8 results

Who would you trust to identify you in accessing your health record?

Conference Proceeding
Buchanan, W. J., Anderson, C., Smales, A., Varga, J., Burns, N., Uthmani, O., …Lawson, A. (2013)
Who would you trust to identify you in accessing your health record?
Within health and social care there is a strong need to provide access to highly sensitive information, and one which requires high levels of identity assurance. This paper ou...

Modelling of integrated trust, governance and access safi.re: Information Sharing Architecture.

Conference Proceeding
Buchanan, W. J., Uthmani, O., Fan, L., Burns, N., Lo, O., Lawson, A., …Anderson, C. (2013)
Modelling of integrated trust, governance and access safi.re: Information Sharing Architecture. In M. Felici (Ed.), Cyber Security and Privacy, (91-101). https://doi.org/10.1007/978-3-642-41205-9_8
We live in a world where trust relationships are becoming ever more important. This paper outlines how an architecture which abstracts these relationships between domains, org...

DACAR platform for eHealth services cloud.

Conference Proceeding
Fan, L., Buchanan, W. J., Thuemmler, C., Lo, O., Khedim, A. S., Uthmani, O., …Bell, D. (2011)
DACAR platform for eHealth services cloud. https://doi.org/10.1109/CLOUD.2011.31
The use of digital technologies in providing health care services is collectively known as eHealth. Considerable progress has been made in the development of eHealth services,...

Novel information sharing syntax for data sharing between police and community partners, using role-based security.

Conference Proceeding
Uthmani, O., Buchanan, W. J., Lawson, A., Thuemmler, C., Fan, L., Scott, R., …Mooney, C. (2010)
Novel information sharing syntax for data sharing between police and community partners, using role-based security
The exchange of information between the police and community partners forms a central aspect of effective community service provision. In the context of policing, a robust and...

Interagency data exchange protocols as computational data protection law.

Conference Proceeding
Buchanan, W. J., Fan, L., Lawson, A., Schafer, B., Scott, R., Thuemmler, C. & Uthmani, O. (2010)
Interagency data exchange protocols as computational data protection law
The paper describes a collaborative project between computer scientist, police officers, medical professionals and social workers to develop a communication infrastructure tha...

Novel information sharing architecture between the Police and their community partners.

Conference Proceeding
Uthmani, O., Buchanan, W. J. & Lawson, A. (2010)
Novel information sharing architecture between the Police and their community partners
The exchange of information between the police and community partners forms a central aspect of effective community service provision. In the context of policing, a robust and...

SPoC: Protecting Patient Privacy for e-Health Services in the Cloud

Conference Proceeding
Fan, L., Buchanan, W. J., Lo, O., Thuemmler, C., Lawson, A., Uthmani, O., …Khedim, A. S. (2011)
SPoC: Protecting Patient Privacy for e-Health Services in the Cloud. In eTELEMED 2012, 99-104. ISBN 978-1-61208-179-3
The use of digital technologies in providing health care services is in general subsumed under the term e-Health. The Data Capture and Auto Identification Reference (DACAR) pr...

Computational data protection law: trusting each other offline and online.

Conference Proceeding
Buchanan, W. J., Fan, L., Lawson, A., Schafer, B., Scott, R., Thuemmler, C. & Uthmani, O. (2011)
Computational data protection law: trusting each other offline and online. In Legal Knowledge and Information Systems; JURIX 2012, 31-40. doi:10.3233/978-1-61499-167-0-31. ISBN 978-1-61499-166-3
The paper reports of a collaborative project between computer scientists, lawyers, police officers, medical professionals and social workers to develop a communication in infr...