework for the generation of enhanced attack/background network traffic for evaluation of network-based intrusion detection systems

Conference Proceeding
Lo, O. C. W., Graves, J. R., & Buchanan, W. J. (2010)
Towards a framework for the generation of enhanced attack/background network traffic for evaluation of network-based intrusion detection systems. In J. Demergis (Ed.), Proceedings of 9th European Conference on Information Warfare and Security. , (190-200
There are a multitude of threats faced in computer networks such as viruses, worms, trojans, attempted user privilege gain, data theft and denial of service attacks. To combat...

GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture

Journal Article
Lo, O., Buchanan, W., Sayeed, S., Papadopoulos, P., Pitropakis, N., & Chrysoulas, C. (2022)
GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture. Sensors, 22(6), Article 2291. https://doi.org/10.3390/s22062291
E-governance is a process that aims to enhance a government’s ability to simplify all the processes that may involve government, citizens, businesses, and so on. The rapid evo...

Patient centric health care: an integrated and secure, cloud-based, e-Health platform.

Presentation / Conference
Buchanan, W. J., Fan, L., Ekonomou, E., Lo, O., & Thuemmler, C. (2012, February)
Patient centric health care: an integrated and secure, cloud-based, e-Health platform. Paper presented at BCS Branch Meeting, University of Edinburgh Informatics Forum
There are many issues related to health care infrastructure within the UK, including the lack of integration of data between the different parts of the health and social care ...

Applications of Blockchain Within Healthcare.

Journal Article
Bell, L., Buchanan, W. J., Cameron, J., & Lo, O. (2018)
Applications of Blockchain Within Healthcare. Blockchain in Healthcare Today,
There are several areas of healthcare and well-being that could be enhanced using blockchain technologies. These include device tracking, clinical trials, pharmaceutical traci...
7 results

IoT Hardware Security Test Framework

2017 - 2018
The collaboration work has developed through an existing Data Lab funded project, and has shown how data science can be used to discover security vulnerabilities within IoT devices. Currently the team...
Funder: Centre for Sensor and Imaging Systems | Value: £58,807

Next Generation Trust Architecture

2018 - 2020
This work will provide proof-of-concept infrastructures and which will be used to create an ecosystem for strong use cases, and thus attract new funding for the building of new health and social care ...
Funder: Digital Health Institute | Value: £149,959

MEMCRYPT CyberASAP Phase 2

2020 - 2021
Ransomware is a form of malicious software that blocks user access to data by encrypting files. A user is then required to pay the attacker a sum of money to receive the encryption artefacts and start...
Funder: Innovate UK | Value: £52,310

MemCrypt

2020 - 2020
At the core of the work is to addresses risks related to the leakage of encryption keys, and which can lead to data loss issues and trust breaches. Along with detecting keys in memory, the team has de...
Funder: Innovate UK | Value: £31,930

Distributed single sign-on-stack-on e-Governance Paradigm based on a distributed peer-to-peer (P2P) file exchange network for security, transparency, cost effectiveness and trust - GLASS

2021 - 2023
The VISION of the GLASS is to develop a single-on distributed solution that is open source, efficient and inclusive, transparent, cross-border functional, user- friendly, end-to-end encrypted combinin...
Funder: European Commission | Value: £190,889

Data Capture and Auto Identification Reference

2009 - 2011
This project relates to the research collaboration between Edinburgh Napier University, CipherLab, Chelsea and Westminster Hospital, GS1 UK, Imperial College, and Kodit, and is funded through a resear...
Funder: Innovate UK | Value: £227,172

Scalable and Open Framework for Human/Digital Trust between Informal/Formal Personal Health Care Infrastructures

2011 - 2013
This project extends the e-Health Cloud-based Platform, and integrates with assisted living. The project integrates Edinburgh Napier University, Microsoft and HoIP, and has created a novel governance ...
Funder: Engineering and Physical Sciences Research Council | Value: £243,325