36 results

Cloud-based digital forensics evaluation test (D-FET) platform.

Presentation / Conference
Buchanan, W. J., Macfarlane, R., Flandrin, F., Graves, J., Fan, L., Ekonomou, E., …Ludwiniak, R. (2011, June)
Cloud-based digital forensics evaluation test (D-FET) platform. Paper presented at Cyberforensics 2011, University of Strathclyde, Glasgow
This paper outlines the specification of the Cloud-based DFET platform which is used to evaluate the performance of digital forensics tools, which aim to detect the presence o...

A next generation Cloud-based health care platform.

Presentation / Conference
Buchanan, W. J. (2011, May)
A next generation Cloud-based health care platform. Paper presented at Innovation in Healthcare, London
This presentation outlines a novel Cloud-based e-Health Platform which integrates security within every single transaction. It involves a TSB/EPSRC funded project with Edinbur...

A comparative review of information security risk assessment methodologies for health care.

Presentation / Conference
Hazelhoff Roelfzema, N. (2011, March)
A comparative review of information security risk assessment methodologies for health care. Paper presented at IADIS e-Society, Avilla, Spain
Health care organizations face major compliance challenges as they need to secure patient information. An important compliance requirement is the performance of regular risk a...

Novel security assessment for personal health data.

Presentation / Conference
Hazelhoff Roelfzema, N. (2010, November)
Novel security assessment for personal health data. Paper presented at Perada workshop on Privacy, Security & Trust, Rome, Italy

Key note: Information Lifecycle and Data Governance

Presentation / Conference
Howie, J. (2010, August)
Key note: Information Lifecycle and Data Governance. Paper presented at Goverance, Risk and Compliance, Lisbon, Portugal

Covert channel analysis and detection using reverse proxy servers.

Presentation / Conference
Buchanan, W. J., & Llamas, D. (2004, June)
Covert channel analysis and detection using reverse proxy servers. Paper presented at 3rd International Conference on Electronic Warfare and Security (EIWC), London
Data hiding methods can be used by intruders to communicate over open data channels (Wolf 1989; McHugh 1995; deVivo, deVivo et al. 1999), and can be used to overcome firewalls...