Review of e-Health Frameworks.
Conference Proceeding
Prajapati, B., Buchanan, W. J., Smales, A., Macfarlane, R., & Spyra, G. (2015)
Review of e-Health Frameworks. In Health Informatics Conference 2015
In order to improve the quality of health care and widen the accessibility, health care providers are consistently looking to inject information and communication technology t...
Sticky-Policy enabled authenticated OOXML for Health Care
Conference Proceeding
Spyra, G., Buchanan, W. J., & Ekonomou, E. (2015)
Sticky-Policy enabled authenticated OOXML for Health Care. In Proceedings of BCS Health Informatics Scotland 2015 Conferencehttps://doi.org/10.14236/ewic/HIS2015.3
This paper proposes a secure medical document sharing construction, which addresses confidentiality and authenticity concerns related to cloud-based data protection issues. Th...
Towards Trust and Governance in Integrated Health and Social Care Platforms
Book Chapter
Buchanan, W., Thuemmler, C., Spyra, G., Smales, A., & Prajapati, B. (2017)
Towards Trust and Governance in Integrated Health and Social Care Platforms
The way we are sharing health and care data will be changing considerably over the years to come. One of the reasons is an increasing move towards patient-centric approaches w...
Embedded document security using sticky policies and identity based encryption
Thesis
Spyra, G. K. Embedded document security using sticky policies and identity based encryption. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/Output/2090564
Data sharing domains have expanded over several, both trusted and insecure environments. At the same time, the data security boundaries have shrunk from internal network perim...
Protecting Documents with Sticky Policies and Identity-Based Encryption
Conference Proceeding
Spyra, G., & Buchanan, W. J. (2016)
Protecting Documents with Sticky Policies and Identity-Based Encryption. In Proceedings of the Future Technologies Conference (FTC) 2016https://doi.org/10.1109/FTC.2016.7821719
Documents are increasingly being held in public cloud-based systems, and there thus increasingly exposed to accesses from malicious entities. This paper focuses on the integra...