5 results

Personal data space in organisations: managing personal knowledge and identity.

Book Chapter
Wigan, M. (2002)
Personal data space in organisations: managing personal knowledge and identity. In L. Holmes, D. M. Hosking, & M. Grieco (Eds.), Organising in the Information Age: Distributed Technology, Distributed Leadership, Distributed Identity, Distributed Discourse (45-56). Ashgate Publishing
Identity and information ownership are increasingly confused. One of the key aspects of this area of dispute is the personal data space within which people perceive that they ...

Security for Cyber-Physical Systems in Healthcare

Book Chapter
Saleem, K., Tan, Z., & Buchanan, W. (2017)
Security for Cyber-Physical Systems in Healthcare. In Health 4.0: How Virtualization and Big Data are Revolutionizing Healthcare (233-251). Springer. https://doi.org/10.1007/978-3-319-47617-9_12
The great leap forward of cyber-physical systems has made provision for future personalized medicine. However, these systems are prone to cyber attacks. To provide patients wi...

Towards Trust and Governance in Integrated Health and Social Care Platforms

Book Chapter
Buchanan, W., Thuemmler, C., Spyra, G., Smales, A., & Prajapati, B. (2017)
Towards Trust and Governance in Integrated Health and Social Care Platforms
The way we are sharing health and care data will be changing considerably over the years to come. One of the reasons is an increasing move towards patient-centric approaches w...

Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis

Book Chapter
Tan, Z., Jamdagni, A., He, X., Nanda, P., & Liu, R. P. (2011)
Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis. In Neural Information Processing; Lecture Notes in Computer Science (756-765). Springer. https://doi.org/10.1007/978-3-642-24965-5_85
The reliability and availability of network services are being threatened by the growing number of Denial-of-Service (DoS) attacks. Effective mechanisms for DoS attack detecti...

Cloud Security, Privacy, and Trust Baselines

Book Chapter
Pitropakis, N., Katsikas, S., & Lambrinoudakis, C. (2016)
Cloud Security, Privacy, and Trust Baselines. In Cloud Computing Security Foundations and Challenges. Boca Raton: CRC Press (Taylor and Francis Group
According to ISO 27001, a threat is a potential event. When a threat turns into an actual event, it may cause an undesirable incident. It is undesirable because the incident...