16 results

Method for identification of digital content

Patent
Buchanan, B., Lo, O., Penrose, P., Ramsay, B., & Macfarlane, R. (2018)
Method for identification of digital content. World Intellectual Property Organization
Many areas oi investigation require searching through data that may be oi interest. One example oi data that may be involved in an investigation is copyrighted material that m...

System and method for management of confidential data

Patent
Buchanan, B., Lo, O., Macfarlane, R., Penrose, P., & Ramsay, B. (in press)
System and method for management of confidential data. GB2561176A
This application is for a method of data management to identify confidential digital content on a database by first receiving a management request 302 from a system 304 to car...

Correlation Power Analysis on the PRESENT Block Cipher on an Embedded Device

Conference Proceeding
Lo, O., Buchanan, W. J., & Carson, D. (2018)
Correlation Power Analysis on the PRESENT Block Cipher on an Embedded Device. In ARES 2018 Proceedings of the 13th International Conference on Availability, Reliability and Securityhttps://doi.org/10.1145/3230833.3232801
Traditional cryptographic techniques have proven to work well on most modern computing devices but they are unsuitable for devices (e.g. IoT devices) where memory, power consu...

Distance Measurement Methods for Improved Insider Threat Detection

Journal Article
Lo, O., Buchanan, W. J., Griffiths, P., & Macfarlane, R. (2018)
Distance Measurement Methods for Improved Insider Threat Detection. Security and Communication Networks, 2018, 1-18. https://doi.org/10.1155/2018/5906368
Insider threats are a considerable problem within cyber security and it is often difficult to detect these threats using signature detection. Increasing machine learning can p...

Secret shares to protect health records in Cloud-based infrastructures

Conference Proceeding
Buchanan, W. J., Ukwandu, E., van Deursen, N., Fan, L., Russell, G., Lo, O., & Thuemmler, C. (2016)
Secret shares to protect health records in Cloud-based infrastructures. In 2015 17th International Conference on E-health Networking, Application & Services (HealthCom)https://doi.org/10.1109/HealthCom.2015.7454589
Increasingly health records are stored in cloud-based systems, and often protected by a private key. Unfortunately the loss of this key can cause large-scale data loss. This p...

RESCUE: Resilient Secret Sharing Cloud-based Architecture.

Conference Proceeding
Ukwandu, E., Buchanan, W. J., Fan, L., Russell, G., & Lo, O. (2015)
RESCUE: Resilient Secret Sharing Cloud-based Architecture. In 2015 IEEE Trustcom/BigDataSE/ISPA Vol. 1, (872-879). https://doi.org/10.1109/Trustcom.2015.459
This paper presents an architecture (RESCUE) of a system that is capable of implementing: a keyless encryption method; self-destruction of data within a time frame without use...

The future internet: a world of secret shares

Journal Article
Buchanan, W. J., Lanc, D., Ukwandu, E., Fan, L., Russell, G., & Lo, O. (2015)
The future internet: a world of secret shares. Future Internet, 7(4), 445-464. https://doi.org/10.3390/fi7040445
The PKI infrastructure is crumbling, especially due to the lack of a strong understanding of how encryption actually works, and in threats around its implementation. This pape...

E-Health: chances and challenges of distributed, service oriented architectures

Journal Article
Thuemmler, C., Fan, L., Buchanan, W. J., Lo, O., Ekonomou, E., & Khedim, A. S. (2012)
E-Health: chances and challenges of distributed, service oriented architectures. Journal of cyber security and mobility, 37,
Societies are undergoing unprecedented demographic and socio-economical changes on a pace that has never been experienced before. Health care models are in transition to remai...

Cloud4Health.

Presentation / Conference
Buchanan, W. J., Fan, L., Ekonomou, E., & Lo, O. (2012, May)
Cloud4Health. Paper presented at Symposium on the Future of e-Health, Edinburgh Napier University, Edinburgh
The cloud4health platform focuses on creating a next generation infrastructure which aims to integrate assisted living with primary and secondary health care, in order to redu...

Integrating assisted living with primary and secondary health care.

Presentation / Conference
Buchanan, W. J., Fan, L., Ekonomou, E., Lo, O., Uthmani, O., & Thuemmler, C. (2012, May)
Integrating assisted living with primary and secondary health care. Paper presented at Data Handling in Health and Social Care: Striking the balance between confidentiality, security and information sharing, Edinburgh
This presentation outlines the Cloud4Health platform.